Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of...

88

Transcript of Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of...

Page 1: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi
Page 2: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

i

Page 3: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

ii

Patron Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI

University.

Editor-in-Chief Prof. Dr. Syed Asif Ali, Dean Faculty of Information

Technology, SMI University.

Managing Editor Dr. Muhammad Ali, Chairperson, Department of Computer

Sciences, SMI University.

Assistant Editors

Mr. Basit Hassan, Department of Computer Sciences, SMI

University.

Ms. Sumaira Hussain, Department of Computer Sciences,

SMI University.

Publication and Circulation Office of Research Innovation and Commercialization

(ORIC), SMI University.

International Journal of Computing and Related

Technologies

Page 4: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

iii

International Advisory Board

Valentina Emilia Balas

Aurel Vlaicu University of Arad

Romania

Tarek S El Bawab

Jackson State University

USA

Yuriy Syerov

Lviv National Polytechnic

University

Ukraine

Solomia Fedushko

Lviv Polytechnic National

University

Ukraine

Mioara Boncut

Lucian Blaga University of Sibiu

Romania

Grzegorz Sierpiński

Silesian University of

Technology

Poland

Muhammad Adamu Jebba

Niger State College of Education

Nigeria

Hafnidar A. Rani

University of

Muhammadiyah

Indonesia

Hla Myo Tun

Mandalay Technological

University

Myanmar

Muhammad Naveed

Anwar

North Umbria University

United Kingdom

Xiao-Zhi Gao

Aalto University Finland,

Europe

Yousef Farhaoui

Moulay Ismail University

Morocco

International Journal of Computing and Related

Technologies

Page 5: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

iv

Editorial Board

S.M.Aqil Burney

Institute of Business Management Karachi

Pakistan.

Farah Lakhani

Al Majmaah University

Saudi Arabia.

Mukhtiar Ali Unair

MUET Jamshoro

Pakistan.

Ismail Khalid Kazmi

Teesside University Cleveland

United Kingdom.

Vali Uddin

Hamdard University

Pakistan.

Faisal Sana

Yanbu University

Saudi Arabia.

Faisal Khan

BUITEMS Baluchistan

Pakistan.

Faraz Zaidi

Health Analytics Region of Peel Mississauga

Canada.

Syed M. Faisal Iradat

IBA Karachi

Pakistan.

Shoaib Kamran

Chartered Management Institute

United Kingdom.

Tim Spracklen

Habib University Karachi

Pakistan.

Asadullah Shah

International Islamic University

Malaysia.

M. Sadiq Ali Khan,

University of Karachi

Pakistan.

Yar Muhammad

University of Tartu

Estonia.

International Journal of Computing and Related

Technologies

Page 6: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

v

Manzoor Hashmani

Iqra University

Pakistan.

Asadullah Shaikh

Najran University

Saudi Arabia.

Syed Irfan Hyder

Institute of Business Management

Pakistan.

Aurangzeb Khan

UST,Bannu

Pakistan.

Noor Ahmed Shaikh

Shah Abdul Latif University

Pakistan.

Mansoor-uz-Zafar Dawood

King Abdul Aziz University

Saudi Arabia.

Sayed Sajjad Hussain Rizvi

Iqra University

Pakistan.

Noor Zaman

King Faisal University

Saudi Arabia.

Aqeel-ur-Rehman

Hamdard University

Pakistan.

Javed Ahmed Mahar

Shah Abdul Latif University

Pakistan.

Sehatullah

University of Malakand

Pakistan.

Najeed Ahmed Khan

NED University

Pakistan.

International Journal of Computing and Related

Technologies

Page 7: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

vi

Editor’s Note

I am delighted to introduce International Journal of Computing and Related Technologies (IJCRT).

It is a new journal arisen from Department of Computer Science, Sindh Madressatul Islam

University Pakistan in the area of computing and related technology worldwide. IJCRT is a bi-

annual journal and this really provides opportunity to share research finding all across the world.

IJCRT received good response from international and national researchers and academician to

share their research work. All research papers have been finalized after double blind review

process.

I feel pleasure to share that IJCRT have very senior researchers and academicians in advisory and

editorial board globally from all regions including Europe, Asia, Africa, North and South America.

Pointless to say, you may submit your research either individually or collaboratively, which will

be highly appreciated or will make a considerable input to the early development and success of

the journal.

Lastly, I on behalf of Sindh Madressatul Islam University pay my highest tribute to all members

of International Advisory and Editorial Board for their cooperation in view of sharing their

valuable suggestions which make possible the successful issuing of this research work in the form

of IJCRT. I also thanks to managing committee of IJCRT for their support and contribution.

Best wishes we thank you in advance for your contribution to the IJCRT.

Prof. Dr. Syed Asif Ali

Editor-in-Chief IJCRT

Sindh Madressatul Islam University

Karachi Pakistan

Page 8: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

vii

ABOUT INTERNATIONAL JOURNAL OF COMPUTING AND RELATED

TECHNOLOGIES (IJCRT)

Research is the driving force behind the advancement in every single field. Research journals serve

as a platform to connect researchers from all over the world to share their research developments.

Keeping in view the indispensable role of a journal; the department of computer science Sindh

Madressatul Islam University (SMIU), has decided to launch its research journal entitled

International Journal of Computing and related Technologies (IJCRT).

AIM AND SCOPE OF THE JOURNAL

International Journal of Computing and Related Technologies (IJCRT), provides an international

platform for scientists, researchers and academicians from all over the world to publish their high

quality research advancement related to the field of computer science and related technology.

Submitted papers for publication in IJCRT, are passed through a strict peer review process to

ensure good quality, novelty, and constructive contribution in the field of computer science and

technology. The unpublished materials which has not been submitted elsewhere, can be published

provided that it meets the journal standard.

TOPICS

International Journal of Computing and related Technologies (IJCRT) publishes papers related to

topics but not limited to:

Computer architecture and design

Artificial intelligence

Pattern recognition

Human computer interaction

Cloud Computing

Information security and cryptography

Computer networking

Software engineering

Data management

Database systems

Computer languages

Other emerging computing technologies

MANAGING COMMITTEE OF THE JOURNAL

The managing committee of International Journal of Computing and related Technology (IJCRT)

is comprised of Patron, Chief Editor, Managing Editor, International Advisory Board and Assistant

Editors.

EDITORIAL BOARD

The editorial board of International Journal of Computing and Related Technologies (IJCRT)

consists of researchers and academicians serving in local and international

universities/organizations.

Page 9: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

viii

REVIEW COMMITTEE

International Journal of Computing and related Technologies (IJCRT) doesn’t disclose the identity

of its review committee members. Normally, review committee members will be experts in the

field (industry or university) and editor is responsible for approaching suitable reviewer for the

review process. The honorary services provided by the reviewers are extremely acknowledged by

SMI University.

AUTHOR GUIDELINES

Authors should strictly follow publication ethics such as the submitted work should be original,

the data presented in the paper should not be tempered or false.

Authors of accepted papers are also responsible to submit copyright form stating that journal has

authority to share published work with partners or make it open.

PEER REVIEW POLICY

The submitted manuscript will be received by the editor. The quality of submitted work will be

checked by the editor at the initial stage. If the quality of paper meets the set standards of the

journal then it will be sent to at least two reviewers for a peer review process and in case if the

submitted work could not pass quality check at the initial stage it will be rejected by the editor.

Editor will provide final decision on the basis of review results. Authors will be informed about

rejection/acceptance of manuscript immediately after review. IJCRT has the policy that accepted

paper has to be recommended by at least two reviewers.

SUBMISSION PROCESS

The manuscript can be submitted by sending papers directly to email: [email protected]. The

received paper will be acknowledged by sending an assigned manuscript id and then disseminated

to the reviewers for review. The authors can submit manuscript in a simple MS word file. The

manuscript will be changed into journal format after the acceptance.

PUBLISHING FREQUENCY

IJCRT is a bi-annual journal which will release one volume with two issues in a year.

Page 10: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

i

Table of Contents

S. No. Papers and Authors Page No

1. Implementation of Real-Time SCADA-Based HCI Manufacturing

Process by Hla Myo Tun, Zaw Min Naing, Maung Latt, Win Khine Moe

1-22

2. Impact of Multimedia and Hypermedia Instruction on Teaching Basic

Electricity Technology: Case Study of Government Technical Colleges

in Oyo State, Nigeria by Soji Aderemi Adedeji, Muhammed Jebba

Adamu

23-32

3. Upgrading the Computerized System for Teacher/Student Database in

Department of Electronic Engineering by Hla Myo Tun, Zaw Min Naing,

Win Khaing Moe, Maung Maung Latt

33-59

4. Planned Future Internet Infrastructure: A Pilot Model for Higher

Education Institution

60-68

5. Fluid Flow Algorithm to Solve Travel Salesman Problem by Mudassir

Khalil, Jian-Ping Li, Rafaqat Hussain, Kamlesh Kumar

69-75

Page 11: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

1 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Implementation of Real-Time SCADA-Based HCI Manufacturing

Process

Hla Myo Tun1 Zaw Min Naing2 Maung Latt3 Win Khine Moe4

Abstract

This research presents SCADA based control system that is capable of Natural Fertilizer

Manufacturing Process. In this research, the simulation of the whole process is conducted in real-

time condition by using Visual C#.Net programming under Visual Studio 2008 software. The

parallel port of PC and PIC microcontrollers have been communicated with parallel port interface

Visual C#.Net program. Peripheral Interface Controller (PIC16F877A) is used as a control unit of

natural fertilizer manufacturing process with C Programming instead of Programmable Logic

Controller hardware. In interfacing section, parallel port was used to communicate to the personal

computer with all process devices. However, it did not use so many input lines because it has

limitation of I/O ports. Optocouplers are also included to divide different voltages between circuits

and the computer. The monitoring system displays the real time manufacturing process on the

computer. This automation process helps the natural fertilizer manufacturing process to reduce the

amount of errors that occur, to reduce the human resources, to increase the efficiency and cost

effectiveness.

Keywords:

1 Introduction

Most of industrial plants have a control center where is installed a SCADA (Supervisory Control

and Data Acquisition). It is a software application specially designed to work on computers in the

production control, providing communication with the devices (independent controllers,

programmable robots, etc.) and controlling the process from the screen of the computer. In

addition, it provides all the information that is generated in the process to diverse users, as much

as the same level as to other supervisors within the plant: quality control, supervision, maintenance,

etc.

It usually exist a computer, which carries out tasks of supervision and management of motors, as

well as data processing and process control. The communication is made by means of special

buses. All this is executed normally in real time, and is designed to give to the plant operator the

possibility of supervising and controlling these processes [1]. The abstraction that process control

allows has proven to be one of the greatest costs and time savers of the industrial age. Instead of

1 Department of Electronic Engineering, Yangon Technological University [email protected] 2 Department of Research and Innovation, Ministry of Education, [email protected] 3 Technological University (Toungoo) , Ministry of Education, [email protected] 4 Department of Research and Innovation, Ministry of Education [email protected]

Page 12: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

2 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

many workers monitoring and altering parts of large systems, one or two operators can control the

whole system from a central point.

This research outlines the various stages of operation included in the conversion of a manually

operated natural fertilizer manufacturing plant towards an automated plant. The natural fertilizer

manufacturing process contains four main stages: preparation of raw materials, production of

mould, mixing of mould, rice husk ash and microorganism’s culture broth and packaging process.

Firstly, if the start button is pressed, the whole process turns on. Then, mixer motor runs and the

first conveyor moves towards one direction by necessary speed. Mould is filled in the tank1 until

reaching the specified weight level and rice husk ash is filled in the tank2 until reaching the

specified weight level. And then the conveyor moves towards one direction by necessary speed.

Mould and rice husk ash are carried by conveyor and are filled in the mixer. Mould and rice husk

ash are mixed in the mixer. The natural fertilizer gets mixture of mould, husk ash and

microorganisms’ culture broth [2]. Natural fertilizer is filled in the bags until the specified weight

level. The robot arm picks up the bag and places it another conveyor. These bags are carried by

another conveyor and are bagged by sewing machine.

The weight and position feedback data from these sensors are converted the electrical signals by

using signal conditioning circuit. By applying these electrical signals for the microcontroller not

only the conditions of process is controlled but also the real time condition is monitored on the

computer. The optocouplers are interfaced from the parallel port of the computer and the

microcontroller.

2 Natural Fertilizer Manufacturing Process

Myanmar is an agricultural country, with a total of 18 million hectares of cultivable land, and out

of which about nine million hectares are under crop cultivation. So, the demand for fertilizer is

very high. The currently used agricultural inputs are mostly chemicals.

The use of chemical fertilizers has been widely practiced because of its almost immediate effect,

which has replaced the traditional way of recycling, this nutrients to a point that this is now taken

for granted. Moreover, intensive application of chemical fertilizers in agriculture has caused the

damage to the ecological state of the agricultural system.

The use of natural fertilizer is an alternative to improve the condition of soil. Natural fertilizers do

not contaminate the soil and atmosphere. It helps to produce healthy foods. It is well known that a

considerable number of bacterial species are able to exert a beneficial effect upon plant growth.

They are used as natural fertilizers or control agents for agriculture improvement. The main parts

of natural fertilizer manufacturing process are shown in Figure.1. In natural fertilizer

manufacturing process, the three main components are included. These are mixing process, filling

process and packaging process. This research outlines the various stages of operation included in

the conversion of a manually operated natural fertilizer manufacturing plant towards an automated

plant. The quality of natural fertilizer can be increased because mixing time, filling time and

bagging time are exactly using this SCADA system.

Page 13: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

3 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Rice Husk Ash

Mould &

Microorganisms’culture

broth

Mixing Process Filling Process

Packaging Process

Figure 1: Block diagram of Natural Fertilizer Manufacturing Process [2]

3 SCADA System for Natural Fertilizer Manufacturing Process

In the production of natural fertilizer, the manufacturing process is used for controlling by

Supervisory Control and Data Acquisition system. Most of modern industries use SCADA system

because of security and reliability system and other facts. It is shown in Fig. 3.2. SCADA system

includes a master station (personal computer). And this manufacturing process uses PLC controller

unit in most industries. It is designed with PIC microcontroller instead of using PLC and other

control circuits. So, Remote Terminal Unit (RTU) includes interfacing circuit, PIC microcontroller

and devices used control driver circuit. Parallel port communication is used to connect master

station and RTU. Three weight sensors and two position sensors are used to detect the amount of

weight and the position of the object. The data from sensors is controlled by using controller circuit

and interface circuit is used to match this data to understand the computer using parallel port and

optocouplers. The operation of motors is driven by PIC microcontroller.

For a small factory, it is monitoring system using Visual C#.Net programming. It designs the real-

time monitoring for natural fertilizer manufacturing process. So, it consists of Master station,

which includes data acquisition and visualization programs and RTU, which includes PIC

microcontroller based signal sensing and supervisory control. SCADA software has various types

(Citech, Lab View, RSView32, WinCC,In Touch 7.1 and etc.). In this research work, own

monitoring program for natural fertilizer manufacturing process is used instead of the SCADA

software. This program is written by visual C#. Net programming under Visual Studio 2008 [3].

4 Implementation

The software written to control the natural fertilizer manufacturing process is also described. The

features of the MPLAB compiler are used to program the PIC microcontroller.

Page 14: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

4 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Interfacing

program

Monitoring

program

Personal computer

Interface

circuit

PIC

microcontroller

Parallel

portSensors

(weight sensors,

position sensors)

Motor driver

Motors

( mixer motor,

conveyor motors,etc.)

Figure 2: Block Diagram of SCADA System for Natural Fertilizer Manufacturing Process [3]

4.1 Interfacing and Monitoring

This system consists of two portions. The first one is to control the operation of SCADA based

natural fertilizer manufacturing process from the controlling unit. The other is to display and

simulate for the whole manufacturing process. The interfacing system includes optocouplers and

parallel port. The monitoring system is written by Visual C#.Net programming from Visual Studio

2008 software.

A. Interface Portion of Optocoupler

The PC817 type optocouplers are used to shift the matching voltages between the computer

and PIC16F877A. They are used to match the various different voltages. This system uses

two grounds as common ground from the process and common ground from the computer.

The selected pins of the parallel port are used as output pins of PC and its output signal (1,

2, 3 and etc.) is used to select the output lines of PIC. Pin 2 of parallel port cable is used as

a start/stop signal pin to control the natural fertilizer manufacturing process.

B. Computerized Control Portion of the System

The parallel port interfacing is applied in this system to input the computer and to output

the process. The standard parallel port uses three contiguous addresses, usually in one of

these ranges. The first address in the range is the port’s base address, also called the data

register. The second address is the port’s status register, and register, and the third address

Page 15: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

5 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

is the control register. The data register is used as output and the status port is used as input.

The control register is not used in this research.

C. Interfacing for the Parallel Port Communication

The parallel port is used to communicate, control and collect data with operation mode

linking with RTU. It uses library files “.dll” to control visual C#.net for input/output from

actual process. Windows have other options for driving device, including DLLs. A visual

C# program can call a DLL directly to access a DLL. A DLL (dynamic linked library) is a

set of procedures that windows applications can call. When an application runs, it links to

the DLLs declared in its program code, and the corresponding DLLs load into memory.

Multiple applications can access the same DLL. The application calls DLL procedures

much like any other subroutine or function.

Many programming languages enable to write and compile DLLs. Creating a DLL can be

as simple as writing the code and choosing to compile it as a DLL rather than as an

executable (.exe) file. Visual C# programs can call any DLL, whether it was originally

written in Basic or another language. The parallel port in the original IBM PC, and any

port that emulates the original port’s design, is sometimes called the SPP, for standard

parallel port, even though the original port had no written standard beyond the schematic

diagrams and documentation for the IBM PC. Other names used are AT-type or ISA-

compatible. The port in the original PC was based on an existing centronics printer

interface. However, the PC introduced a few differences, which other systems have

continued.

SPPs can transfer eight bits at once to a peripheral, using a protocol similar to that used by

the original centronics interface. The SPP doesn’t have a byte-wide input port, but for PC-

to-peripheral transfers, SPPs can use a Nibble mode that transfers each byte 4 bits at a time.

Nibble mode is slow, but has become popular as a way to use the parallel port for input.

There are many ways to access a parallel port in software, but all ultimately read or write

to the port’s registers. To distinguish between I/O ports and system memory, the

microprocessor uses different instructions and control signals for each. On the original PC,

port address could range from 0FFh to 3FFh. Many newer parallel port decode an eleventh

address line to extend the range to 7FFh. Many programs that access the parallel port use

this table to get a port’s address. This way uses only have to select LPT1, LPT2, or LPT3,

and the program can find the address. Use the control bits as inputs on the PC only on SPPs

or ports that emulate the SPP. If it uses the control lines as inputs, drive them with open-

collector outputs. This will protect the port’s circuits if a law control-port output should

connect to a high output.

Visual CSharp has been the most popular choice for basic programmers developing

window programs. It can add Inp and Out to the language in a dynamic linked library

(DLL). A DLL contains code that any windows program can access, including the program

written in Visual CSharp. This SCADA based software includes DLLs for port access:

inpout32.dll, for use with 32-bits Visual C# program [4].

Page 16: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

6 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Runtime.InteropServices;

public class PortAcess {

[DllImport("inpout32.dll", EntryPoint= "Inp32")]

public static extern int Inp32(int Port Address);

[DllImport("inpout32.dll", EntryPoint= "Out32")]

public static extern int Out32(int PortAddress, int Value);

public static double an1;

public static double an2;

public static double an3;

public static int sw1;

public static int sw2;

public static int motor1;

public static int motor2;

public static int motor3;

public static int motor4;

public static int motor5;

public static int motor6;

public static int motor7;

public static int motor8;

public static bool Tank1ArrowEnable;

public static bool Tank2ArrowEnable;

public static bool Sensor1ArrowEnable;

public static bool RobotEnable;

public static bool PackingConveyor;

public static long TotalBag;

public static bool SystemStart;

}

The program declares the Inp32 and Out32 contained in inpout32.dll and declares variables

using software for natural fertilizer manufacturing process. A program that writes directly

to parallel port has no way of knowing whether another application is already using the

port. But sometimes a port is intended to use with a single application. If other applications

have no reason to access the port, direct I/O with In and Out should cause no problems.

When receiving data from Operation mode three timers are used to different the condition

of sensors and motors using natural fertilizer manufacturing process. With Inp and Out

declared in program, it can use them much like Inp and Out in QuickBasic. On the user’s

system, the file Inpout32.dll should be copied to one of these locations: the default

windows directory (usually\Windows), the default system directory (usually \ Windows \

System), or the application’s working directory. These are the locations that windows

automatically search when it loads a DLL. If for some reason the DLL is in a different

directory, it will need to add its path to the filename in the declare statements.

D. Linking Windows System for the Process

The operation of the SCADA based natural fertilizer manufacturing process can be run and

stopped from main page by the operator. The main page serves to collect data from the

operation mode and display in real-time running and save the collected data. The graph

Page 17: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

7 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

line is drawn in approximately one second step until the STOP command is accepted. When

the main page program is shutdown the data acquisition and processing is shutdown all

process except receiving command from the main page. So, the application software can

be viewed in pages, the main page of PC and other pages linking each other as software of

SCADA system. The complete block diagram is shown in Figure.3. The main page can be

divided into the following function. These are:

Operation mode (real-time monitoring as hardware),

Hardware mode (displaying components like real devices),

Instruction mode (List of facts of SCADA system for Natural Fertilizer Manufacturing

Process) and

Control mode (including start, stop and exit for security) [6].

Figure 3: Block Diagram of Linking Window System

4.2 Design Program for Main Page

The Visual C#.Net portion of window application from Visual Studio 2008 IDE is used for Main

page. It designs a window form using the software application data and uses data by depended the

process from the properties. The devices used for the control are designed on the form by using

the toolbox. And the codes of programming for each of the component are written on the code

viewer by using Visual C#. Timer tools are used for timing of data interfacing and input/output for

process data. A timer is used to raise an event at user-defined intervals. This windows timer is

designed for a single-threaded environment where User Interface (UI) threads are used to perform

processing. It requires that the user code have a UI message pump available and always operate

from the same thread, or marshal the call onto another thread [5].

Page 18: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

8 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Gets or sets the time, in millisecond, between timer ticks. Windows forms timer component has

an interval property that specifies the number of milliseconds that pass between one timer event

and the next. Unless the component is disabled, a component is designed for a windows forms

environment. The read or write signal of timer continues to receive the Tick event at roughly equal

interval of time. This input/output system activates every time. It uses timer tool (timerIn_Tick) to

watch the port system. The signal from timer state is flowed to selected pin of PC.

If five selected pins of parallel port sent to PIC as ‘1’, PC would read weight level of variable

resistor1 (instead of weight sensor1) for tank1. If five selected pins of parallel port sent to PIC as

‘2’, PC would read weight level of variable resistor2 (instead of weight sensor2) for tank2. If five

selected pins of parallel port sent to PIC as ‘3’, PC would read weight level of variable resistor3

(instead of weight sensor3) for bagging. If five selected pins of parallel port sent to PIC as ‘4’, PC

would read position of bag from switches (instead of position sensor1 and position sensor2). The

input signal of each port is compared with the particular selecting address. It is shown in Figure.4.

It can be written:

PortAccess.Out32(888, 1);

delay();

input = PortAccess.Inp32(889);

PortAccess.Out32(888, 0);

delay();

b0 = (( input & 64 ) == 0)? 1: 0;

b1 = (( input & 128 ) == 0)? 0: 1;

b2 = (( input & 32 ) == 0)? 1: 0;

b3 = (( input & 16 ) == 0)? 1: 0;

b4 = (( input & 8) == 0)? 1: 0;

PortAccess. an1 = b0 * 1 + b1 * 2 + b2 * 4 + b3 * 8 + b4 * 16;

PortAccess.Out32(888, 2);

delay();

input = PortAccess. Inp32(889);

PortAccess.Out32(888, 0);

delay();

b0 = (( input & 64 ) == 0)? 1: 0;

b1 = (( input & 128 ) == 0)? 0: 1;

b2 = (( input & 32 ) == 0)? 1: 0;

b3 = (( input & 16 ) == 0)? 1: 0;

b4 = (( input & 8 ) == 0)? 1: 0;

an2 = b0 * 1 + b1 * 2 + b2 * 4 + b3 * 8 + b4 * 16;PortAccess.Out32(888, 3);

delay();

input = PortAccess. Inp32(889);

PortAccess.Out32(888, 0);

delay();

b0 = (( input & 64 ) == 0)? 1: 0;

b1 = (( input & 128 ) == 0)? 0: 1;

b2 = (( input & 32 ) == 0)? 1: 0;

b3 = (( input & 16 ) == 0)? 1: 0;

b4 = (( input & 8 ) == 0)? 1: 0;

PortAccess.an3 = b0 * 1 + b1 * 2 + b2 * 4 + b3 * 8 + b4 * 16;

PortAccess.Out32(888, 4);

delay();

input = Inp32(889);

PortAccess.Out32(888, 0);

delay();

Page 19: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

9 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

PortAccess.sw1 = ((input & 64) == 0)? 1:0;

PortAccess.sw2 = ((input & 128) == 0)? 0:1;

PortAccess.Out32(888, 0);

delay();

If five selected pins of parallel port sent to PIC as ‘7’, mixer motor (‘motor1’) would activate. If

five selected pins of parallel port sent to PIC as ‘6’, mixer motor (‘motor1’) would not activate. If

five selected pins of parallel port sent to PIC as ‘9’, conveyor motor1 (‘motor2’) would activate.

If five selected pins of parallel port sent to PIC as ‘8’, conveyor motor1 (‘motor2’) would not

activate. If five selected pins of parallel port sent to PIC as ‘11’, filling valve motor for tank1

(‘motor3’) would activate.

If five selected pins of parallel port sent to PIC as ‘10’, filling valve motor for tank1 (‘motor3’)

would not activate. If five selected pins of parallel port sent to PIC as ‘13’, filling valve motor for

tank2 (‘motor4’) would activate. If five selected pins of parallel port sent to PIC as ‘12’, filling

valve motor for tank2 (‘motor4’) would not activate. If five selected pins of parallel port sent to

PIC as ‘15’, filling valve motor for mixer (‘motor5’) would activate. If five selected pins of parallel

port sent to PIC as ‘14’, filling valve motor for mixer (‘motor5’) would not activate. If five selected

pins of parallel port sent to PIC as ‘17’, robot arm motors (‘motor6’) would activate. If five selected

pins of parallel port sent to PIC as ‘16’, robot arm motors (‘motor6’) would not activate. If five

selected pins of parallel port sent to PIC as ‘19’, conveyor2 motor (‘motor7’) would activate. If

five selected pins of parallel port sent to PIC as ‘18’, conveyor2 motor (‘motor7’) would not

activate. If five selected pins of parallel port sent to PIC as ‘21’, sewing motor (‘motor8’) would

activate. If five selected pins of parallel port sent to PIC as ‘20’, sewing motor (‘motor8’) would

not activate. It can be written:

if (motor1 == 0){

PortAccess.Out32(888, 8);

delay();

PortAccess.Out32(888, 0);

delay();

}

else{

PortAccess.Out32(888, 9);

delay();

PortAccess.Out32(888, 0);

delay();

}

Page 20: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

10 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Start

Sent to five pins for selected data of PIC as 1

Read from PIC to true condition for Pin

10,11,12,13&15 of parallel port

Read from PIC to true condition for Pin

10,11,12,13&15 of parallel port

Input other pages to set up

Sent to five pins for selected data of PIC as 21

Sent to five pins for selected data of PIC as 2

Read from PIC to true condition for Pin

10,11,12,13&15 of parallel port

Signal of pin2=0 ?

stop

Yes

No

Figure 4: Flow Chart of Input/Output System

Page 21: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

11 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

In the following program line, the input address are used 889 decimal numbers (379h).

inp = PortAccess.Inp32(889);

It includes the buttons as start, stop, instruction, hardware, and exit. Start/stop is used to true or

false for the output system. It can be written:

For Stop, PortAccess.SystemStart = false;

For Start, PortAccess.SystemStart = true;

The main form is activated about the following codes and set the output address as 888 decimal

numbers (378h);

PortAccess.Out32(888,0);

PortAccess.SystemStart = 0;

The error signal from the process activates every time. So it uses timer tool (tmr Error_Tick) to

watch this condition. If error signal from input/output system is true, it plays the

SystemSounds.Asterisk file in the computer for emergency sound and the back colour of error

button changes black and red alternatively. If it is false, the back colour of error button is green.

This system is always turns on. It is shown in Figure.5.

Start

Is tmrError true?

Signal of pin2=0

Is lblError backcolor

red?

lblError

backcolor is

red

lblError

backcolor is

green

Play

“SystemSounds.Asterisk”

file

lblError

backcolor is

Black

Stop

Yes

No

Yes

Yes

No

No

Figure 5 Flow Chart of Error System

The operation button (btOperation) is used to open the simulation dialog box (frmOperation) for

linking the real-time simulation process. It can be written:

Page 22: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

12 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

frmOperation f2= new frmOperation();

f2.Show();

And the hardware button (btHardware) is utilized to open the hardware dialog box (frmHardware)

for linking the whole process communication. It can be written:

frmHardware f3 = new frmHardware();

f3.Show();

The instruction button (btInstruction) is used to open the instruction dialog box (frmInstruction)

including user guide for SCADA based Natural Fertilizer Manufacturing Process. It can be written:

frmInstruction f1 = new frmInstruction();

f1.Show();

The exit button (btExit) is used for closing the system. It includes the message box depending with

the user’s decision.

if (MessageBox.Show("Are you sure want to Exit?","SCADA",

MessageBoxButtons.YesNo,MessageBoxIcon.Question) == System.

Windows.Forms.DialogResult.Yes) {

Application.Exit();

}

4.3 Designing Program for Monitoring of Operation Page

This page uses the monitoring of components on the form (frmOperation). The signal of real-time

monitoring for each device is get to display on the page by timer (timerIn_Tick) of main page.

So, each image is put on the form with picture box tool (imgName). Next, the text shows the

condition of running process and the stopping process displays on the form by the condition of

start button (low or high). It can be written:

If (PortAccess.SystemStart)

lbState.Text="Running Condition of Process";

else

lbState.Text="Stopping Condition of Process";

This system needs to test how the state of input pin is. So it uses timer tool from window

application to display the components. The monitoring of running conveyor is used with input

signal of timer tool (tmrConveyor_Tick) and it is shown in Figure.6. If the input signal of conveyor

gets from input timer, the condition of running conveyor will show with the changing of images

in the picture box on the form.

The signal of error is also used in the operation page. But the condition of error is shown by

changing the colour of error button on the form. The flow of programme equals the program of

above error. If the input pin (inError) is true, the color of error image (bnError) changes red and

black alternatively. If it is not true, it displays the green colour.

Page 23: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

13 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Start

Is tmrConveyor.Enabled

true ?

Are five selected pins of parallel

port equal to 9 ?

Is img1Conveyor true?

Stop

Yes

No

Yes

Yes

No

No

Display

img2Conveyor

Display

img1Conveyor

Figure 6: Flow Chart of Monitoring for Conveyor

The operation page includes four buttons. These are motor button, sensor button, counter button

and back button. The motor button (btMotor) is used to open the motor dialog box (frmMotor) for

linking the real-time simulation for running motors in the process. It can be written:

frmMotor f = new frmMotor();

f.Show();

The sensor button (btSensor) is utilized to open the sensor dialog box (frmSensor) for linking the

real-time conditions of sensors in the process. It can be written:

frmSensor f1 = new frmSensor();

f1.Show();

And the counter button (btCounter) is used to open the counter dialog box (frmCounter) for linking

the real-time number of bags finished overall packaging system in the process. It can be written:

frmCounter f2 = new frmCounter();

f2.Show();

Page 24: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

14 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Start

Are PortAccess.an1,an2 and

an3 true?

Is filling arrow color white?

Is signal of pin2

equal to 0?

Stop

Yes

No

Yes

Yes

No

No

Display filling arrow

color is yellow

Display filling

arrow color is

white

Figure 7: Flow Chart of Monitoring for Filling Process

Finally, the back button (btBack) for closing the system is used. It comes back to the main page.

In Figure.7, if weight sensor reached the specified weight level of tank1, the filling process would

occur. The filling arrow color changes white and yellow alternatively. If weight sensor reached the

specified weight level of tank2, the filling process would occur. The filling arrow color changed

white and yellow alternatively. If weight level reached the specified weight level of bag, the filling

process would occur. The filling arrow color changed white and yellow alternatively.

4.4 Implementation Program for Motor Page

This page is linked with the operation page to display the condition of motors included in the

system. It is used by pressing the motor button (btMotor) from the operation page. The back button

is used to back the operation page. The image for running motors has two images with design of

motor. This system uses timer tool (timerIn_Tick) to get signals from input ports. The input signals

of parallel port are used for mixing process (inMixer), transportion process (inConveyor1), filling

process in the tank1 (inFillingValve1), filling process in the tank2 (inFillingValve2), carrying

process (inConveyor2), filling process in the bag (inFillingValve3), the robot arm motors

(inRobotArm) and sewing process (inSewing).

Page 25: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

15 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Start

Are PortAccess.motors

true?

Is ImgMotor1 displaying

Is signal of pin 2

equal to 0?

Stop

Yes

No

Yes

Yes

No

No

Display ImgMotor2

Display ImgMotor1

Figure 8: Flow Chart of Monitoring for Running Motors System

All of images for motors are displayed at the images in the picture boxes. If the signal of all input

pins or each input pin is false, it displays the image of motor1 in each location of image as the

images of mixer motor, conveyor motor1, filling motor1, filling motor2, conveyor motor2, filling

motor3, robot arm motor and sewing motor (imgMixer, imgConveyor1, imgFM1, imgFM2,

imgFM3, imgConveyor2, imgRAMs and imgSewing).

If the signal of each input pin is true, it displays the image of motor1 and the image of motor2

alternatively. It is shown in Figure.8. So, each image is put on the form with picture box tool

(imgName). Next, the text shows the condition of running process and the stopping process

displays on the form by the condition of start button (low or high). It can be written:

If (PortAccess.SystemStart)

lbState.Text="Running Condition of Motors";

else

lbState.Text="Stopping Condition of Motors";

4.5 Implementation Program for Sensor Page

This page is linked with the operation page to display the condition of sensors included in the

system. It is used by pressing the sensor button (btSensor) form the operation page. The back

Page 26: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

16 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

button is used to go back the operation page. The image for the running sensors has two colours

with design of sensor. This system uses timer tool (timerIn_Tick) to get signals from input ports.

Start

Is PortAccess.an1,an2,an3,sw1

and sw2 true ?

Is signal of pin2

equal to 0?

Is backcolor green?

Stop

Yes

No

Yes

Yes

No

No

Display

Backcolor

green

Display

Backcolor

white

Display

Backcolor gray

Figure 9: Flow Chart of Monitoring for Sensors

The input signals of parallel port are simultaneously used for weight sensor1 (inFillingValve1),

weight sensor2 (inFillingValve2), weight sensor3, (inFillingValve3), position sensor1

(inRobotBase) and position sensor2 (inSewing). The image colors of sensor are displayed at the

images in the pictur box. If the signal of all input pins or each input pin is true, it displays the green

colour and gray color alternatively. If it is not, it displays the white colour image of sensor in each

location of image. It is shown in Figure.9.

So, each image is put on the form with picture box tool (imgName). Next, the text shows the

condition of running process and the stopping process displays on the form by the condition of

start button (low or high). It can be written:

If (PortAccess.SystemStart)

lbState.Text="Running Condition of Process";

else

lbState.Text="Stopping Condition of Process";

Page 27: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

17 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 10: Screenshot of Simulation Result of Operation Window (Mixing Process)

5 Simulation Result of SCADA Based Monitoring System

In SCADA based manufacturing process, parallel port pins are used to control the input and output

signal of hardware devices. And it is linked window application in the monitoring system. The

monitoring system includes main window which links other windows, operation windows which

links the device operations, motor operation window which is running by each state, counter

window which counts bags, sensor window which expresses the working condition of sensors,

hardware window which links the monitoring of hardware device sample and instruction window

which expresses as the user guide.

Page 28: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

18 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

5.1 Simulation Result of Operation Window

This window includes two portions. Figure.10 illustrates mixing process and filling process.

Figure.11 illustrates filling process and packaging process. This window is a main process to show

for overall process. And it includes four buttons- motor, sensor, counter and back.

On the window form, it is designed with working condition of the sample components for the real

devices of natural fertilizer manufacturing process by using their images of actual devices. It shows

the monitoring of changing or moving condition of sample components. It uses input/output signal

from main window for operation of device by using each signal. This window shows the amount

of weight level of tank1 and tank2. The back button is used to go back the main window like to

close the operation window. The motor button is utilized to display the running condition of motors

due to each input signal by linking with it. The sensor button is used to express the working

condition of sensors by linking with it. The counter window is used to display the number of bag.

Figure 11: Screenshot of Simulation Result of Packaging Window

5.2 Simulation Result of Hardware Window

It includes the hardware images like the components of SCADA based system. If the user clicks

the start button, the overall system will operate and the arrow will show on the form. It links with

the main page. The back button is used to go back the main window. It is shown in Figure.12.

5.3 Simulation Result of Sensor Window

This window shows the working conditions of sensor by changing the colors of sensor images. It

includes five sensors- weight sensor for Tank1, weight sensor for Tank2, weight sensor for bag,

position sensor1 and position sensor2.

Page 29: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

19 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

If the sensors get the signal from the input pins of parallel port, the changing color of sensor will

show green and gray alternatively on the form. It is linked with the operation window. Figure.13

shows simulation result of the sensor window. This window describes the weight level of tank1

(weight sensor1), the weight level of tank2 (weight sensor2) and the weight level of bag (weight

sensor3). The operator can see the amount of weight level. The back button is used to go back the

operation window.

Figure 12: Screenshot of Simulation Result of Hardware Window

5.4 Simulation Result of Motor Window

It includes eight motors- mixer motor, conveyor motor1, tank1 valve motor, tank2 valve motor,

mixer valve motor, robot arm motors (robot base motor, robot arm motor and robot gripper motor),

conveyor motor2 and sewing motor. This window shows the images of motor like the moving of

motors for the process.

If motors get the signal from the input pins of parallel port, the running condition of motors will

show in the form. It is linked with operation window. The back button is used to go back the

operation window. Figure.14 shows the screenshot of simulation result of the motor window.

Page 30: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

20 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 13: Screenshot of Simulation Result of Sensor Window

5.5 Simulation Result of Counter Window

This window shows the images of bag like the number of bags for the real-time manufacturing

process. It includes five bags for one cycle operation. It shows the number of bags which is packed

after it has filled at the real devices from hardware process. It is linked with the operation window.

The back button is used to go back the operation window. The operator can change the number of

bags per one cycle. Figure.15 shows the screenshot of simulation result of the counter window.

5.6 Simulation Result of Exit Window

This window shows the decision making for the user to run or stop of the current condition of the

overall system. It uses the message box including yes or no decision that is if it is yes, it will exit

from the monitoring system. If it is not, this process will continue the operation. It is shown in

Figure.16.

Page 31: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

21 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 14: Screenshot of Simulation Result of Motor Window

Figure 15: Screenshot of Simulation Result of Counter Window

Page 32: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Implementation of Real-Time SCADA-Based HCI Manufacturing Process

22 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 16: Screenshot of Simulation Result of Exit Window

6 Conclusion

In this work, a low cost data acquisition, processing and monitoring system based SCADA system

has successfully developed. And the simulating and monitoring for the Natural Fertilizer

Manufacturing Process use own programs without popular SCADA software. Communication

system uses parallel port and interfacing circuit (including optocouplers). Hardware unit for this

process is designed with the small I/O sample model and tested by connecting hardware and

computer. And then it can start/stop with using monitoring system and can see all of running state

for this manufacturing process. Although this system cannot use many devices that could be

monitored or controlled, this paper has shown a basic application of process control. All of the

equipment used in the demonstration meets the normal industry standards, and could be found in

automation systems around the world. Although this is a very small demonstration of the process

control compared to most industrial application, the processes and principles used for this paper

are still the same regardless of the size of the system.

References

[1] Jose Angel Gomez Gomez: “Survey of SCADA Systems and Visualization of a real

life process”, Sweden, (2000).

[2] Shwe Si Wa: “Natural Fertilizer Manufacturing Process”, Mandalay Technological

University, Myanmar, (2011).

[3] Hla Myo Tun: “Distributed Control System for Vehicle Spare Parts Manufacturing

Plant” (Real Time Graphical User Interface Monitoring and Neworking System),

Ph.D paper, (2008).

[4] John Sharp: “Microsoft Visual C# 2008 Step by Step”, by Microsoft Press,

Washington, (2009).

[5] Bradley-Millspaugh: “Programming in Visual C# 2008”, By McGraw-Hill Primis,

United States of America, (2009).

[6] Ronald L. Krutz, “Securing SCADA Systems”,Wiley Publishing Inc, Indianapolis,

Indiana, (2005)

Page 33: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

23 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Impact of Multimedia and Hypermedia Instruction on Teaching Basic

Electricity Technology: Case Study of Government Technical Colleges

in Oyo State, Nigeria

Muhammed Jebba Adamu1 Soji Aderemi Adedeji2

Abstract

This research was carried out to ascertain the impact of Multimedia and Hypermedia on teaching

Basic electricity technology subjects in Government Technical Colleges in Oyo Sate, Nigeria.

Quasi experimental design involving pretest, posttest, non-randomized comparison group was

used for the study. Two research questions and two hypotheses were raised to guide the study. A

total of one hundred (100) final year students of Electrical/Electronics Department from the five

Technical Colleges in Oyo State constitute the population of the study. Achievement test with 40

test items involving application of multimedia and hypermedia resources was used as the

instrument for data collection. The instrument was subjected to face and content validity by ICT

experts in Industrial and Technology Education. The reliability of the instrument was determined

using the Pearson Product Moment Correlation and the Correlation Coefficient was found to be

0.85, while the Kuder-Richardson (KR20) formula was used to determine the internal consistency

and the result obtained was 0.78. Mean and Standard Deviation were used to answer the research

questions while the Analysis of Covariance (ANCOVA) was employed to test the hypotheses that

guided the study. The findings from the study revealed that multimedia and hypermedia

instructions were effective in enhancing students’ achievement in Basic Electricity Technology.

The study also found out that there was a significant difference between the main effects of gender

(male and female) on students’ achievement in Basic Electricity. The study recommends for the

adoption of multimedia and hypermedia instructional resources and also advocate for training and

retraining of the teachers and students on effective utilization of multimedia and hypermedia

instructions resources.

Keywords: Multimedia Instruction, Hypermedia Instruction, Basic Electricity, Technical

Colleges, Nigeria

1 Introduction

Globally, the advent of information and communication technology (ICT) has been acknowledged

as one of the most remarkable and transformative technology experienced in different spheres of

human development, education inclusive. In the same vein, advancement in the present twenty-

first century has introduced diverse ICT tools which are responsible for the monumental and

radical transformation in the teaching and learning environment. This transformation is responsible

for the paradigm shift from the conventional talk and chalk method of learning to a more advanced

method of instruction which involves the use of a wide range of ICT tools. One of the most popular

1 Department of Electrical/Electronics, Niger State College of Education, Minna [email protected] 2 Technical Education Department, School of Vocational and Technical Education, Emmanuel Alayande College of

Education, Oyo [email protected]

Page 34: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

24 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

form of ICT tools presently used in the school system involves the use of instructional multimedia.

Instructional multimedia is the combination of two or more forms of media to enhance teaching

and learning effectively in the classroom [1]. Multimedia instruction has been defined as the use

of radio, tape recorder, slide, teaching machine, forms trips, firms, chart, maps, graphics, video

tapes recorders, slide protector, opaque, projector, overhead projector, still pictures, programmed

instruction, television, computer and many more [2]. These instructional multimedia resources

assist in great measures in disseminating information and communication towards teaching and

learning process both at home and in the school especially in a class with large number of students.

Instructional multimedia are vehicles through which instructions are disseminated to the learners

for the purpose of appealing to their senses of touching, seeing, hearing and feeling so that the

desired behavioural changes are achieved [3].

Consequently, instructional multimedia can be inferred as information carrier employed in the

classroom to teach the students and to display information relating to teaching and learning. The

above multimedia has been described as powerful possibilities for improving the learning process

which makes a difference in learners [4]. Further advancement in ICT lead to the development and

use of “superior” multimedia tools such as the hypermedia. In the teaching and learning

environment, hypermedia instructional resources includes online internet browsing, interactive

online transaction, email, e-payment, Facebook, Whatsapp, Twitter, Instagram, Website, You-

Tube, Skype, Imo and many more [5]. They are channel of passing and receiving information

which can be effectively adopted for teaching and learning in classroom situation. Thus, the use

of both the multimedia and hypermedia as innovative instructional approaches may permit learners

to dwell on the knowledge they have acquired while displaying their capacity in the educational

platform. At the end of the day, this innovative approach can improve the overall performance of

the students of Basic electricity in Nigeria Technical Colleges.

Basic electricity is one of the technology subjects offered at technical college in Nigeria. Basic

electricity curriculum content in technical college is designed to provide students with the

knowledge of the key concepts in basic electricity, to promote their understanding of the world

around them. The curriculum also aims at developing broad applicable of technical skills such as

problem solving, communication, critical thinking and objective reasoning abilities, to enable them

prepare for work place and self-sustainability in the world economy [6]. With these objectives of

the curriculum in mind, students are expected to be useful and productive members of the society.

Unfortunately, technical colleges’ students tend to fall short of these expectations due to improper

ways of teaching the subject at technical college. This trend has been attributed to basic electricity

teachers who solely rely on the traditional chalk and talk method of instruction at the expense of

the use of flexible innovative methods of instructions such the use of multimedia and hypermedia

instructions [7]. Thus, it is against this backdrop that this research attempts to investigate the

impact of using multimedia and hypermedia as a means of instructional delivery for basic

electricity students in technical colleges in Nigeria using Oyo State as a case study.

2 Statement of the Problem

The conventional method of instruction used in technical colleges in Nigeria remains the chalk

and talk method of instruction. This assertion is in line with the recent findings of [8], [9], [10] and

[11]. The studies revealed that the lecture method has been criticized for its weaknesses which

Page 35: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

25 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

includes the fact the it is not only teacher-centred but also lacks flexibility in terms of when, where

and how teaching and learning takes place beyond the confines of the classrooms and schools’

days. Thus, the present lecture method of instruction used in training the students of basic

electricity is not adequate in preparing them to contribute meaningfully to the technological

advancement of the nation. In addition to this sordid state of affairs, the performance of the students

at the end of their terminal examination is also alarming and discouraging as confirmed by National

Board for Technical and Business Examination Board. This dismal performance has been a major

source of concern for the country because of its severe consequences which is the non-attainment

of the much desired objective of training and producing competent technicians from technical

colleges in Nigeria.

However, in the light of the numerous flexible alternative means of teaching and learning using

ICT, it therefore becomes paramount for the teachers of basic electricity to exploit innovative

modern e-learning techniques such as the use of multimedia and hypermedia instructions. It is

anticipated that the use of innovative method of instruction such as that of multimedia and

hypermedia is not only capable of improving the students’ performance but it is also likely to

enhance the acquisition of adequate knowledge and skills in technology especially in basic

electricity.

Consequently, it is hoped that the use of multimedia and hypermedia instructional strategies in

teaching and learning basic electricity will bring about the required result. Hence, the problem of

this study posed as a question is: can multimedia and hypermedia instructions strategy produce

significant effect on the academic achievement of basic electricity students in technical colleges

in Nigeria?

3 Purpose of the Study

The purpose of the study is to determine the impact of multimedia and hypermedia instructional

resources on teaching basic electricity in Oyo state government technical colleges. Specifically,

the study determined:

The impact of multimedia and hypermedia instructional resources on students’ academic

achievement in basic electricity.

The impact of gender on academic achievement of students when taught basic electricity with

multimedia and hypermedia instructional resources.

4 Research Questions

Two research questions were raised for the study:

a. What is the impact of multimedia and hypermedia instructional resources on students’

academic achievement in basic electricity?

b. What is the impact of gender on academic achievement of students when taught basic

electricity with multimedia and hypermedia instructional resources?

Page 36: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

26 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

5 Hypotheses

The following null hypotheses were formulated and tested at .05 level of significance:

HO1: There is no significant difference in the mean achievement scores of students taught

basic electricity with multimedia and hypermedia instructional resources and those taught

with conventional method.

HO2: There is no significant mean difference between the effect of gender on students

achievement when taught basic electricity with multimedia and hypermedia instructional

resources.

6 Scope of the Study

The scope of the study will cover the Basic electricity technology contents which include

diagnosing and trouble shooting in the electronics gadget, electrical installation and maintenance,

appliance repairs, rewinding of transformer, assembling of electronics products such as radio,

television and many more. It will also cover all five (5) Oyo state government technical colleges

in the state namely Ibadan, Oyo, Ogbomosho, Iseyin and Saki where basic electricity technology

subjects are offered.

7 Methodology

The researchers adopted quasi-experimental research design for the study. The pre-test, post-test

non-equivalent control group design was used. The students were assigned into two groups

namely: experimental and control groups. The researchers randomly assigned intact classes to

treatment and control groups. This was necessary in order not to disrupt the normal classes of the

students and the school time-table. The use of intact class in a quasi-experimental design and this

kind of procedure could be utilized if it is not feasible for the researcher to randomly sample the

experimental subjects and allocate them to instructional teams without disruption of the normally

existing instructional schedule of the students and institutions [12].

The population of the study comprises one hundred (100) year three students offering electronics

technology subject in all the five Oyo state government technical colleges. Stratified random

sampling technique was used for the selection of seventy (70) males and thirty (30) females

students of Electrical/Electronics technology subject from year three students in order to have a

balance gender of inequality; the reason for choosing year three students was because of the

students interest in Electrical/Electronics technology subject as career option, their level of

seriousness and commitment to the subject. The population was proportionally selected, that is

fifty (50) students were used as experimental group while the remaining half of the population

were equally used as the control group. The instrument for data collection was an achievement test

titled impact of multimedia and hypermedia instruction test. The reliability of the instrument was

determined using the Pearson Product Moment Correlation and the Correlation Coefficient was

found to be 0.85, while the Kuder-Richardson (KR20) formula was used to determine the internal

consistency and the result obtained was 0.78. Mean and Standard Deviation were used to answer

Page 37: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

27 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

the research questions while the Analysis of Covariance (ANCOVA) was employed to test the

hypotheses that guided the study.

7.1 Lesson Plans

The researcher prepared two sets of lesson plan: one involves the use of instructional resources of

multimedia and hypermedia to teach basic electricity technology while the other lesson plan uses

the conventional method (without instructional resources). The lesson plans were given to two

experts in Electrical Technology to make their inputs and ensure conformity with the NBTE

guidelines. The researchers trained the electrical teachers on the use of this lesson plans. It gives

details of the instructional requirements for each platform as well as the instructional guide for the

students. Furthermore, the teachers’ activities as well as the students’ activities for each of the

platforms were also explained in the lesson plan.

7.2 Research Question 1

What is the impact of multimedia and hypermedia instructional resources on students’ academic

achievement in Basic Electricity?

Table 1: Pretest and Posttest Mean Scores of experimental and control groups

Group N Pretest Posttest Mean Gain

X X Experimental 50 22.63 28.73 6.1

Control 50 15.20 16.48 1.28

The data presented in Table 1 shows that the experimental group had a mean score of 22.63 in the

pretest and a mean score of 28.73 in the posttest, hence the pretest posttest mean gain of the

experimental group was 6.1. Meanwhile, the Control group had a mean score of 15.20 in the pretest

and a posttest mean of 16.48. Thus producing pretest posttest mean gain of 1.28. Since the mean

gain of the experimental group (6.1) was greater than the mean gain of the control group (1.28)

this result is an indication that the experimental group performed better than the control group.

Consequently, this result affirms that the experimental group that were taught with the multimedia

and hypermedia instructional resources performed better than the control group that were taught

through the conventional method.

7.3 Research Question 2

What is the impact of gender on academic achievement of students when taught basic electricity

with multimedia and hypermedia instructional resources?

Table 2: Pretest and Posttest mean scores of Male and Female Students Taught Basic Electricity with multimedia and hypermedia

instructional resources and those taught with the conventional method

Multimedia And Hypermedia

Instructional Resources

Conventional Method

Page 38: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

28 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Gender

N

Pretest

Posttest

Mean

Gain

X

N

Pretest

Posttest

Mean

Gain

X Male 70 21.84 28.65 6.81 70 22.27 28.73 6.46

Female 30 21.97 26.80 4.83 30 22.20 25.43 3.23

Table 2 shows that male students taught Basic Electricity with multimedia and hypermedia

instructional resources had a mean score of 21.84 in the pretest and a mean score of 28.65 in the

posttest making a pretest, posttest mean gain in the male students taught with multimedia and

hypermedia instructional resources to be 6.81. Female students taught Basic Electricity with

multimedia and hypermedia instructional resources had a mean score of 21.97 in the pretest and a

posttest mean of 26.80 with a pretest, posttest mean gain of 4.83. Male students taught with

conventional method had a mean score of 22.27 in the pretest and a mean score of 28.73 in the

posttest making a pretest, posttest mean gain in the male students taught with conventional method

to be 6.46. Meanwhile, female students taught Basic Electricity with conventional method had a

mean score of 22.20 in the pretest and a posttest mean of 25.43 hence with a pretest, posttest mean

gain of 3.23. With these results male students taught Basic Electricity had higher mean gain scores

than female students. Consequently, it can be affirmed that there is an effect attributable to gender

on the performance of students taught Basic Electricity.

7.4 Hypotheses

HO1: There is no significant difference in the mean achievement scores of students taught basic

electricity with multimedia and hypermedia instructional resources and those taught with

conventional method.

HO2: There is no significant mean difference between the effect of gender on students

achievement when taught basic electricity with multimedia and hypermedia instructional

resources.

Table 3: Summary of Analysis of Covariance (ANCOVA) for Test of Significance between the Mean Scores of Experimental and

Control groups in the Achievement Test and Effects of Gender on the treatments given to the Students

Source Sum of Squares df

Mean

Square F Sig.

Corrected Model 3742.034a 4 935.509 68.868 .000

Intercept 8036.005 1 8036.005 591.575 .000

Pretest 20.283 1 20.283 1.493 .224

Group 3178.541 1 3178.541 233.990* .000

Gender 42.978 1 42.978 3.674* .025

Group * Gender 4.111 1 4.111 1.002 .305

Error 316.443 279 3,786

Total 48999.000 284

Corrected Total 134.431 283

Page 39: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

29 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

7.5 *SIGNIFICANT AT SIG OF F< .05

The data presented in Table 3 shows F-calculated values for mean scores of experimental and

control groups in the achievement test and gender on students’ achievement in Basic Electricity.

The F-calculated value for Group is 233.990 with a significance of F at .000 which is less than .05.

The null-hypothesis is therefore rejected at .05 level of significance. With this result, there is a

significant difference between the mean achievement scores of students taught Basic Electricity

with multimedia and hypermedia instructional resources and those taught with conventional

method. The F-calculated value for gender is 3.674 with a significance of F at .025 which is less

than .05. This means that there is significant difference between the effects of Gender on students’

achievement in Basic Electricity. Therefore, the null hypothesis of no significant difference

between the effect of gender (male and female) on students’ achievement in Basic Electricity is

rejected at .05 level of significance.

8 Discussion of Findings

The answer to research question one was provided by the data presented in Table 1. The

information contained in the table revealed that the experimental group taught with Multimedia

and hypermedia instructional resources had higher post test mean scores than those taught with the

conventional method. Similarly, the analysis of covariance which was used to test the first

hypothesis (Table 3) also revealed that there was a statistically significant difference between the

effects of Multimedia and hypermedia instructional resources on the students’ achievement in

basic electricity.

The interpretation of this finding is that the use of Multimedia and hypermedia instructional

resources are more effective than the conventional method in terms of improving the students’

achievement in electrical technology. This concurs with the findings of similar researches

conducted by Aloraini (2012), Ibrahim (2003), and Adamu (2016). The researchers individually

investigates the effect of multimedia on academic achievement of students using and control

groups and their findings unanimously agreed that the experimental group taught with computer

instructional resources (such as those of multimedia and hypermedia) performed better than the

groups that were taught using the traditional method of instruction. The finding that multimedia

and hypermedia instructions are more effective in improving students’ achievement in learning

might not be unconnected with the fact that approach is a student-centered teaching method that

uses e- learning resources to facilitate information sharing outside the constraints of time and place

among a network of people. This assertion is in line with the view of Adamu (2016) that one of

the major element of the e-learning instruction is that teaching and learning process can take place

at different time and at different place, thus it allows students to schedule their learning activity at

their own time, place and pace. This finding is most likely attributable to the fact that the

multimedia and hypermedia tools and learning environments provide a high degree of interactivity

between the students and the course materials. The students can work either individually or in

group, they can review and study the course material again and again. They can review the task

assigned by the teacher at their own pace, time and at their own convenience.

Analysis of covariance was used to test the first hypothesis, table 3. The result shows that at the

calculated F value of 18.514 with a significance of .00 and confidence level of .05, there was a

Page 40: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

30 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

significance difference in the achievement of students. The interpretation of this result is that the

use of multimedia and hypermedia instructional resources are more effective than the conventional

approach in improving students’ achievement in Basic Electricity.

The answer to research question two was provided by the data presented in Table 2. The

information contained in the table revealed that male students had a higher mean score in the Basic

Electricity achievement test than female students. Similarly, the result of Analysis of covariance

from Table 3 shows that there was a significant difference between the main effects of gender

(male and female) on students’ achievement in Basic Electricity which confirmed that the

difference between the achievement of male and female students in Basic Electricity was

statistically significant favouring boys. The implication of this finding is that there was an effect

attributable to gender on achievement of students in Basic Electricity. The finding of this study

with respect to gender concurred with the findings of other similar studies that had been conducted

on gender effects on achievement of male and female students in sciences and other fields. For

instance, one of the important discoveries emerging from studies involving the effect of inquiry

based instructional approach on academic achievement was the revelation of gender differences

favouring boys[9] [15]. The findings of these studies revealed that disparity exists between male

and female students’ performance in sciences and other related fields, and in some cases boys had

an edge over girls in academic achievement. Generally, boys were consistently found to perform

better than girls on vocational and technical achievement tests suggesting that boys generally

possess greater vocational and technical skills than girls. Male advantages in vocational and

technical skills have been established in studies by [15] as well as [9]. According to these studies,

the trends of gender differences were found to be stable and consistent. Thus, in studies where

differences in achievement were evident males typically had stronger vocational and technical

skills than girls. Conclusively, it can be affirmed that the identified gender effect on achievement

in Basic Electricity was responsible for the significant gender effect found on students’

achievement in Basic Electricity. Thus, the superiority of male in vocational skills had been

responsible for their improved achievement in Basic Electricity. With these results male students

taught Basic Electricity had higher mean gain scores than female students. Consequently, it can be

affirmed that there is an effect attributable to gender on the performance of students taught Basic

Electricity with multimedia and hypermedia instructional resources [16] [17].

9 Conclusion

In the light of the availability of numerous flexible alternative means of teaching and learning

using ICT tools, it therefore becomes paramount for the teachers of basic electricity to exploit

innovative modern e-learning techniques such as the use of multimedia and hypermedia

instructions. It is against this backdrop that this study was carried out to determine the effect of

multimedia and hypermedia instructions resources on Government Technical College students’

achievement in Basic Electricity. The study found out that multimedia and hypermedia instructions

were effective in enhancing students’ achievement in Electrical Technology. The study also found

out that there was a significant difference between the main effects of gender (male and female)

on students’ achievement in Basic Electricity which confirmed that the difference between the

achievement of male and female students in Basic Electricity was statistically significant favouring

boys.

Page 41: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

31 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

These findings are confirmation of the fact that the use of innovative e-learning platform is a viable

teaching method which is not only capable of improving the student’ performance but it is also

capable of stimulating their interest in learning and above all, enhance their learning retention.

Conclusively, it therefore implies that adopting these instructional approaches in teaching and

learning is an assurance of producing competent, qualified graduates that will teach electrical

technology and also keep up with the rapid technological advancement in the field of Electrical

Technology.

10 Recommendations

The following recommendations were made based on the findings, discussions and conclusion:

The management of the institutions under study should adopt the use multimedia and

hypermedia instructions in teaching.

The management should mount capacity building programme for the teachers on the

use of the multimedia and hypermedia instructions resources.

The National Commission for Colleges of Education should develop appropriate

framework necessary for encouraging the adoption of innovative e-learning platform

such as that of synchronous and asynchronous instruction

The students should be taught how to use E-learning technologies such as multimedia

and hypermedia instructions.

The female students should be given special attention in terms of the use of ICT tools.

References

[1] J. A. Adewoyin, "Introduction to Educational Technology, Lagos, Nigeria", John-lad

Publisher Ltd, (2011).

[2] S.O. Aduwa, & A.I. Imogie, “Instructional Communication and Technology in Higher

Education” Published by Starting-Horden. Ibadan Publisher (Nig) Ltd, (2007).

[3] T.R. Tunde, “A comparative study of impact of instructional media in the teaching and

learning process in selected primary schools in Kogi State", Journal of Educational Media

and Technology, 17(1), 141-143, (2013).

[4] W.W. Brickman, Technical Education Microsoft Encarta (2006 CD). Redmond, W.A.

Microsoft Corporation, (2006).

[5] S. Carlson, & J. Firpo, “Integrating Computers into Teaching Findings from a 3 year

Programmed in 20 Developing Countries” in Larry R.Vander Nertetal (Eds). Lyber

Education: The Future of long Distance Learning, New York: Mary Ann Liebert, Inc. Pp 85-

144, (2009).

[6] Federal Republic of Nigeria, “National Policy on Education”, Yaba, Lagos NERDC Press,

(2013).

[7] K.E. Umunadi, “A Relational Study of Students’ Academic Achievement of Television

Technology in Technical Colleges in Delta States of Nigeria”, Journal of Industrial Teacher

Education, 46, 3, (2009).

[8] M. J. Adamu, “Comparative Effects of Synchronous and Asynchronous Instructional

Approaches on College of Education Students’ Achievement, Interest and Retention in

Page 42: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Impact of Multimedia and Hypermedia Instruction on Teaching Basic Electricity Technology: Case Study of

Government Technical Colleges in Oyo State, Nigeria

32 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Electrical Technology”, Unpublished Ph.D Dissertation, Federal University of Technology,

Minna, Nigeria, (2016).

[9] N. N. Umaru, “Effects of Cooperative Learning Instructional strategy on Basic Electricity

Students Achievement and Interest in Technical Colleges”, Unpublished Master’s Thesis,

Federal University of Technology, Minna, Nigeria, (2015).

[10] G. N. Langa, “Comparison of Students’ Performance on Guided Discovery and Conventional

Teaching Methods in Electrical/Electronic Equipment Fault Diagnosis in Colleges Of

Education (Technical) In North-Eastern Nigeria”, Unpublished Master’s thesis, Modibbo

Adama University of Technology, Yola, Nigeria, (2013).

[11] N. Udofia, & A. Udofia, “Project and E-learning Methods and Skills Acquisition in Electrical

Installation Works in Technical Colleges in Akwa Ibom State”, Academic Journal of

Interdisciplinary Studies, 2, 2, (2013).

[12] A. A. Sambo, “Research Methods in Education”. Ibadan, Nigeria: Stirling-horden publisher,

(2008).

[13] S. Aloraini, “The Impact of Using Multimedia on Students’ Achievement in the College of

Education at King Saud University”, Journal of King Saud University, 24, 75-82, (2012).

[14] W. M. Ibrahim, “The Effectiveness of Multimedia in Teaching Basic Computer to Collect

and the Survival of the Impact of Learning of Students at the College of Education Quality.”

Master, Egypt, (2003).

[15] A. Abu Yunis, “The Effectiveness of Multimedia Software for Teaching Engineering in the

Second row Preparatory”, Unpublished Ph.D. Dissertation, University of Damascus,

Damascus, (2005).

[16] S.O. Aduwa, “Instructional Communication and Technology in Higher Education”, Ibadan,

Starting-Horden Publisher (Nig) Ltd, (2005).

[17] A. I. Imogie, “Instructional Media Used by Faculty Members in Ahmadu Bello University:

A Case Study of Factors Related to Education Innovations in a Nigeria University Content”,

Unpublished Doctoral Dissertation, Michigan State University, (1997)

Page 43: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

33 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Upgrading the Computerized System for Teacher/Student Database in

Department of Electronic Engineering

Hla Myo Tun1 Zaw Min Naing2 Win Khaing Moe3 Maung Maung Latt4

Abstract

This work aims to illustrate how the computerized system is useful in economic and educational

fields and it can be mainly applied in the educational field practically and effectively. Nowadays,

in the economic field, for example super markets, new items are recorded by using the

computerized system. Online shopping is also popular and the process of recording items, sealing,

cashing are done with the aimed of computerized system. And also in the educational field,

teachers, subjects and students profiles can be stored in the computer by the head of the

departments and also student daily attendance can be recorded. At the end of the month, students’

monthly roll call percentage can be calculated. So, upgrading the computerized system for

teacher/student database is developed in this work. Based on the monthly percentage, the overall

percentage can be calculated for each student. Overall and monthly roll call percentage can be

stored exactly. Attendance can be checked and profiles would be displayed by the computerized

system. The monthly roll call percentage can be printed out as a report form. Recorded data can

also be updated by the authorized person in a short time and easily. The benefit of using upgrade

computerized system is saving time to make calculation and reducing careless manual mistakes.

For programming language, C# language is applied for this proposed system. To store data,

database file is already built. The results of Graphical User Interface (GUI) would be satisfied by

the performance and reliability of this system. This system can be used in any types of computers

without opening the source code because the proposed system is created as application software.

Keywords: Computerized System, Database, Attendance Evaluation, GUI, Application Software.

1 Introduction

Nowadays computerized system is very useful in economic and electronic fields and it can be

applied practically and effectively. In order to build a computerized system, programming

language, database file and a connection language to join database file and coding are essential

choice of the system. There are many programming languages such as C, C++, Java, C# and so

on. Each language has its own properties and methods. For this system, the C# programming

language is applied, it can make calculation and displaying data, and Microsoft Office Access 2003

is used as a database file (data container) for storing data. It can store data as user desire but it is

not possible to make calculation [1-6].

Therefore, Microsoft. JET. OLEDB.4.0 is necessary as a connection tool between programming

language and database. It can query the required data as user desire. This system is only a window

1 Department of Electronic Engineering, Yangon Technological University [email protected] 2 Department of Research and Innovation, Ministry of Education [email protected] 3 Department of Research and Innovation, Ministry of Education [email protected] 4 Technological University (Toungoo) [email protected]

Page 44: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

34 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

form so that it can be improved as a web base application. To develop the system, Active Sever

Page (ASP), popular language should be used. The main reason for choosing C# as a programming

language is that ASP can be written by C# easily and for a database, Microsoft Office Access 2003,

SQL (Structure Query Language), Excel or Oracle can be used as user required. A system can be

created as a user demand but it is very important to choose language for program to be compatible

with any type of electronic devices. To be a smoothly program is very important for user. C#

programming language is suddenly popular together with Java programming tool. C# is the

product of Microsoft Company. Visual studio can be run every language that every products of

Microsoft. C# is an objected oriented programming language (OOP) and then it can also be said

that component oriented programming language. So everything must be defined inside a class.

OOP is a non-procedural language and has the feature of inheritance, and polymorphism. It can be

used in Graphical User Interface (GUI), communication and multimedia. C# compile straight from

source code to executable code, with no object file. Although C# classes are similar to Java classes,

there are some important differences relating to constants, base classes, constructor and static

constructor.

Figure 1: Program and DBMS Sever Connection

A database system is not essential more than a computerized record keeping system. The database

itself can be regarded as a kind of electronic filing cabinet, that is, as a repository for a collection

of computerized data file-adding new (empty) file to the database, inserting row data into the

existing files, updating data into the existing file and removing existing files(empty or otherwise)

permanently from the data.

In most of the government schools, associated data and student attendance are recorded on the

paper. Roll call percentage is also calculated by manually. Not only time consumption is very large

but also it can have careless mistakes for recording and calculating. To avoid this problem,

computerized system is first introduced. By applying this system, associated profiles, daily

attendance and overall percentage can be recorded correctly and effectively. For the above reasons,

upgrading the computerized system for teachers and students database is proposed for my work.

This system explores approaches to implementing a temporal DBMS as a stratum on top of an

existing non-temporal DBMS, rendering implementation more feasible by reusing much of the

functionality of the underlying conventional DBMS [6-12].

The goal of this work is to apply the computerized system in the educational filed. In this work,

there are two main sections: profile and roll call. In profile section, it is collected at the start of the

academic year and displayed it as needed. In the roll call section, roll call attendance is recorded

day by day for each subjects and it is calculated at the end of the month automatically. This roll

call percentage (monthly and overall) can be displayed at any time, base on the roll call percentage,

to sit for examination chance is determined, and can print out it as a report form.

Page 45: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

35 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

2 Activex Data Objects (ADO)

ADO is a Microsoft’s object-oriented interface to databases and other similar sources of data. ADO

is intended to replace the Data Access Object (DAO) and Remote Data Object (RDO). ADO can

independently-create objects that command and recordset can be created without connection. ADO

used connection objects to represent an individual connection to data source. A connection can be

an actual network connection to database server or a connection to a local database file such as

those used by Microsoft Access.

The ADO library is a small, lightweight library that contains core objects and offers the basics for

making connections, issuing commands, and retrieving recordsets, and it also enables recordset

navigation. It can be used to perform basic maintenance tasks, such as modifying, adding, and

deleting records.

OLE DB providers help make ADO powerful. They offer a new way to access remote data that

embraces and extends ODBC, and they provide access to both relational databases and

untraditional data sources with a consistent ADO interface. Access 2000 ships with a variety of

OLE DB providers, including ones for Jet, SQL Server, Oracle and general ODBC data sources.

A. Exploring ADO

ActiveX Data Objects (ADO) is another API for developing applications that can access

OLE DB data providers. ADO is supported in several different programming languages,

including Visual Basic, Visual C++, VB Script, Visual J#, and in Active Server Pages.

While using the OLE DB directly provides a very low-level approach to accessing OLE

DB providers, ADO provides a higher-level, easier-to understand mechanism. ADO is

specifically designed for client/server application development, and because ADO can be

used from the VBScript, it is also well-suited for server-side Web/database integration.

B. ADO Objects

ADO interface is based on a collection of objects. ADO objects are not as dependent on

the object hierarchy. ADO is comprised of the following objects: , Connection, Error, Field,

Parameter and Recordset.

All of the ADO objects except for the Error and Field objects can be created independently.

In most cases, it can be simply created and used only the objects it is needed to work with

the following object classes make up the bulk of the ADO interface:

C. Using ODBC and OLE DB

The Open Database Connectivity (ODBC) interface is an industry standard and a

component of Microsoft Windows Open Services Architecture (WOSA). The ODBC

interface enables application to access data from a variety of database management system

(DBMSs). The ODBC interface permits maximum interoperability - an application can

access data in diverse DBMSs through a single interface. Furthermore, that application is

Page 46: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

36 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

independent of any DBMS from which it accesses data. Users of the application can add

software components called drivers, which create an interface between an application and

a specific DBMS.

Table 1: Names and Description of ADO Classes

Class Description

Connection Used to represent a connection to a data source, as well as to handle some

commands and transactions.

Command Used to work with commands sent to the data source.7

Recordset Used to work with a tabular set of data, including fetching and modifying data.

Field Used to represent information about a column in a recordset, including the values

for the column, as well as information.

Parameter Used to pass data to and from commands that are sent to the data source.

Error Used to retrieve more specific information about errors that may occur

Figure 2: ADO Object Hierarchy

While the primary focus of ODBC is to provide a consistent interface to database data

sources. OLE DB is designed with an even broader goal in mind: to provide a methodology

to access data regardless of the data source. OLE DB becomes the data access bridge for

Page 47: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

37 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

documents, e-mail systems, file systems, spreadsheets, Component Object Model (COM)

components, and other database sources that utilize ODBC drivers.

3 System Design

In the proposed upgrade computerized system, there are three main sections. They are listed as

followed: Data collection section, Data saving section and Data displaying section. Login section

is a gate of the system and it can also be said that it is security of the system. This is the limitation

of user number because this system can be applied after enter the user name, password and login

password.

Figure 3: Overall Block Diagram of the System

A. Flowchart of the System

The system can be seen clearly by showing the flow chart of each program. The flow chart

of the user login form and change password form are illustrated as follow. If user inputs

the user name or password or confirm password wrongly more than three times, the login

program will exit from the system.

The flow charts of recording the profile, updating the profile, deleting the profile,

displaying the profile, recording daily attendance, displaying of roll call percentage and

printing of the monthly roll call percentage for report are illustrated as followed. Fig. 5

illustrates the flow chart for the multi choice program of the system. In the system, there

are six main sections, profile recording, profile deleting, profile updating, profile searching,

roll call recording and table cleaning. Each function will be done depends on the user

choice. This is only a describing of which function can be done. The associated

implementation of each function will be done when it is selected. System flow can be seen

clearly by showing the flow chart.

Page 48: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

38 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

B. Profile Recording

Flow chart of Fig.6 illustrate for the profiles recording. There are three profiles: teacher,

student and subject. So which profile will be recorded must be selected by the user. After

choosing the profile to record, associated data is needed to fill to record in a database table.

Figure 4: User Login Form of the System

The connection statements for inserting data are

public String connection= “provider= Microsoft. JET.OLEDB. 4.0; Data

Source=D:\\Student.mdb”;

OleDbConnection connect=new OleDbConnection(connection);

connect.Open( );

String command=“INSERT INTO Teacher Profile VALUES (“ME-EcE-10”, ”Ma

Ma”, ”Phone No”,……………..)”;

OleDbCommand command=new OleDbCommand();

command.Connection=connect;

command.Command Type= Command Type.Text;

command.Execute Non Query ();

connect.Close( );

Page 49: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

39 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

C. Profile Search

For a user, it is needed to review the profiles recorded from the previous. The searching

step of the program is described by using the flow chart of Fig.7. Firstly, user needs to

choice the profile that the user wants to search. And then, data needed to search from the

selected profile is inputted by the user. The next step is to compare the inputted data and

data from the table. If they are the same, the searched data will be displayed. If not, it will

message to the user that the input data is not included in the table and then it will go to the

input data stage.

Figure 5: Flowchart of the Multi Choice Program

Figure 6: Flowchart of the Profile Recording

Page 50: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

40 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 7: Flowchart of the Profile Searching

Finally, program will be ended. This process is a retrieving data from the table but this is

only the displaying of user desire data. For each looping method is applied to print out the

retrieved data. The source codes of the searched profile are as follow.

Public String connection=“provider=Microsoft.JET.OLEDB.4.0;

DataSource=D:\\Student.mdb”;

OleDbConnection connect=new OleDbConnection(connection);

connect.Open();

String command=“SELECT * FROM TeacherProfile”;

OleDbDataAdapter adap=newOleDbDataAdapter(command,connection);

DataSet ds=new DataSet();

Adpt.Fill(ds,”TeacherProfile”);

DataTable dt=new DataTable();

dt=ds.Table[0];

Foreach(DataRow r in dt.Rows){

Console. Write Line (r[0]+r[1]+……………);

}

D. Profile Update

Profile updating is needed to prepare the existing wrong data. It is very important that

which profile, columns and row will be updated. If the teacher profile is choose, updating

can only be done in this profile.

Page 51: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

41 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 8: Flowchart of the Profile Update

This step is limitation of the profile to update. After selecting the profile, input the data to

update. The row and column to update must be confirmed in the source code. The command

statements of updating process are listed as follow:

Public String connection=“provider=Microsoft.JET.OLEDB.4.0; DataSource=

D:\\ Student mdb”;

OleDbConnection connect=new OleDbConnection(connection)

connect.Open();

String command = “UPDATE TeacherProile SET Name=‘Ma Ma’ WHERE

ID=‘Tec002’”;

OleDbCommand command=new OleDbCommand();

command.Connection=connect;

command.CommandType=CommandType.Text;

command.ExecuteNonQuery();

connect.Close();

E. Profile Delete

For the teacher, it is needed to delete when the teacher is transferred or out from the school.

Student profile is also required to delete when the student is out. And then, for a subject, it

will be needed to delete when the course is changed. For the above reason, deleting process

must be included in this system. Firstly, profile must be choice and then input data to delete.

If the inputted data is already exit in the table, it will delete easily. If the data is not

contained in the table, it will go to the inputting stage. Fig.9. illustrate the deleting step of

the system. The connection statements of the delete process are as follow.

Page 52: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

42 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Public String connection=“provider=Microsoft.JET.OLEDB.4.0;

DataSource=D:\\Student.mdb”;

OleDbConnection connect=new OleDbConnection(connection);

connect.Open();

String command=“DELETE FROM TeacherProfile where ID=‘Tec01’;

OleDbCommand command=new OleDbCommand();

command.Connection=connect;

command.CommandType=CommandType.Text;

command.ExecuteNonQuery()

connect.Close();

Figure 9: Flowchart of the Profile Delete

F. Roll Call Attendance

For the daily roll call recording, it is needed to take attendance of each student in a class

and it is usually taken at the start or at the end of the class for each subject. Student name,

roll_no, subject name, period and date are recorded into the student roll call database table

for a period, one table for one subject. If there is error in roll call recording, the monthly

and overall roll call percentage will be changed because the calculated percentages are

based on the roll call attendance. Attendance must be recorded carefully because roll call

percentage is concerned with sitting for the exam for each student. Students’ daily

attendance for one subject can be seen clearly by showing the flowchart of Fig.10.

Page 53: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

43 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

The flowchart of Fig.11 explains how the overall and monthly roll call percentage will be

displayed. The roll call percentage can be displayed in two styles. Firstly, select the roll_no

of a student to show the overall roll call percentage for each subject. Secondly, the monthly

roll call percentage of all students for one subject can be displayed for each month. This

system also included the printing process. So that monthly roll call percentage can also be

print out as a report form.

Figure 10: Flowchart of the Roll Call Recording

Figure 11: Flowchart of the Roll Call Percentage Displaying

Page 54: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

44 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

G. Data Cancel Form the Table

Tables are needed to clear at the start of the academic year because the profile and roll call

are recorded in the last year. The data can be cleared one by one but it will take too long.

In the table clearing process, there are two choices: profile and roll call. In profile section,

there are three types: teacher, student and subject. If there are many errors in recording

process, table clearing is more suitable than updating the error data. In the following flow

chart, there are two user choices. Based on the selection, tables will be deleted.

Figure 12: Flowchart of the Clearing Table

4 Results and Discussions

A. Login Form of the System

Login form is the main entry of the system. To use this system, user has to fill the user

name, password and confirm correctly. Changing password can also be done. The function

of the login button is to compare the inputted username, password and confirm password

with is username, password and confirm password existing in the database table. If the

compare data are matched, the home page of the system will be displayed. If inputted data

is error, the message box will be displayed. The system will exit if the user inputs the wrong

user name or password or confirm password. Fig.13 illustrates the login form of the system.

Page 55: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

45 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 13: Login Form of the System

If the user wants to change the password and confirm password, click the change password

button. The following figure will be displayed.

It first requests the old user name, old password and old confirm password. And then, user

needs to fill the new user name, password and confirm password. The new data will be

replaced in the old data of the password table.

After changing the username, password and confirm password, it will go to the login form

of the system. The user needs to fill the new username, new password and new confirm

password. If the inputted data are matched with the data in the password table, home page

of the system will be displayed automatically.

Figure 14: Username and Password Changing Form

B. Home Page of the System

This is upgrading the computerized system and the user can use the Goto button to display

the creation part of the system. Fig.15 is only the display of university name and figure of

the university. It describes the entering of the second home page of the system.

Page 56: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

46 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 15: Home Page of the System

C. Multiple Choice of the System

At the start of the system, the multiple choice form shown in Fig.16 will be displayed.

There are seven main parts: new profile, search profile, deletes profile, update profile and

record roll call, monthly report and roll call percentage.

Figure 16: Multiple Choice of the Program

D. New Profiles Recording

Three profiles are included in this system. They are teacher profile, student profile and

subject profile. At the start of the academic year, authorized person of the department have

to record the profiles after collecting associated data. Profile recording is very important

for the universities or other schools because profiles must be used from the start of the year

to the end.

Page 57: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

47 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 17: Teacher Profile Recording Process

Fig.17 will display the graphical user interface of teacher profile recording process. In this

page, the recorded teacher profiles will be displayed by using data grid view or table.

“Brower” button is used for photo choosing. The function of this button is to go to the

photos existing directory (D:\\PhotoSever\\...............) without user effort. After filling the

required data such as ID, name, NRC, degree, address, phone number and gender, click the

“Record” button. If some data are missed to fill, a message box will be displayed for the

error. If all data are completed to fill, record the teacher’s associated profile into the

database file and then already recording message box will be displayed. The program will

go to the multiple choice page if the user clicked the cancel button.

Figure 18: Student Profile Recording Process

Page 58: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

48 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Student profile recording is an essential part of the system. This profile must be used in the

whole academic year such as in taking the student attendance, for paying the school fees,

to out the exam result, to declare the over all roll call percentage and so on. Firstly the user

has to fill the associated student profile such batch, intake year, name, roll_no, NRC, father

name, phone number, address, photo and commands. The photo can be get by clicking the

Browser button because it will show where the photo exit. After filling the required data,

click the “Record” button to save the data into the student profile table existing in the

database file. When the student recording part is finished, click the “Cancel” button to go

back to the multi choice page. The detail of student profile recording process is described

in Fig.18.

This is last section of the recording process. The different between subject recording part

and other two parts is that Fig.19 does not contain the Browser button and no need to collect

images.

The function of “Record” button is to save the filled data into the database file. To complete

the recording process, required data must be filled. There are six data about the subject.

They are number, code number, subject name, subject short name, number of chapters and

teacher name who teaches this subject. The function of “Cancel” button is the same with

the above two recording processes (teachers and students).

Figure 19: Subject Profile Recording Process

The conclusion of the recording process is saving data to the associated database file.

Profile saving is the first step of the process because user can retrieve profiles when the

data is already saved in the table. Search profile, delete profile and update profile processes

could be done after recording process.

Page 59: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

49 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

E. Searching Process of Recorded Profile

When the user wants to know about the teacher in the department, the student list in each

class and the subjects for an academic year, it is needed to search the profiles. The

programmer has to decide how to search the profiles. What is the best way? The searching

profile method can be different such as teacher profile is searched by ID, student profile

can be searched by roll_no and then subject profile can be search by code number. Fig.20

shows the teacher profile searching process of the system.

Figure 20: Teacher Profile Searching Process

There are three option buttons: “Teacher”, “Student” and “Subject”. If the user clicks the

“Teacher” option button, Fig.20 will be displayed. Teacher profile can be searched by the

ID. All the recorded teachers will be shown in the table and its ID will be listed in the

combo box. The user has to select one ID that wanted to know. Its associated data will be

displayed separately. The displaying data can be changed when the user change the selected

ID. The function of the exit button is to go to the multi choice of the system. This is the

less use part of the system.

Fig.21 illustrates the student profile searching process. In this part the user searches the

profile by using roll_no of each student. All of the students will be displayed in the (data

grid view) table. As a result students in the class can be viewed by the user. If the user

wants to know one by one, select the roll_no from the combo box existing in this GUI. The

data corresponds to the selected roll_no will be displayed clearly. The user can go back to

the multi choice of the system by click the Exit button.

Page 60: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

50 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 21: Subject Profile Searching Process

The last searching process of the system is subject profile. This is the less use of the

searching part because it does not look like human profile. Student profile is the most used

process of the system in taking roll call, displaying roll call result and so on. Fig.22 displays

the searching process of subject profile.

Figure 22: Searching Process of the Subject Profile

All subjects already stored in the database file will be shown by clicking the student option

button and then all subjects’ code number will also be in the combo box simultaneously.

Only one subject can be search by choosing one code number that user want to know. As

a result, data corresponds to the selected code number will be displayed. The user can use

the “Exit” button to go back to the start of the program. The function of this button is the

same with the above two searching process (teachers and students).

Page 61: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

51 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

The result is shown in Fig.22. Searching process is showing of all data from each profile

and selecting of each data from the profile form the database table with the aim of GUI.

This process is used to view something about profiles as user likes.

F. Update Process of the System

In profile recording, user can record some error data into the database file carelessly. It is

necessary to use the this process to update (to change) data from the table of associated

database file (teacher table, student table and subject table) and it is depend on the user

desire. The user has to decide which profile user want to update. All processes will be done

separately. Each updating process will be displayed with the respective graphical user

interface as shown in Fig.23.

Figure 23: Initial Update Process of the System

In this page there are three option types, teacher, student and subject, to change or to update.

There is also an “Exit” button to back to the multi choice of the system. This button can be

used for all three types. If the user clicks the teacher profile button, its associated database

table will be connected and all ID will be added to the combo box. After choosing one ID

from this box, it associated data will be displayed clearly.

For example, user needs to update (change) the phone number. This initial number is 09-91044020. The user wants to change it to 09-91040220. After preparing 09-91044020 to 09-91040220, click the “Update” button.

When “Student” option button is selected, students’ roll_no will be added into the combo box. Select the one roll_no from this box and as a result, its associated data will be displayed as shown in Fig.26. After preparing the new data to update, click the “Update” button to complete the update section. In Fig.26, the user changes father name.

The new data will be replaced to it initial state in the update process. Only one roll can be update at a time but two or more data can be updated at the same time.

Page 62: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

52 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 24: Displaying Profile before Update

Figure 25: Displaying Profile after Update

After replacing the updated data, the new recorded data in the table will be displayed and after that the message box will be showed. The function of “Cancel” button is to clear the displaying data in each text box. To update next student, select one roll_no from the combo box. If the user clicks the “Exit” button, it will go to the multi choice page of the system. Fig.27 displays the update process of student data.

When the user selects “Subject” radio button, code_no of each subject will also be added to the combo box. Based on the selected data from the combo box, its associated data is displayed in each textfield. This is a retrieving of data from the database table.

Updating is inserting of renew data into the database table. Fig.29 is displaying of finished update condition with a message box.

Page 63: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

53 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

G. Delete Process of the System

This process is deleting of data from the database table. In this process one or more profiles can be deleted but not at the same time. All profiles for each part (teacher, student and subject) can be deleted at the same time. In this process, the profile from the database table will be deleted one by one because the profile to be deleted is choice by the user from the `combo box. The present data in the box can be select one data at a time. Which profiles will be deleted? It is depends on the user. There are three choice profiles: teacher profile, student profile and subject profile. The initial state is choosing profile to delete. The choosing state is shown in Fig.30.

If teacher profile is selected to delete, its ID will be added to the combo box by using the add method. After selecting one ID from this box, its associated name and degree will be displayed as shown in Fig.31. By clicking the “Delete” button, the selected ID and its data will be clear from the database table. Initial state will be displayed if the user clicks the “Cancel” button.

Its ID will also be cleared from the combo box because data adding to this box is refreshed after clicking the Delete button. The graphical interface of teacher profile is shown in Fig.32.

Student profile delete step will be the same with the above process. When the user chooses the student option button, all the students’ roll_no will be added to the combo box. As soon as the user selected one roll_no from this box, its associated name will be displayed in the textfiled as show Fig.33. The function of "Delete" button is to cancel one row that the user selected to delete.

There are four steps of deleting process. Firstly the user selected roll_no is assigned to a string variable. The second step of this process is to read roll_no from the database of student table and add to the array list.

Comparing the user selected roll_no and number from the array list is the third step of the process. The final step is to delete the same roll_no from the database table. Only the final result can be seen by using the graphical user interface. The conditions before deleting and during deleting are illustrated as followed.

Page 64: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

54 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Fig

ure

26:

Stu

den

t D

ata

Dis

pla

yin

g b

efo

re U

pd

ate

Fig

ure

27:

Stu

den

t D

ata

Dis

pla

yin

g a

fter

New

Dat

a U

pd

ate

Fig

ure

28:

Su

bje

ct D

ata

bef

ore

Up

dat

ing

Fig

ure

29:

Su

bje

ct D

ata

afte

r U

pdat

e

Page 65: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

55 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Fig

ure

30:

Init

ial

Ste

p o

f D

elet

e P

roce

ss

Fig

ure

31:

Tea

cher

Pro

file

Del

ete

Fig

ure

32:

Tea

cher

Pro

file

aft

er D

elet

e

Fig

ure

33:

Stu

den

t P

rofi

le D

uri

ng D

elet

e

Page 66: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

56 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 34: Student Profile after Delete

H. Roll Call Program of the System

Roll call is main part of the system. The above programs are no need to use daily. Profile

recording will be applied at the start of the academic year and sometime during the year.

Other processes such ad delete, search and update process are also apply less.

Figure 35: Daily Roll Call Recording Form

Student attendance is taking everyday expect weekends. Roll call recording process is used

four or five times in a day, it is depends on the time table of the class. Teachers teach in

this class have to use this program because they have to record attendance when the teacher

teaches in this class. At the end of the month, roll call attendance of each subject has to be

calculated for each student and also overall roll call percentage. Roll call calculating is also

included in this system. It will be calculated at the end of the month automatically and

monthly roll call percentage and overall percentage are saved in the database file. The user

Page 67: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

57 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

can display the result for each month. The roll call recording form will be explained with

the aim of graphical user interface (GUI).

After selecting the roll_no of a student, its name and photo is displayed as shown in Fig.35.

The teacher has to select the subject name from the combo box. This step is very important

because it is created one table for one subject. If the teacher selects the subject name with

error, the student attendance will be saved to the database file as the user selected subject

table. The teacher also need to fill the number of total periods such as 2 or 3 or 4, it is

depends on the time table and also fill the attendance periods. If the teacher clicks the

“Insert” button, student attendance (present or absent), subject name, period and date are

saved to the associated database table. Attendance saving table will be changed

corresponds to the subject name. If the teacher clicks the “Cancel” button this page will be

hide and multi choice of the system will be displayed.

From the following GUI, select the intake year, batch_no, month and subject name and

then click the “Search” button to show the monthly percentage of all students. Roll call

result displaying will be explained. If the user clicks the “print” icon, the monthly roll call

percentage will be printed out.

Figure 36: Overall Roll Call Percentage Displaying

I. Printing Section

The monthly roll call percentages for all students are needed to print as a report form, one

report form for one subject. In this report form, student name, roll_no, attendance, absent,

total period and roll call percentage are described. The preview report form of the system

is shown in Fig.37.

Page 68: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

58 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 37: Print Preview Form of the System

In Fig.37, the user needs to choose the subject and month and then click the show result

button to get the required report form. In one page, only 46 students can be included and if

number of students is greater than 46, new page will be created automatically.

J. Clear Data from Table

At the beginning of an academic year, user has to record the new data, teacher profile,

student profile, subject profile and roll call attendance. So that it is needed to clear the data

that was recorded in the last academic year. If the user record profiles with many errors,

profile table deleting is more suitable than updating the error one by one. This system

supports the table clearing process with two sections: profile and roll call. In profile section,

user needs to select the profile table because each table are stand independently. For the

roll call section, it will delete all tables about the roll call. The main reason is that they have

relationship with table, for example, monthly percentage table is based on the daily

attendance table.

5 Conclusion

Microsoft Office Access 2003 is applied to create the database file to store the required

data for the system. The connection tool to connect both the source code and database file is

Microsoft.JET.OLEDB.4.0. There are many connection tools such as SQL (Structure Query

Language), ODBC (Open Database Connectivity), Microsoft.JET.OLEDB.4.0 and so on. The

command statements of SQL are more powerful than other two connection languages (ODBC and

OLEDB) so that it is very useful in online systems and hyper markets. The power of connection

for both ODBC and OLEDB are similar but there are some different in connection to the database

file. These two connection tools are applied in applications software that are not connected to the

online severs. Database Management System (DBMS) are responsible for the storage and

processing of huge amount of information. The data stored by the database system refers to

Page 69: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Upgrading the Computerized System for Teacher/Student Database in Department of Electronic Engineering

59 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

information valid at present time. Nowadays computerized system has been popularize and

developed in every electronic area. In the system, the profiles (teacher, student and subject) can be

not only stored in a database file exactly and clearly but also reviewed the recorded profiles as

required. In addition, updated and deleted processes can also be performed easily in a short time.

For roll call section, the daily roll call attendance of each student can be stored. And then, the

monthly and overall percentage will automatically be calculated based on the everyday attendance.

The calculated roll calls percentage for monthly and overall can be displayed. And then, the

monthly roll call percentage can be printed out as a report .form. By applying the computerized

system in roll call calculation, careless mistake by manual can be avoided. This system is created

as an application form (exe file) so that this system can be used on any type of computers

neglecting the Dot Net Frame Word supported by the computer. The Graphical User Interface

(GUI) results will be satisfied that the system is effective.

Acknowledgement

I would wish to acknowledge the many colleagues at Mandalay Technological University who

have contributed to the development of this paper. In particular, I would like to thank Myat Su

Nwe, my wife, Thet Htar Swe, my daughter, and Zay Yar Tun, my son, for their complete support.

References

[1] J.Clifford and G.Ariav, Temporal data management: models and systems, United States

of America, Nov, (2010)

[2] Ken Arnold, James Gosling, and David Holmes, The C# Programming Language, 4th

ed., Mezzovico, Switzerland, (2004)

[3] Nwana and H.S, Software Agents and Knowledge Engineering Review, Vol.11, No.3,

205- 221, Cambridge University Press, (2004)

[4] Robert Lafore, Object Oriented Programming in C#, 4th ed.,Sams Publishing, USA, (2002)

[5] Connolly and Thomas. M, Database System in the Relational Environment, Addison

Wesley, (2002)

[6] ROBERT W.SEBESTA, Concept of Programming Language, 4th ed., University of

Colorado, Colorado Springs, (2001)

[7] J. Gray and A. Bosworth, Database Programming of ActixeX Data Model, Agent

Technology-Green Paper Version 1, (1999)

[8] M. Wooldridge and N.R Jennings, System Development, Central Academy in Japan, (1998)

[9] B.J.Grosz and R.Davis, Open Database Connectivity, Theory and Practice, The

Knowledge Engineering Rewiev, (1995), pp.115-132

[10] C.J.Date and S.Johnson, An Introduction to Database System, 7th ed., Berlin,

Germany, (1994)

[11] Ahn, SQL+T: A Temporal Query Language. Proceedings of the Infrastructure for

Temporal Database, Arlington, (1993)

[12] Clifford, J. and Croker, A. The Historical Relational Data Model (HRDM),

Communications and Data Engineering. IEEE Computer Society Press, (1986)

Page 70: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

60 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Planned Future Internet Infrastructure: A Plot Model for Higher

Education Institution

Adnan Ahmed1 Syed Asif Ali2 Basit Hassan3

Abstract

Nowadays Higher Education Institutions (HEI) are very dependent on their networks because of

communication development, and for achieving this objective a proper infrastructure is required.

Security is the main and progressive condition to maintain and update information of any Higher

Education Institution. This research work proposes Future Internet Infrastructure (FII) and related

security issues. This research is conducted on a public-sector university of Karachi, Pakistan. The

main purpose of taking the example of Education Institution is that in an education environment

usually, multi-discipline users and this is an observed practice that the users in HEI increase

gradually. Therefore, the flow of data is increased in term of their users. A proper internet

infrastructure is required to maintain all data with a security concern. The university which is the

part of our case study is an multi-campus institution. Its network works on technical concepts such

as, planning and designing of network infrastructure which control whole network infrastructure,

Cloud, Social Media safety policy, risk analysis for network security, network security policy on

advanced networking concepts. The existing system in university has some challenges in overall

IT structure. The overall infrastructure needs advanced concept and physical facilities

(authorization of the transaction, user authentication, encryption of data, planning of backup

policies, disaster recovery plan and physical security strategies with application security policy,

emails and website security, etc.).

KEYWORDs: Higher Education Institutions (HEI), Network Security Policy (NSP), Future

Internet Infrastructure (FII), Internet Infrastructure Security (IIS) and Planned Future Internet

Infrastructure (PFII).

1 Introduction

Many IT infrastructure-related securities belong with new and advanced threats and very risky for

the whole organization. It can damage the entire network of an organization and can fail the overall

working of the network system. The network has been changed from simple LAN, MAN, WAN

to wireless LAN, Wireless MAN, Wireless WAN. The latest Computer Crime and Security Survey

of the Computer Security Institute (CSI) [1] report that 49% of the respondents faced IT security

incidents due to the actions of legitimate users.

Wireless networks have been in widespread used since few years [2]. Smartphones and handheld

technologies are being used instead of desktops. Demand for wireless services are increasing

1 Sindh Madressatul Islam University, Karachi, Sindh Pakistan [email protected] 2 Sindh Madressatul Islam University, Karachi, Sindh Pakistan [email protected] 3 Sindh Madressatul Islam University, Karachi, Sindh Pakistan [email protected]

Page 71: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

61 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

rapidly as evident by the tremendous growth in recent years in smart mobile phones [3], for

instance, smartphones have changed the way of doing the job. Users prefer to connect via

smartphones using 3G, 4G technologies or wireless networks. The usage of social networking has

also raised and cloud computing has changed networking. In the last decade, many online social

networks, such as Facebook, Twitter, and LinkedIn, have emerged and connected web users all

over the world [4]. Schools and universities are taking benefit of the recent development in

Information and Communication Technology (ICT) embracing Online Learning Resources (OLR)

as an integral part of teaching and learning activities [5].

As this research focuses on Higher Education Institution, the number of students increase each

semester wise, which are bulk users of the higher educational institute. They interact with other

students and staff through digital social media network. As per the record, 25 million users are

registered from Pakistan and out 25 million 19% are belonged to Karachi [6]. Due to the

implementation of 3G in all over the world, the usage of YouTube has also increased but the

security privilege is the lesser on social networks [7].

2 Research Background

Developments in information technology infrastructure during the past decades have exact to

logical changes in the modern society. For instance, organizations are adopting several new

technologies, deploying their own devices at work, use of social networking, and use of wireless

based networking environment [8]. It opened many complications; however, cybercrimes turn into

organized and broadly equipped, resulted in battle amongst hackers and security administrators.

Hackers are trying to break the network security, attacking IT infrastructure through browsers and

add-on software [9]. It’s opening to sort IT infrastructure secure and protected through Cabinet

Servers, deployment of policies, rules, and firewalls. IT infrastructure must be innovative.

Controlling of user’s activities, virtualization of servers, DNS server protection and recovery of

data [10].

This case study provides a raised area through planned future internet infrastructure for Higher

Education Institutions (HEI) and its security which provides a secure and protected atmosphere

in HEI to gain access information about the past, present, and future from social media via cyber

world.

3 Existing Internet Infrastructure

The existing network infrastructure of HEI is insecure due to traffic congestion and excessive

nodes. As existing infrastructure not fulfilling the demands of users and protocols which are used

to protect the entire network. Additionally, the use of smartphones, laptops, wireless access points,

torrents with social media connections is also responsible for creating an insecure environment.

Page 72: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

62 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 1 shows the existing network Infrastructure. In the institution, presently there are around 750 to 800 users. The employees have permission to access multiple emails, downloading, uploading, webmail, web sites and file sharing.

Rapid growth has been started towards online tutorials, E-learning, Learning Management Systems

(LMS) and Microsoft’s Dream Spark’s portal which is provided by Higher Education Commission

of Pakistan for students.

Following are the reasons which pose sort of risks causing unsecure network infrastructure in

existing system.

a. Use of obsolete technology.

b. Weak network policies.

c. Unauthenticated access of user e.g. (passed out students) in the network.

d. Wrong network configuration by the network administrator and grant permission to users

without standard policies.

e. Use of unauthorized and unlicensed software, which allows hidden viruses and hackers.

f. The weak configuration of TCP/IP.

Highlighted reasons are permission easy access to hackers, who can destroy the privacy.

Page 73: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

63 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

4 Planned Future Internet Infrastructure

The planned future internet infrastructure shows in figure 2, which divides the entire network into

different security zones with security devices to protect network infrastructure from internal and

external attacks and threats. For this purpose, planned Demilitarized Zone (DMZ) in the entire

network of the higher education institution and it will separate the network into three different

zones such as,

The planned future internet infrastructure shows in figure 2, which divides the entire network into

different security zones with security devices to protect network infrastructure from internal and

external attacks and threats. For this purpose, planned Demilitarized Zone (DMZ) in the entire

network of the higher education institution and it will separate the network into three different

zones such as:

a. External DMZ

b. Internal DMZ

c. DMZ Server Zone

Proposed future internet infrastructure depends on multiple networks and servers. First, install the

configured firewalls for securing and protect all zones. This will block the threat from application-

based attacks and outsider’s attacks from the internet.

Planned future internet infrastructure will decrease the flow of traffic from internal network zone

to DMZ. The users cannot communicate directly with others system in the internal and external

DMZ because of firewalls securities. Two Firewalls are proposed in the (FII) for security zones to

control, and threat management.

a. External DMZ

Proposed external DMZ in the future internet infrastructure is to restrict public access to

the education institution’s network and to restrict HEI’s employee’s access to the internet.

The external public users authorized to get access HEI’s mail server and web server only

but not authorized to access other services. Therefore, the firewall provides the secure

platform to allow access the HTTP and HTTPS services and to email services. The firewall

allows seeing only the addresses of the web server and emailing server on the internet.

The external firewall implemented in future internet infrastructure for work based on

proxies. It will create the scenario that, when any email communication being started, the

email (SMTP) receives the mail and scans it for viruses and threats. If email is clear and

not found any specious then forward it to the Mail server in the DMZ. Same as a web access

connection builds, firewall scan the access request for specious elements (such as evidence

of the threats and attacks). If it is clear and protected, then forward to the Web server into

the DMZ. Both Web and Mail server in the DMZ should have different proxies.

Page 74: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

64 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Figure 2 Proposed Future Internet Infrastructure of Higher Education Institution

b. Internal DMZ

The recommendation of the internal DMZ in (FII) is the protection and the security of

sensitive data and information from outsiders. The internal firewall will only allow the

authorized users to access and block all other connection through the direct internet.

The education institution uses file sharing system to share the data among its network. In

file sharing system sends and received the data files in the network and these packets

carrying sensitive data to leak out to the public internet. For blocking leakage of sensitive

data and information to the internet, proposed internal firewall for all over protection and

the security policy with DMZ server zone.

Internal firewall will control all the traffic of entire zone network and following;

It will permit SMTP by using proxies and emails are sent to the mail server in the DMZ.

Page 75: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

65 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

It will permit secured communication services to the DNS server in the DMZ server

zone.

It will permit system administrators to get access servers in the DMZ server zone for

the management of all servers.

It will disallow all the connections except authorized users to the DMZ server zone.

It will block building wise collision and data leakage.

It will block all the restricted websites in the EI’s computing labs.

c. DMZ server zone

i. E-mail Server in DMZ server Zone

ii. Web Server in DMZ server Zone

iii. DNS Server in DMZ server Zone

iv. File Server in DMZ server Zone

v. Database server in DMZ server Zone

i. E-Mail Server

In the proposed (FII) DMZ server zone, mail server will operate email addresses

and content checking on all emails. The main purpose of mail server DMZ server

zone is to protect and secure internal information from external users in the internet.

As any email, will be receive from the internet, mail server will check and scan then

will forward the information to the destination and same procedure will perform for

outgoing emails to the internet.

ii. Web Server

Web server will handle the requests and services from the internet. Web server will

not communicate any sources within the internal DMZ and it will not contain any

confidential data. If any specious activity will begin from internet by hackers, it

will block the process and the internal network will be secured. The web server will

consider itself as “www.hei.edu.pk” and will use the IP address of the external

firewall security zone and it will hide the configuration of DMZ server zone.

iii. DNS Server

DNS server will hold directory name services and all the related information which

are required for controlling and managing are as,

DMZ mail server, web server

External firewall

Internal firewall

Internal authorized administrative users

Policies for entire network will be manage and control with the domain names.

Page 76: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

66 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

iv. File Server

In the proposed (FII) DMZ server zone, file server will perform its duties as file

sharing in the internal network with assign rights to authorized users. It will provide

a centralized storing place and sharing of files and folders. Internal staff and

authorized administrators will be able to access the file server for sharing files.

It will also provide a centralized zone to handle file and folder storage and access

only by internal users in the DMZ network. It will use word processing information

and personal data too.

v. Database Server

In the proposed (FII) DMZ server zone, database server will handle the client/server

background resources for shared software, online application, campus management

system (CMS) (which is designed for higher education institution), web server

backup and learning management system (LMS). It will be safe and secure against

internal attackers but authorized user can access services.

5 Comparison Between Existing Infrastructure and Proposed Future Internet

Infrastructure

Comparison of both infrastructures is shown in table 1.

6 Verification of Proposed Future Internet Infrastructure in Various Organizations

Same case study has been implemented in different organization result are as below;

Full secured from lack of information, protection against external attacks from internet. Improved

design for network transactions and reliability of data sharing, with secured from viruses and

Trojans, alternative ISP’s for backup, if one’s link down then switched to alternative link to

network continuity. Highly protect to blockage for hackers and vulnerable services. 24 hours a day

and 7 days a week full network monitoring of internal network users. Automatic backup procedure

for store files server and server’s data.

Organizations are successfully running their network with test deployment of proposed future

internet infrastructure. Some of them had needed to protect their internal network and some had

to both external and internal network.

Page 77: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

67 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Table 1 Comparison between existing and proposed future internet infrastructure

Existing Internet Infrastructure Proposed Future Internet Infrastructure

Less secured and open network to get into without

blockage.

Completely secured with authentication and

verification of users.

External user can easily get access into internal

confidential data.

Divided and separated security zones in three partition

and external user cannot pass and break internal

security zone and server DMZ.

Files and data sharing leakage issue on internet. Files and confidential data protection without leakage.

Possibility of outside attacks and accidentally leakage

of information.

This reduces the possibility of outside attackers

accidentally identifying information assets through

standard port attacks.

Low security level of local area networking. All components are maintained through a complete

management and monitoring system implemented in a

protected management LAN.

No prevention system of intrusion detection. Intrusion detection and prevention systems.

Graph 1 Security improvement level of various organizations

7 Result

The main purpose of DMZ is to separate the entire network of an educational institution into three

Zones to improve security. Implementation of policies and rules into entire network to protect

inbound and outbound attacks and threats.

Managing future internet infrastructure, educational institution must implement some services and

internal network could not be accessible and kept in a secure internal DMZ which isn’t accessible

from the external DMZ.

Page 78: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Planned Future Internet Infrastructure: A Plot Model for Higher Education Institution

68 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

The new infrastructure design is implemented, which safely is being done by using a DMZ. Used

DMZ to create different network zones, where only specific traffic can pass through firewalls and

threats security scan and intrusion prevention mechanism. HEI must upgrade the network

infrastructure in advance and with high security. Properly manageable and secured a DMZ network

infrastructure from external as well as internal attacks.

8 Conclusion

The main objective of this paper was to provide an explicit analysis of security challenges of the

of HEI’s network infrastructure, in order to understand what is its place in the Future Internet.

There is strongly need the update network infrastructure, the changes accurse at the basis of

technology. This is necessary for moving with global needs. In this paper different security aspect

in like internal network security, external network security, Demilitarization of networks are

proposed. All these securities should be properly implemented in the HEI’s network infrastructure.

Planned future internet infrastructure will decrease risks of threats and attacks.

References

[1] Power, R. (2001), ‘2001 CSI/FBI Computer Crime and Security Survey’, Volume VII — No.1,

Computer.

[2] Jabeen, Q., Khan, F., Khan, S., & Jan, M. A. (2016). Performance improvement in multihop

wireless mobile adhoc networks. The Journal Applied, Environmental, and Biological

Sciences (JAEBS), 6, 82-92.

[3] Verma, D. (2016). U.S. Patent No. 9,531,556. Washington, DC: U.S. Patent and Trademark

Office.

[4] Peng, S., Wang, G., & Xie, D. (2017). Social influence analysis in social networking big data:

opportunities and challenges. IEEE Network, 31(1), 11-17.

[5] Anshari, M., Alas, Y., & Guan, L. S. (2016). Developing online learning resources: Big data,

social networks, and cloud computing to support pervasive knowledge. Education and

Information Technologies, 21(6), 1663-1677.

[6] "Pakistan Facebook Users Crosses The Landmark Of 25 Million Users". Umair Qureshi |

Digital Marketing Specialist | Blogs about Digital Analytics, SEO & Social Media. N.p., 14

May. 2016.

[7] "Youtube Traffic From Pakistan Is Picking Up As The Ban Enters Its Fourth Year!”

Propakistani.pk./2015/09/21.

[8] Niebert, N., Schieder, A., Abramowicz, H., Malmgren, G., Sachs, J., Horn, U., & Karl, H.

(2004). Ambient networks: an architecture for communication networks beyond 3G. IEEE

Wireless Communications, 11(2), 14-22.

[9] Leavitt, N. (2011). Internet security under attack: The undermining of digital

certificates. Computer, 44(12), 17-20.

[10] Buecker, A., Browne, K., Foss, L., Jacobs, J., Jeremic, V., Lorenz, C., & Van Herzele, J.

(2011). IBM security solutions architecture for network, server and endpoint. IBM Redbooks.

Page 79: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Fluid Flow Algorithm to Solve Travel Salesman Problem

69 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Fluid Flow Algorithm to Solve Travel Salesman Problem

Mudassir Khalil1 Jian-Ping Li2 Rafaqat Hussain3 Kamlesh Kumar4

Abstract

Travel Salesman Problem (TSP) is well known combinatorial optimization problem. Hamiltonian

path is required to solve TSP. This Hamiltonian path can be achieved by many methods. In this

paper a novel and efficient algorithm is discussed. The name of algorithm is Fluid Flow algorithm.

It works similar as flow of fluid when expands from a source. It starts from smallest triangle and

expands by keeping a closed path and captures its nearest possible point. It continues expansion

until all points included in that path. In this paper the efficiency of proposed algorithm is compared

with other algorithms and experimental results have proved that our proposed algorithm is more

efficient than Ant Colony and Genetic algorithms.

Keywords: Travel Salesman Problem (TSP), Big Data, TSP Big Instances, Fluid Flow Algorithm.

Ant Colony Algorithm, Genetic Algorithm

1 Introduction

To solve Travel Salesman Problem (TSP) with given in- stances one has to pass all points of that

instance and come back to the original point. The path taken should be the minimum from all

possible paths. This is called Travel salesman problem (TSP). TSP is very famous optimization

problem. In optimization problems best solution is needed to find from many available solutions.

TSP is included in NP-Complete class [1]. NP-complete problem are those which cannot be

solved in polynomial time by a deterministic algorithm, but a non-deterministic algorithm can do

it in polynomial time [2]. TSP has a long history and always been an inspirational topic for

researchers. The reason for it is that TSP problem is very easy to understand. This statement is true

when given instance is small but when instance are too high, this problem becomes complex to

solve and complexity increases exponentially. There are many algorithms to solve TSP. Some are

exact and some are heuristic. Exact algorithms are those which can provide exact solution of given

problem but the time taken to solve the problem is too high. Heuristic algorithms cannot always

be exact but can provide near to exact solution. Heuristic algorithms are fast as compared to exact

algorithm. For TSP heuristic algorithm save so much time as compared with exact algorithm, in

some cases years can be saved by using heuristic algorithms. There are two types of TSP problems,

symmetric TSP and asymmetric TSP [3]. Symmetric TSP have same path from one point to other

and for its return, but asymmetric have different paths between two points. Here difference

between paths is in terms of length of paths. In this paper we will deal only with symmetric TSP.

There are many algorithms to solve symmetric TSP. In this paper a brand new algorithm which is

called Fluid Flow (FF) to solve TSP fast and accurately is provided.

1 University of Electronic Science and Technology China, Chengdu, China [email protected] 2 University of Electronic Science and Technology China , Chengdu, China [email protected] 3 Shah Abdul Latif University Khairpur, Pakistan [email protected] 4 Sindh Madressatul Islam University Karachi, Pakistan [email protected]

Page 80: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Fluid Flow Algorithm to Solve Travel Salesman Problem

70 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Fluid Flow is a newly developed algorithm, very easy to understand and easy to implement. It

starts by calculation of a small triangle. To get this triangle first calculate a distance vector

between points of given problem. Then find a smallest value in the distance vector. This would be

the smallest path between two points. Now calculate the nearest point from these two points and

make a triangle by combining straight lines between these three points. This would be a desire

triangle in given instance. After having triangle next is to find nearest point from its edges. When

that point is found include that point into triangle path. That would become four edges path

(quadrilateral). Again previous step is repeated with quadrilateral path and include nearest point

into quadrilateral path. This step is repeated until all points are included in path. In the end resultant

path would be the path which has all points in it. This is a brief introduction of fluid flow algorithm.

The name fluid flow comes from fluids with similarity in movement when expands from a source.

2 Literature Review

There are many algorithms to solve TSP problem. From currently available algorithms very

famous are, greedy or nearest neighbor, Christofides, K-OPT, Lin Kernighan and various branch-

and-bound algorithms. Nearest neighbor or Greedy algorithm is simplest algorithm. This algorithm

finds its neighbor which is near to current point and move towards that point. Greedy algorithm is

dependent on its initial point, if start point changes result of greedy algorithm may be change also.

Greedy algorithm is less efficient but very easy to implement [4]. Christofides Algorithm is

approximate algorithm to solve TSP. It gives solution which is 3/2 factor of exact solution [5]. To

solve TSP problem a C language program called Concorde is mostly used. This program can solve

bigger instances in several minutes. Concorde given as one of the best exact TSP solver available

so far while reviewing both heuristic and exact solutions of the TSP by Hahsler and Hornik In

2007 [6] [7]. K-opt mostly used technique for TSP problem. It can be 2-opt, 3-opt or can be more.

Mostly used forms are 2-opt and 3-opt [8]. Lin-Kernighan uses 2-opt and 3-opt to solve TSP

problem and is one of the best algorithm to solve TSP. This is because it is an adoptive algorithm.

Lin-Kernighan decides at every step how many edges need to swap [9], [10], [11]. Genetic

Algorithm and Ant Colony Algorithm both are heuristic methods to solve TSP problem very

quickly [12], [13]. These algorithms do not find exact solution of problem but can find near to

exact solution.

Ant colony algorithm works similar to ants, which always find smaller path between their food

and nest.

3 TSP Proposed Algorithm

To solve TSP big instances FF algorithm work efficiently. This algorithm consists of two parts.

First part divide problem in to smaller parts. Second part start form lowest possible triangle in all

divided parts and expand all triangles by combining near points. This FF algorithm will help first

part to join sub problems into big one. We take Euclidean distances to perform test results, which

are given in examples below. Detail of algorithms is in following.

Page 81: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Fluid Flow Algorithm to Solve Travel Salesman Problem

71 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Fig

ure

1:

8 p

oin

ts s

olu

tio

n b

y u

se o

f F

F a

lgo

rith

m

Fig

ure

2:

So

luti

on

of

div

ided

par

ts i

n F

F a

lgo

rith

m

Page 82: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Fluid Flow Algorithm to Solve Travel Salesman Problem

72 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

A. Fluid Flow (FF) Algorithm

In this paper Fluid Flow algorithm takes input which is given in TSP lib [14]. This input

is Euclidean distance of cities. Every city is considered as point (x, y) on plan Algorithm

first calculates Distance Matrix of all points using Eq 1.

2

1

( , ) ( , ) ( )

n

k k

k

d x y d y x x y

(1)

Here k can be any number greater than zero. Fig 1 explains the basic idea of fluid flow

algorithm using 8 points example. In Fig 1(a) point 1, 4 and 7 which are close to each other

combine to make a triangle. At this point path contains three points which are 1, 4 and 7.

In Fig 1(b) closest point 6 to that triangle is included in to path. In Fig 1(c) (d) (e) points 2,

5 and 3 are included respectively into path. In Fig 1(e) last point which is point 8 is

included in path as there is no point left so the path contains all point is solution of given

problem. To find the nearest point form edge of path Specific distance Sd is used which is

given in Eq 2.

𝑟𝑎𝑛𝑔𝑒𝑌 = max(𝑌)−min (𝑌)

10

𝑟𝑎𝑛𝑔𝑒𝑋 = max(𝑋)−min (𝑋)

10

𝑆𝑑 = 𝑟𝑎𝑛𝑔𝑒𝑋+𝑟𝑎𝑛𝑔𝑒𝑌

𝐿 (2)

In Fluid flow algorithm first there is division of bigger problem into small problems. For

this Fig 2 procedure is used. In Fig 2(a) a big problem is divided in three parts which are

displayed differently by design and colors. In Fig 2(b) first left and middle parts are solve

by using procedure discussed with Fig 1 example. Similarly right and middle part is solve

which is displayed in Fig 2(c). In Fig 2(d) intersection of Fig 2 (b) (c) is shown. This

intersected path is combined with solution of left part which is shown in Fig 2 (e). In the

end solution of right part is combined with result of Fig 2 (e). This gives final solution of

problem given in Fig 2 (f). Following is a algorithmic form of Fluid Flow algorithm.

4 Algorithm

Input: C // XY coordinates of cities.

Output: Path // Set of edges

Require: dMat // Distance Matrix calculate using Eq. 1

Require: Sd // Specific Distance calculate using Eq.2 Path

// Minimum cost triangle

while iterate == True do

Cities = C − Path

nearPoints = nearPoints (Cities, Path, Sd)

for all nearPoints do

for all Path do

Dist // minimum distance from path to point

Page 83: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Fluid Flow Algorithm to Solve Travel Salesman Problem

73 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

if minDist > Dist then

minDist = Dist

else

minDist = minDist

end if

end for

Path = Path + minDist

end for

if path == C then

iterate = false

end if

end while

function nearPoints (Cities,P ath,Sd)

for all Path do

for all Cities do

Distance // Min distance from nearest point

if Distance < Sd then

nearPoint = City

end if

end for

end for

end function

5 Experimental Results

In these experiment author uses Genetic algorithm, Ant colony algorithm and FF algorithm

because these all are heuristic algorithms. These experiments are performed on Matlab 2010 by

use of 1.6 GHz core i5 machine have 4GB RAM. For Ant Colony test results there were 200 ants

selected and 20 iterations are performed on each sample test. In table 1 execution time and length

of final path for three algorithms are given on various instances. In table 2 approximation ratio of

FF algorithm compares with Ant Colony and Genetic algorithms is given.

6 Conclusion and Future Work

FF algorithm is intelligent in its work, because it works similar to flow of fluid which always finds

shortest path. Another advantage of proposed algorithm is, it is very easy to understand. FF

algorithm works efficiently compare to other algorithms because in other algorithms solution is

dependent on comparison with all other points. In FF algorithm this path finding is done with

fraction of possible p3oints, which saved much of execution time. Experimental results prove this

algorithm is more efficient than Genetic and Ant colony algorithm. FF algorithm is an approximate

algorithm but not exact algorithm. In future work and another possible step would be added to

divide the larger problem to multiple smaller problems, and at the end, results will be combined.

This would be like divide and conquer algorithm. This division can be implemented on distributed

system, which will increase efficiency of proposed algorithm.

Page 84: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Fluid Flow Algorithm to Solve Travel Salesman Problem

74 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Table 1: Results using FF Algorithm

Instance

Name

FF Genetic Algorithm Ant Colony Algorithm

Speed

(Sec) Distance

Speed

(sec) Distance

Speed

(sec) Distance

berlin52 0.51 8506 8.34 8506 4.6 8986

ulysses22 0.08 77 6.3 77.3 1.588 77.22

eil51 0.52 460 8.5 436.6 4.6 535

eil76 0.676 595.7 10.04 556.5 8.12 694

kroA100 1.191 25639 12.2 22273 13.42 33894

kroA150 3.31 30591 28.5 44369 24.3 51453

kroA200 6.34 33318 21.4 35572 47.25 46815

kroB100

1.09 24541 12.5 23779 13.17 31538

kroB150 2.99 29675 17.06 28873 27.14 44712

kroB200 5.57 34295 20.57 36699 47.35 49817

kroC100 1.422 22904 12.2 23710 12.826 34333

kroD100 1.03 23662 12 21777 12.68 33263

kroE100 1.18 23956 12.4 23150 12.97 33589

pr1002 137 318986 167 670590 - -

gr666 274 3780 40.7 4739 572 6395

rat575 65 8076 36 10464 371 14155

Table 2: Approximation ratio of FF Algorithm compares with Ant Colony and Genetic Algorithms

Instance Name

Oprx ratio vs

Genetic Algorithm

Oprx ratio vs

Ant Colony Algorithm

Speed Dist Speed Dist

berlin52 1.930556 0.985061 1.064815 1.040649 ulysses22 5.833333 0.99217 1.47037 0.991144

eil51 3.373016 0.871457 1.825397 1.067864 eil76 2.73123 0.916804 2.208923 1.143328

kroA100 2.884161 0.838308 3.172577 1.275697 kroA150 2.141247 1.361388 1.825695 1.578749 kroA200 1.30967 0.953213 2.891677 1.254488 kroB100 2.948113 0.930284 3.106132 1.233833 kroB150 1.313318 0.941562 2.089299 1.458079 kroB200 1.32113 1.019558 3.041105 1.383998 kroC100 2.758933 0.990227 2.900498 1.433887 kroD100 3.053435 0.920336 3.226463 1.405756 kroE100 3.031785 0.966355 3.171149 1.402112 pr1002 1.113333 2.065986 - - gr666 0.108824 1.22772 1.529412 1.656736 rat575 0.202247 1.249284 2.08427 1.689947

Acknowledgements

This paper was supported by the National Natural Science Foundation of China (Grant No.

61370073), the National High Technology Research and Development Program of China (Grant

No. 2007AA01Z423), the project of Science and Technology Department of Sichuan Province.

Page 85: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

Fluid Flow Algorithm to Solve Travel Salesman Problem

75 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

References

[1] M. R. Garey and D. S. Johnson, Computers and Intractability; A Guide to the Theory

of NP-Completeness. New York, NY, USA: W. H. Freeman &amp; Co., 1990.

[2] S. A. Mulder and D. C. Wunsch, II, “Million city traveling salesman problem solution

by divide and conquer clustering with adaptive resonance neural networks,” Neural

Netw., vol. 16, no. 5-6, pp. 827–832, Jun. 2003. [Online]. Available:

http://dx.doi.org/10.1016/ S0893-6080(03)00130-8

[3] R. Jonker and T. Volgenant, “Transforming asymmetric into symmetric traveling

salesman problems,” Operations Research Letters, vol. 2, no. 4, pp. 161 – 163, 1983.

[Online]. Available:

http://www.sciencedirect.com/science/article/pii/0167637783900482

[4] D. S. Johnson, Local optimization and the Traveling Salesman Problem. Berlin,

Heidelberg: Springer Berlin Heidelberg, 1990, pp. 446–461. [Online]. Available:

http://dx.doi.org/10.1007/BFb0032050

[5] M. Bl¨aser, K. Panagiotou, and B. V. R. Rao, A Probabilistic Analysis of Christofides’

Algorithm.

[6] Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 225–236. [Online].

Available: http: //dx.doi.org/10.1007/978-3-642-31155-0 20

[7] M. Hahsler and K. Hornik, “Tsp – Infrastructure for the traveling salesperson problem,”

Journal of Statistical Software, vol. 23, no. 2, pp. 1–21, December 2007. [Online].

Available: http://www.jstatsoft.org/ v23/i02/

[8] S. A. Mulder and D. C. Wunsch, II, “Million city traveling salesman problem solution

by divide and conquer clustering with adaptive resonance neural networks,” Neural

Netw., vol. 16, no. 5-6, pp. 827–832, Jun. 2003. [Online]. Available:

http://dx.doi.org/10.1016/ S0893-6080(03)00130-8

[9] K. Helsgaun, “An effective implementation of k-opt moves for the linkernighantsp,” in

Roskilde University, 2007. Case, 2006, p. 109.

[10] K. Helsgaun, “An effective implementation of the lin-kernighan traveling salesman

heuristic,” European Journal of Operational Research, vol. 126, pp. 106–130, 2000.

[11] H.-K. Tsai, J.-M. Yang, Y.-F. Tsai, and C.-Y. Kao, “An evolutionary algorithm for

large traveling salesman problems,” IEEE Transactions on Systems, Man, and

Cybernetics, Part B (Cybernetics), vol. 34, no. 4, pp. 1718–1729, Aug 2004.

[12] R. Baraglia, J. I. Hidalgo, and R. Perego, “A hybrid heuristic for the traveling salesman

problem,” IEEE Transactions on Evolutionary Computation, vol. 5, no. 6, pp. 613–622,

Dec 2001.

[13] C. L. Valenzuela and A. J. Jones, “Evolutionary divide and conquer (i): A novel genetic

approach to the tsp,” Evolutionary Computation, vol. 1, no. 4, pp. 313–333, Dec 1993.

[14] Y. Zhou, “Runtime analysis of an ant colony optimization algorithm for tsp instances,”

IEEE Transactions on Evolutionary Computation, vol. 13, no. 5, pp. 1083–1092, Oct

2009.

[15] “TSPLIB,” 2008, [Online]. Available:

http://comopt.ifi.uniheidelberg.de/software/TSPLIB95/

Page 86: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

76 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Call for Paper

Volume I, Issue I, 2017 ISSN 2518-4806

Dear Authors

International journal of Computing and related technologies (IJCRT), provides an international platform

for researchers, scientists and engineers to publish their high quality research advancement related to the

field of computer science and technology. It is a peer reviewed international journal to ensure good quality,

novelty, and constructive contribution in the field of computer science and technology. It is a great honor

to invite you to submit a paper for publication in this journal, which will be published under the supervision

of Sindh Madressatul Islam University (SMIU) Karachi, Pakistan. IJCRT covers the following topics

related to computer science and technology but not limited to.

Computer architecture and design

Artificial intelligence

Pattern recognition

Human computer interaction

Computer networking

Software engineering

Data management

Database systems

Cloud Computing

Computer languages

Information security and

cryptography

Other emerging computing

technologies

Submission Guidelines

Authors are required to submit soft copy (word format) of the manuscript to Managing

Editor/Assistant Editor at the email Address: [email protected]

Research scholars from all over the world, engaged with computer science and technology

related fields, are offered to submit their findings for the publication in upcoming issue.

The deadline for submission of research papers is 30th November 2017.

Thanks and Regards

Editorial Board

International Journal of Computing and Related

Technologies (IJCRT)

Page 87: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

77 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

Guidelines to Authors for Manuscript

The language of manuscripts should be in English, free from any linguistic mistake.

Format:

Format should have double line spacing, 2.5 cm margins (all four sides), times new roman font style, 10 font size for normal text; 10 (bold) for headings and 12 (bold) for title of the manuscript. Manuscripts must be in MS- Word format only.

Structure:

Title, Abstract (not more than 250 words) and keywords (Max. 5) Introduction, Materials and Methods, Results, Discussions, Conclusions, and References

Word Limit:

Papers should not be more than 5000 & not less than 3500 words, including figures, tables, and references. Following guidelines should be followed:

References:

References should be in IEEE style. Further instruction can be obtained from university web page at: http://www.smiu.edu.pk/ijcrt.php

Authorship:

This should include the full author names (with no titles or qualifications), institutional addresses (Department, Institute, City, Country), and email address of corresponding author. Authors and affiliations must be linked using superscript numerals. The corresponding author should also be indicated.

Plagiarism Policy:

The manuscript which is submitted to Journal is understood to be original, unpublished and is not in consideration elsewhere.

All the authors are required to submit a copyright statement that the manuscript submitted is original and has not been accepted or is currently being considered for publication elsewhere. In case of plagiarism or copyright violation the author will be held responsible. However, manuscript submitted to journal will be checked by editor or his associates using anti-plagiarism software (Turnitin). Plagiarism less than 18% is accepted for publication.

Manuscripts Submission:

Authors are required to submit soft copy of the manuscript to Managing Editor/Assistant Editor at the email Address: [email protected]

Page 88: Prof. Dr. Muhammad Ali Shaikh, Vice Chancellor SMI … Editorial Board S.M.Aqil Burney Institute of Business Management Karachi Pakistan. Farah Lakhani Al Majmaah University Saudi

78 International Journal of Computing and Related Technologies Vol. 1 Issue. 1

International Journal of Computing and Related Technologies

(IJCRT)

ISSN: 2518-4806

COPYRIGHT TRANSFER FORM

Please complete and sign this form and send it back to us. A written confirmation is needed from authors in order

to obtain copyrights for papers published in International Journal of Computing and Related Technologies (IJCRT).

Author’s Name

Description Prof. Assoc.Prof. Asst.Prof. Dr. Mr. Ms.

Organisation/University

Address City and State

Postal Code

Country

Cell Number

Telephone Number

E-mail ID

Manuscript Number

Paper Title

Authors

Copyright Transfer Statement

The copyright of this article is transferred to International Journal of Computing and Related Technologies (IJCRT),

when the article is accepted for publication. The undersigned hereby warrants that the paper is original and he/she

is the sole owner of the paper, except for material that is clearly identified as to its original source, with permission.

The undersigned signifies that he/she has the power and authority to make and execute this assignment.

The corresponding author accepts responsibility for releasing this material on behalf of all co-authors. After

submission of this agreement duly signed by the corresponding author, no changes would be made further.

Yours Sincerely

Name of Corresponding Author: ______________

Signature: ______________

Date: ______________