Volume 06 Issue 02, MARCH 2018

LEAN SIX SIGMA IMPLEMENTATION IN CEMENT GRINDING PROCESS – “ABC” PLANT CASE STUDY

Ahmed Samir Mahmoud, Ahmed Mahdi Hossian, Walid Kamal Ahmed, Mohamed Aly Mohamed Khalil

Page no:01-03

Abstract

A project of Lean Six Sigma (LSS) takes place in a cement manufacturing plant; the ultimate goal was to develop the performance of the final product properties based on real customer needs. Success of implementation DMAIC methodology had been proved to formalize a problem statement, discover all potentially causes and prioritize them. Statistical analysis was used to distinguish irrele-vant causes from critical ones. The project team together with the plant team prepares list of alternatives to satisfy business customers, designed experiments takes place to choose the optimum solution. Implementing the selected alternative improves product quality and performance, returns the lost sales and gives net present value of 2000,000 $ within the first three years of implementation.

TELKOM SMART CITY FRAMEWORK FOR INDONESIA SMART CITY INITIATIVE (PRACTICAL STUDY PT TELKOM INDONESIA)

Roessobiyatno, Heru Ramdhani, Luk Lu Ul Ilma

Page no:04-12

Abstract

Smart City has become a major program in a few cities in the world even in Indonesia alone. In the country, the local government in cities and districts begin to improve it to make the city into a smart city, a city that feels safe, com-fortable and can give service that required by citizens with fast, easy access to services and sustainable. To support the fulfilment of the local government in realizing the smart city, Telkom as one of The Indonesia's largest Telco Company has efforts to the initiative through the Telkom Smart City (TSC) Framework. TSC aims to provide solu-tions to local governments with appropriate local content and is characterized by shades that are owned by their re-spective regions. This study was conducted to assess the Telkom Smart City Framework for Indonesia Smart City Initiative with Desk Research method of collecting relevant information from the internal and external organization.

ENHANCED ENERGY AWARE IN WIRELESS SENSOR NETWORKS USING LOCALIZATION POSITIONING ALGORITHM: A SURVEY

Abhishek kumar Upadhyay, Prof. Dharmendra kumar singh

Page no:12-16

Abstract

They mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. Wireless sensor networks have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently one of the system parameters. Localization process is necessary to report the origin of events, routing and to answer questions on the network coverage, assist group querying of sensors. In general, localization schemes are classified into two broad categories: range-based and range-free. However, it is difficult to classify hybrid solutions as range-based or range-free. In this paper we make these classification easy, where range-based schemes and range-free schemes are divided into two types: fully schemes and hybrid schemes. Moreover, we compare the most relevant localization algorithms and discuss the future research directions for wireless sensor networks localization schemes. In localization the problem that the positioning correctness and a few anchor nodes. Purposed algorithmic program for improvement approach and find the optimum location. Find the optimum location by satisfying every the factors with minimize error and good accuracy.

A SURVEY ON IMAGE DATA AUTHENTICATION BASED ON REVERSIBLE DISCRETE WAVELET TRANSFORM TECHNIQUE

Ankur Sahu, Prof. Dharmendra Kumar Singh

Page no:17-20

Abstract

A digital watermarking technique has been proposed as a possible resolution to the necessity of copyright protection and authentication of transmission information in a networked setting, it makes possible to spot the author, owner, approved client of a document victimization RDWT technique were developed in recent years. Because it will recover the watermarked information back to the first host signal, reversible watermarking algorithms are suitable for medical, military and different special fields. However, these algorithms have their defects, like weak robustness, low embedding capability and high hard quality. This paper proposes a reversible picture element technique watermarking algorithmic rule supported LSB replacement. It can not only recover the first information to a high extent, however even have strong hardiness and low hard quality and .The watermark is superimposed in choose coefficients with significant image energy within the remodel domain so as to confirm non- eras ability of the watermark. Advantages of the projected technique include: improved resistance to attacks on the watermark, implicit visual masking utilizing the time-frequency localization property of wave transform .Digital image watermarking that doesn't require the first image for watermark detection and this projected technique is strong to most of the signal process techniques. Purposed Technique ARDWT base on Image Data Authentication.

REVIEW ON DATA DELIVERY ACCURACY ANALYSIS OF RANGE BASED LOCALIZATION ALGORITHMS IN WSN

Kapil Dev Yadav, Prof. Dharmendra kumar Singh

Page no:21-23

Abstract

Digital Localization error minimization based on positioning techniques and focus on moving sensor node in improving the accuracy analysis of range based location algorithms in wireless sensor networks. A sensor localiza-tion primarily based techniques awareness of the physical location for every node is needed by several wireless device network applications. The discovery of the position will be complete utilizing range measurements as well as sensor localization received signal strength in time of arrival and sensor localization received signal strength in time differ-ence of arrival and angle of arrival. Positioning techniques supported angle of arrival info between neighbor nodes. A wireless sensor network using positioning techniques pri-marily based Techniques wireless sensor network nodes position estimation in area is thought as localization. Node Localization in wireless device network is very important for several applications and to seek out the position with Re-ceived Signal Strength Indicator needs variety of anchor nodes. Accessible wireless device system procedure tradi-tional signal strength and angle of arrival primarily based localization technique for WSN .A purposed algorithm as a PA for wireless sensor network genetic algorithmic based on positioning techniques as proposed techniques. In study this paper problem that the positioning accuracy is low with min-imum anchor nodes. Find the optimum location by satisfying each the factors with minimal error and best possible solu-tion. WSNs, the closely located sensor nodes sensing and collecting the data about the same event will result in better accuracy and reduced uncorrelated noise.

A SURVEY ON ENHANCED DIGITAL IMAGE HISTOGRAM EQUALIZATION METHOD

Rohit Purohit, Prof. Dharmendra kumar Singh

Page no:24-26

Abstract

Image improvement is one among the difficult problems in low level image process. Distinction improvement tech-niques are used for rising visual quality of low distinction pictures. Histogram equalization (HE) technique is one such technique used for distinction improvement. The image his-togram requirement for an improvement in existing Auto-matic contrast improvement methodologies that are applied in many low level image process techniques has LED to usage of the many bar graph leveling techniques. During this paper, numerous techniques of image improvement through bar graph leveling are overviewed. To gauge the effectiveness of the strategies illustrated, we've used the PSNR, tenengrad, and distinction as parameters. These pa-rameters show that however the results vary on applying completely different techniques of improvement. The work is implemented on the MATLAB background. The varied tech-niques are reviewed.

A REVIEW ON DIGITAL IMAGE DATA SECURE SYSTEM BASED ON HISTOGRAM TECHNIQUE

Imroze Aslam, Prof. Ratan Singh Rajput

Page no:27-30

Abstract

Digital image data secure techniques have recently grows area because in this field great awareness due to secure image data or its importance for a large number of multimedia applications. Digital images data are increasingly transmitted over non-secure multimedia channels or Internet. Some important area like military, medical and quality control images data must be protected against attempts to important work. Important work could corrupt image data problem insecure important image data. To protect the authenticity of multimedia im-ages, several approaches have been proposed. Encryption is used to transmit data securely in open networks. Infor-mation contents may be image data. Encryption of text or images, which cover the highest percentage of the multi-media, is most important during secure transmission of information. There are so many different techniques that should be used to protect confidential image data from unauthorized access. The three most important factors of image data secure design imperceptibility or undetectabil-ity, capacity, and security as a performance measure for image distortion due to image data embedding, the well-known peak-signal-to noise ratio. It compute peak signal to noise ratio between two images, in decibels unit if im-age. This ratio is often used as a quality measurement be-tween the original image data and a secure hard image data. Main parameter finds higher the PSNR, image data the better the quality of the hard or reconstructed image.