Abstract: This article aims to analyze the static stability and
pseudostatic slope by using different methods such as: Bishop
method, Junbu, Ordinary, Morgenstern-price and GLE. The two
dimensional modeling of slope stability under various loading as: the
earthquake effect, the water level and road mobile charges. The
results show that the slope is stable in the static case without water,
but in other cases, the slope lost its stability and give unstable. The
calculation of safety factor is to evaluate the stability of the slope
using the limit equilibrium method despite the difference between the
results obtained by these methods that do not rely on the same
assumptions. In the end, the results of this study illuminate well the
influence of the action of water, moving loads and the earthquake on
the stability of the slope.
Abstract: The legality of some countries or agencies’ acts to spy
on personal phone calls of the public became a hot topic to many
social groups’ talks. It is believed that this act is considered an
invasion to someone’s privacy. Such act may be justified if it is
singling out specific cases but to spy without limits is very
unacceptable. This paper discusses the needs for not only a simple
and light weight technique to secure mobile voice calls but also a
technique that is independent from any encryption standard or library.
It then presents and tests one encrypting algorithm that is based of
Frequency scrambling technique to show fair and delay-free process
that can be used to protect phone calls from such spying acts.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: Based on an indoor environmental quality (IEQ) index established by previous work that indicates the overall IEQ acceptance from the prospect of an occupant in residential buildings in terms of four IEQ factors - thermal comfort, indoor air quality, visual and aural comforts, this study develops a user-friendly IEQ calculator for iOS and Android users to calculate the occupant acceptance and compare the relative performance of IEQ in apartments. “IEQ calculator” is easy to use and it preliminarily illustrates the overall indoor environmental quality on the spot. Users simply input indoor parameters such as temperature, number of people and windows are opened or closed for the mobile application to calculate the scores in four areas: the comforts of temperature, brightness, noise and indoor air quality. The calculator allows the prediction of the best IEQ scenario on a quantitative scale. Any indoor environments under the specific IEQ conditions can be benchmarked against the predicted IEQ acceptance range. This calculator can also suggest how to achieve the best IEQ acceptance among a group of residents.
Abstract: This paper presented a study of three algorithms, the
equalization algorithm to equalize the transmission channel with ZF
and MMSE criteria, application of channel Bran A, and adaptive
filtering algorithms LMS and RLS to estimate the parameters of the
equalizer filter, i.e. move to the channel estimation and therefore
reflect the temporal variations of the channel, and reduce the error in
the transmitted signal. So far the performance of the algorithm
equalizer with ZF and MMSE criteria both in the case without noise,
a comparison of performance of the LMS and RLS algorithm.
Abstract: This paper introduces a video sharing platform based
on WiFi, which consists of camera, mobile phone and PC server. This
platform can receive wireless signal from the camera and show the live
video on the mobile phone captured by camera. In addition, it is able to
send commands to camera and control the camera’s holder to rotate.
The platform can be applied to interactive teaching and dangerous
area’s monitoring and so on. Testing results show that the platform can
share the live video of mobile phone. Furthermore, if the system’s PC
server and the camera and many mobile phones are connected
together, it can transfer photos concurrently.
Abstract: Aluminium matrix composites with alumina
reinforcements give superior mechanical & physical properties. Their
applications in several fields like automobile, aerospace, defense,
sports, electronics, bio-medical and other industrial purposes are
becoming essential for the last several decades. In the present work,
fabrication of hybrid composite was done by Stir casting technique
using Al 6061 as a matrix with alumina and silicon carbide (SiC) as
reinforcement materials. The weight percentage of alumina is varied
from 2 to 4% and the silicon carbide weight percentage is maintained
constant at 2%. Hardness and wear tests are performed in the as cast
and heat treated conditions. Age hardening treatment was performed
on the specimen with solutionizing at 550°C, aging at two
temperatures (150 and 200°C) for different time durations. Hardness
distribution curves are drawn and peak hardness values are recorded.
Hardness increase was very sensitive with respect to the decrease in
aging temperature. There was an improvement in wear resistance of
the peak aged material when aged at lower temperature. Also
increase in weight percent of alumina, increases wear resistance at
lower temperature but opposite behavior was seen when aged at
higher temperature.
Abstract: The Trustworthy link failure recovery algorithm is
introduced in this paper, to provide the forwarding continuity even
with compound link failures. The ephemeral failures are common in
IP networks and it also has some proposals based on local rerouting.
To ensure forwarding continuity, we are introducing the compound
link failure recovery algorithm, even with compound link failures.
For forwarding the information, each packet carries a blacklist, which
is a min set of failed links encountered along its path, and the next
hop is chosen by excluding the blacklisted links. Our proposed
method describes how it can be applied to ensure forwarding to all
reachable destinations in case of any two or more link or node
failures in the network. After simulating with NS2 contains lot of
samples proved that the proposed protocol achieves exceptional
concert even under elevated node mobility using Trustworthy link
Failure Recovery Algorithm.
Abstract: The 5th generation of mobile networks is term used in
various research papers and projects to identify the next major phase
of mobile telecommunications standards. 5G wireless networks will
support higher peak data rate, lower latency and provide best
connections with QoS guarantees.
In this article, we discuss various promising technologies for 5G
wireless communication systems, such as IPv6 support, World Wide
Wireless Web (WWWW), Dynamic Adhoc Wireless Networks
(DAWN), BEAM DIVISION MULTIPLE ACCESS (BDMA), Cloud
Computing, cognitive radio technology and FBMC/OQAM.
This paper is organized as follows: First, we will give introduction
to 5G systems, present some goals and requirements of 5G. In the
next, basic differences between 4G and 5G are given, after we talk
about key technology innovations of 5G systems and finally we will
conclude in last Section.
Abstract: Rapid growth of Information Technologies (IT) has
had huge influence on enterprises, and it has contributed to its
promotion and increasingly extensive use in enterprises. Information
Technologies have to a large extent determined the processes taking
place in an enterprise; what is more, IT development has brought the
need to adopt a brand new approach to human resources management
in an enterprise. The use of IT in human resource management
(HRM) is of high importance due to the growing role of information
and information technologies. The aim of this paper is to evaluate the
use of information technologies in human resources management in
enterprises. These practices will be presented in the following areas:
recruitment and selection, development and training, employee
assessment, motivation, talent management, personnel service.
Results of conducted survey show diversity of solutions applied in
particular areas of human resource management. In the future, further
development in this area should be expected, as well as integration of
individual HRM areas, growing mobile-enabled HR processes and
their transfer into the cloud. Presented IT solutions applied in HRM
are highly innovative, which is of great significance due to their
possible implementation in other enterprises.
Abstract: In this paper, we propose a system for preventing gas
risks through the use of wireless communication modules and
intelligent gas safety appliances. Our system configuration consists of
an automatic extinguishing system, detectors, a wall-pad, and a
microcomputer controlled micom gas meter to monitor gas flow and
pressure as well as the occurrence of earthquakes. The automatic fire
extinguishing system checks for both combustible gaseous leaks and
monitors the environmental temperature, while the detector array
measures smoke and CO gas concentrations. Depending on detected
conditions, the micom gas meter cuts off an inner valve and generates
a warning, the automatic fire-extinguishing system cuts off an external
valve and sprays extinguishing materials, or the sensors generate
signals and take further action when smoke or CO are detected.
Information on intelligent measures taken by the gas safety appliances
and sensors are transmitted to the wall-pad, which in turn relays this as
real time data to a server that can be monitored via an external network
(BcN) connection to a web or mobile application for the management
of gas safety. To validate this smart-home gas management system, we
field-tested its suitability for use in Korean apartments under several
scenarios.
Abstract: Icons, or pictorial and graphical objects, are
commonly used in human-computer interaction (HCI) fields as the
mediator in order to communicate information to users. Yet there has
been little studies focusing on a majority of the world’s population –
semi-literate communities – in terms of the fundamental knowhow
for designing icons for such population. In this study, two sets of
icons belonging in different icon taxonomy – abstract and concrete –
are designed for a mobile application for semi-literate agricultural
communities. In this paper, we propose a triadic relationship of an
icon, namely meaning, task and mental image, which inherits the
triadic relationship of a sign. User testing with the application and a
post-pilot questionnaire are conducted as the experimental approach
in two rural villages in India. Icons belonging to concrete taxonomy
perform better than abstract icons on the premise that the design of
the icon fulfills the underlying rules of the proposed triadic
relationship.
Abstract: The following paper presents the results of a study
aimed at achieving a better understanding of the psychological
readiness for mobile learning (m-learning) among Saudi students,
while also evaluating m-learning readiness as a whole in Saudi
Arabia - a topic that has not yet received adequate attention from
researchers. Data was acquired via a questionnaire administered to
131 Saudi students at UK universities, in July 2013. The study
confirmed that students are confident about using mobile devices in
their daily lives, and that they would welcome more opportunities for
mobile learning. The findings also indicated that Saudi higher
education students are very familiar with, and psychologically ready
for, m-learning.
Abstract: The aim of this paper is to investigate accidents and
close call situations connected to the use of mobile phones in
working-age people ≥ 50 years old. The paper is part of a crosssectional
study that was carried out in 2002 in 15,000 working-age
Finns. The study showed that mobile-phone-related accidents and
close call situations, both at work and at leisure, are more common in
people under 50 years that in people ≥ 50 years old. However, people
under 50 use mobile phones more than those aged ≥ 50.
Abstract: Our globalizing world has become almost a small
village and everyone can access any information at any time.
Everyone lets each other know who does whatever in which place.
We can learn which social events occur in which place in the world.
From the perspective of education, the course notes that a lecturer use
in lessons in a university in any state of America can be examined by
a student studying in a city of Africa or the Far East. This dizzying
communication we have mentioned happened thanks to fast
developments in computer and internet technologies. While these
developments occur in the world, Turkey that has a very large young
population and whose electronic infrastructure rapidly improves has
also been affected by these developments. Nowadays, mobile devices
have become common and thus, it causes to increase data traffic in
social networks. This study was carried out on students in the
different age groups in Selcuk University Vocational School of
Technical Sciences, the Department of Computer Technology.
Students’ opinions about the use of internet and social media were
obtained. The features such as using the Internet and social media
skills, purposes, operating frequency, accessing facilities and tools,
social life and effects on vocational education and so forth were
explored. The positive effects and negative effects of both internet
and social media use on the students in this department and findings
are evaluated from different perspectives and results are obtained. In
addition, relations and differences were found out statistically.
Abstract: In this paper we propose a discrete tracking control of
nonholonomic mobile robots with two degrees of freedom. The
electromechanical model of a mobile robot moving on a horizontal
surface without slipping, with two rear wheels controlled by two
independent DC electric, and one front roal wheel is considered. We
present backstepping design based on the Euler approximate discretetime
model of a continuous-time plant. Theoretical considerations are
verified by numerical simulation.
Abstract: Nature is the immense gifted source for solving
complex problems. It always helps to find the optimal solution to
solve the problem. Mobile Ad Hoc NETwork (MANET) is a wide
research area of networks which has set of independent nodes. The
characteristics involved in MANET’s are Dynamic, does not depend
on any fixed infrastructure or centralized networks, High mobility.
The Bio-Inspired algorithms are mimics the nature for solving
optimization problems opening a new era in MANET. The typical
Swarm Intelligence (SI) algorithms are Ant Colony Optimization
(ACO), Artificial Bee Colony (ABC), Particle Swarm Optimization
(PSO), Modified Termite Algorithm, Bat Algorithm (BA), Wolf
Search Algorithm (WSA) and so on. This work mainly concentrated
on nature of MANET and behavior of nodes. Also it analyses various
performance metrics such as throughput, QoS and End-to-End delay
etc.
Abstract: The feedbacks obtained regarding the sense of
presence from pilot users operating a Mobile Robotic presence
(MRP) system to visit a simulated museum are reported in this paper.
The aim is to investigate how much the perception of system’s
usefulness and ease of use is affected by operators’ sense of social
telepresence (presence) in the remote location. Therefore, scenarios
of visiting a museum are simulated and the user operators are
supposed to perform some regular tasks inside the remote
environment including interaction with local users, navigation and
visiting the artworks. Participants were divided into two groups,
those who had previous experience of operation and interaction with
a MRP system and those who never had experience. Based on the
results, both groups provided different feedbacks. Moreover, there
was a significant association between user’s sense of presence and
their perception of system usefulness and ease of use.
Abstract: Robotics brings together several very different
engineering areas and skills. There are various types of robot such as
humanoid robot, mobile robots, remotely operated vehicles, modern
autonomous robots etc. This survey paper advocates the operation of a
robotic car (remotely operated vehicle) that is controlled by a mobile
phone (communicate on a large scale over a large distance even from
different cities). The person makes a call to the mobile phone placed
in the car. In the case of a call, if any one of the button is pressed, a
tone equivalent to the button pressed is heard at the other end of the
call. This tone is known as DTMF (Dual Tone Multiple Frequency).
The car recognizes this DTMF tone with the help of the phone stacked
in the car. The received tone is processed by the Arduino
microcontroller. The microcontroller is programmed to acquire a
decision for any given input and outputs its decision to motor drivers
in order to drive the motors in the forward direction or backward
direction or left or right direction. The mobile phone that makes a call
to cell phone stacked in the car act as a remote.
Abstract: This paper addresses the issue of the autonomous
mobile robot (AMR) navigation task based on the hybrid control
modes. The novel hybrid control mode, based on multi-sensors
information by using the fuzzy approach, has been presented in this
research. The system operates in real time, is robust, enables the robot
to operate with imprecise knowledge, and takes into account the
physical limitations of the environment in which the robot moves,
obtaining satisfactory responses for a large number of different
situations. An experiment is simulated and carried out with a pioneer
mobile robot. From the experimental results, the effectiveness and
usefulness of the proposed AMR obstacle avoidance and navigation
scheme are confirmed. The experimental results show the feasibility,
and the control system has improved the navigation accuracy. The
implementation of the controller is robust, has a low execution time,
and allows an easy design and tuning of the fuzzy knowledge base.