Energy Detection Based Sensing and Primary User Traffic Classification for Cognitive Radio

As wireless communication services grow quickly; the seriousness of spectrum utilization has been on the rise gradually. An emerging technology, cognitive radio has come out to solve today’s spectrum scarcity problem. To support the spectrum reuse functionality, secondary users are required to sense the radio frequency environment, and once the primary users are found to be active, the secondary users are required to vacate the channel within a certain amount of time. Therefore, spectrum sensing is of significant importance. Once sensing is done, different prediction rules apply to classify the traffic pattern of primary user. Primary user follows two types of traffic patterns: periodic and stochastic ON-OFF patterns. A cognitive radio can learn the patterns in different channels over time. Two types of classification methods are discussed in this paper, by considering edge detection and by using autocorrelation function. Edge detection method has a high accuracy but it cannot tolerate sensing errors. Autocorrelation-based classification is applicable in the real environment as it can tolerate some amount of sensing errors.

Effect of Two Entomopathogenic Fungi Beauveria bassiana and Metarhizium anisopliae var. acridum on the Haemolymph of the Desert Locust Schistocerca gregaria

Effect of Beauveria bassiana and Metarhizium anisopliae var. acridum on the 5th instar nymphs of Schistocerca gregaria was studied in the laboratory. Infection by these both entomopathogenic fungi caused reduction in the hemolymph total protein. The average amounts of total proteins were 2.3, 2.07, 2.09 µg/100 ml of haemolymph in the control and M. anisopliae var. acridum, and B. bassiana based-treatments, respectively. Three types of haemocytes were recognized and identified as prohaemocytes, plasmatocytes and granulocytes. The treatment caused significant reduction in the total haemocyte count and in each haemocyte type on the 9th day after its application.

Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring

This paper describes the proficient way of choosing the cluster head based on dominating set algorithm in a wireless sensor network (WSN). The algorithm overcomes the energy deterioration problems by this selection process of cluster heads. Clustering algorithms such as LEACH, EEHC and HEED enhance scalability in WSNs. Dominating set algorithm keeps the first node alive longer than the other protocols previously used. As the dominating set of cluster heads are directly connected to each node, the energy of the network is saved by eliminating the intermediate nodes in WSN. Security and trust is pivotal in network messaging. Cluster head is secured with a unique key. The member can only connect with the cluster head if and only if they are secured too. The secured trust model provides security for data transmission in the dominated set network with the group key. The concept can be extended to add a mobile sink for each or for no of clusters to transmit data or messages between cluster heads and to base station. Data security id preferably high and data loss can be prevented. The simulation demonstrates the concept of choosing cluster heads by dominating set algorithm and trust evaluation using DSTE. The research done is rationalized.

A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System

Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Performance Analysis of Bluetooth Low Energy Mesh Routing Algorithm in Case of Disaster Prediction

Ubiquity of natural disasters during last few decades have risen serious questions towards the prediction of such events and human safety. Every disaster regardless its proportion has a precursor which is manifested as a disruption of some environmental parameter such as temperature, humidity, pressure, vibrations and etc. In order to anticipate and monitor those changes, in this paper we propose an overall system for disaster prediction and monitoring, based on wireless sensor network (WSN). Furthermore, we introduce a modified and simplified WSN routing protocol built on the top of the trickle routing algorithm. Routing algorithm was deployed using the bluetooth low energy protocol in order to achieve low power consumption. Performance of the WSN network was analyzed using a real life system implementation. Estimates of the WSN parameters such as battery life time, network size and packet delay are determined. Based on the performance of the WSN network, proposed system can be utilized for disaster monitoring and prediction due to its low power profile and mesh routing feature.

NOx Emission and Computational Analysis of Jatropha Curcus Fuel and Crude Oil

Diminishing of conventional fuels and hysterical vehicles emission leads to deterioration of the environment, which emphasize the research to work on biofuels. Biofuels from different sources attract the attention of research due to low emission and biodegradability. Emission of carbon monoxide, carbon dioxide and H-C reduced drastically using Biofuels (B-20) combustion. Contrary to the conventional fuel, engine emission results indicated that nitrous oxide emission is higher in Biofuels. So this paper examines and compares the nitrogen oxide emission of Jatropha Curcus (JCO) B-20% blends with the vegetable oil. In addition to that computational analysis of crude non edible oil performed to assess the impact of composition on emission quality. In conclusion, JCO have the potential feedstock for the biodiesel production after the genetic modification in the plant.

NiO-CeO2 Nano-Catalyst for the Removal of Priority Organic Pollutants from Wastewater through Catalytic Wet Air Oxidation at Mild Conditions

Catalytic wet air oxidation (CWAO) is normally carried out at elevated temperature and pressure. This work investigates the potential of NiO-CeO2 nano-catalyst in CWAO of paper industry wastewater under milder operating conditions of 90 °C and 1 atm. The NiO-CeO2 nano-catalysts were synthesized by a simple co-precipitation method and characterized by X-ray diffraction (XRD), before and after use, in order to study any crystallographic change during experiment. The extent of metal-leaching from the catalyst was determined using the inductively coupled plasma optical emission spectrometry (ICP-OES). The catalytic activity of nano-catalysts was studied in terms of total organic carbon (TOC), adsorbable organic halides (AOX) and chlorophenolics (CHPs) removal. Interestingly, mixed oxide catalysts exhibited higher activity than the corresponding single-metal oxides. The maximum removal efficiency was achieved with Ce40Ni60 catalyst. The results indicate that the CWAO process is efficient in removing the priority organic pollutants from wastewater, as it exhibited up to 59% TOC, 55% AOX, and 54 % CHPs removal.

Seismic Performance Assessment of Pre-70 RC Frame Buildings with FEMA P-58

Past earthquakes have shown that seismic events may incur large economic losses in buildings. FEMA P-58 provides engineers a practical tool for the performance seismic assessment of buildings. In this study, FEMA P-58 is applied to two typical Italian pre-1970 reinforced concrete frame buildings, characterized by plain rebars as steel reinforcement and masonry infills and partitions. Given that suitable tools for these buildings are missing in FEMA P- 58, specific fragility curves and loss functions are first developed. Next, building performance is evaluated following a time-based assessment approach. Finally, expected annual losses for the selected buildings are derived and compared with past applications to old RC frame buildings representative of the US building stock. 

Study on the Effect of Pre-Operative Patient Education on Post-Operative Outcomes

Patient satisfaction represents a crucial aspect in the evaluation of health care services. Preoperative teaching provides the patient with pertinent information concerning the surgical process and the intended surgical procedure as well as anticipated patient behavior (anxiety, fear), expected sensation, and the probable outcomes. Although patient education is part of Accreditation protocols, it is not uniform at most places. The aim of this study was to try to assess the benefit of preoperative patient education on selected post-operative outcome parameters; mainly, post-operative pain scores, requirement of additional analgesia, return to activity of daily living and overall patient satisfaction, and try to standardize few education protocols. Dependent variables were measured before and after the treatment on a study population of 302 volunteers. Educational intervention was provided by the Investigator in the preoperative period to the study group through personal counseling. An information booklet contained detailed information was also provided. Statistical Analysis was done using Chi square test, Mann Whitney u test and Fischer Exact Test on a total of 302 subjects. P value

Immunohistochemical Expression of β-catenin and Epidermal Growth Factor Receptor in Adamantinomatous Craniopharyngioma

Introduction: Craniopharyngiomas (CPs) are rare epithelial tumors located mainly in the sellar/parasellar region. CPs have been classified histopathologically, genetically, clinically and prognostically into two distinctive subtypes: adamantinomatous and papillary variants. Aim: To examine the pattern of expression of both the β-catenin and epidermal growth factor receptor (EGFR) in surgically resected samples of adamantinomatous CP, and to asses for the possibility of using anti-EGFR in the management of ACP patients. Materials and methods: β-catenin and EGFR immunostaining was performed on paraffin-embedded tissue sections of 18 ACP cases. Result: 17 out of 18 cases (94%) of ACP exhibited strong nuclear/cytoplasmic expression of β-catenin, 15 (83%) of APC cases were positive for EGFR. Conclusion: Nuclear accumulation of β-catenin is a diagnostic hallmark of ACP. EGFR positivity in most cases of ACP could qualify the use of anti-EGFR therapy. 

Co-Pyrolysis of Olive Pomace with Plastic Wastes and Characterization of Pyrolysis Products

Waste polyethylene (PE) is classified as waste low density polyethylene (LDPE) and waste high density polyethylene (HDPE) according to their densities. Pyrolysis of plastic waste may have an important role in dealing with the enormous amounts of plastic waste produced all over the world, by decreasing their negative impact on the environment. This waste may be converted into economically valuable hydrocarbons, which can be used both as fuels and as feed stock in the petrochemical industry. End product yields and properties depend on the plastic waste composition. Pyrolytic biochar is one of the most important products of waste plastics pyrolysis. In this study, HDPE and LDPE plastic wastes were co-pyrolyzed together with waste olive pomace. Pyrolysis runs were performed at temperature 700°C with heating rates of 5°C/min. Higher pyrolysis oil and gas yields were observed by the using waste olive pomace. The biochar yields of HDPE- olive pomace and LDPEolive pomace were 6.37% and 7.26% respectively for 50% olive pomace doses. The calorific value of HDPE-olive pomace and LDPE-olive pomace of pyrolysis oil were 8350 and 8495 kCal.

Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Preparation of Heterogeneous Ferrite Catalysts and Their Application for Fenton-Like Oxidation of Radioactive Organic Wastewater

Fenton oxidation technology is the general strategy for the treatment of organic compounds-contained wastewater. However, a considerable amount of ferric sludge was produced during the Fenton process as secondary wastes, which were needed to be further removed from the effluent and treated. In this study, heterogeneous catalysts based on ferrite oxide (Cu-Fe-Ce-O) were synthesized and characterized, and their application for Fenton-like oxidation of simulated and actual radioactive organic wastewater was investigated. The results of TOC decomposition efficiency around 54% ~ 99% were obtained when the catalyst loading, H2O2 loading, pH, temperature, and reaction time were controlled. In this case, no secondary wastes formed and the given catalysts were able to be separated by magnetic devices and reused again.

Ramification of Oil Prices on Renewable Energy Deployment

This paper contributes to the literature by updating the analysis of the impact of the recent oil prices fall on the renewable energy (RE) industry and deployment. The research analysis uses the Renewable Energy Industrial Index (RENIXX), which tracks the world’s 30 largest publicly traded companies and oil prices daily data from January 2003 to March 2016. RENIXX represents RE industries developing solar, wind, geothermal, bioenergy, hydropower and fuel cells technologies. This paper tests the hypothesis that claims high oil prices encourage the substitution of alternate energy sources for conventional energy sources. Furthermore, it discusses RENIXX performance behavior with respect to the governments’ policies factor that investors should take into account. Moreover, the paper proposes a theoretical model that relates RE industry progress with oil prices and policies through the fuzzy logic system.

An Energy Aware Data Aggregation in Wireless Sensor Network Using Connected Dominant Set

Wireless Sensor Networks (WSNs) have many advantages. Their deployment is easier and faster than wired sensor networks or other wireless networks, as they do not need fixed infrastructure. Nodes are partitioned into many small groups named clusters to aggregate data through network organization. WSN clustering guarantees performance achievement of sensor nodes. Sensor nodes energy consumption is reduced by eliminating redundant energy use and balancing energy sensor nodes use over a network. The aim of such clustering protocols is to prolong network life. Low Energy Adaptive Clustering Hierarchy (LEACH) is a popular protocol in WSN. LEACH is a clustering protocol in which the random rotations of local cluster heads are utilized in order to distribute energy load among all sensor nodes in the network. This paper proposes Connected Dominant Set (CDS) based cluster formation. CDS aggregates data in a promising approach for reducing routing overhead since messages are transmitted only within virtual backbone by means of CDS and also data aggregating lowers the ratio of responding hosts to the hosts existing in virtual backbones. CDS tries to increase networks lifetime considering such parameters as sensors lifetime, remaining and consumption energies in order to have an almost optimal data aggregation within networks. Experimental results proved CDS outperformed LEACH regarding number of cluster formations, average packet loss rate, average end to end delay, life computation, and remaining energy computation.

A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

A Survey on Requirements and Challenges of Internet Protocol Television Service over Software Defined Networking

Over the last years, the demand for high bandwidth services, such as live (IPTV Service) and on-demand video streaming, steadily and rapidly increased. It has been predicted that video traffic (IPTV, VoD, and WEB TV) will account more than 90% of global Internet Protocol traffic that will cross the globe in 2016. Consequently, the importance and consideration on requirements and challenges of service providers faced today in supporting user’s requests for entertainment video across the various IPTV services through virtualization over Software Defined Networks (SDN), is tremendous in the highest stage of attention. What is necessarily required, is to deliver optimized live and on-demand services like Internet Protocol Service (IPTV Service) with low cost and good quality by strictly fulfill the essential requirements of Clients and ISP’s (Internet Service Provider’s) in the same time. The aim of this study is to present an overview of the important requirements and challenges of IPTV service with two network trends on solving challenges through virtualization (SDN and Network Function Virtualization). This paper provides an overview of researches published in the last five years.

Production of Biodiesel Using Tannery Fleshing as a Feedstock via Solid-State Fermentation

This study was initiated to evaluate and optimize the conversion of animal fat from tannery wastes into methyl ester. In the pre-treatment stage, animal fats feedstock was hydrolysed and esterified through solid state fermentation (SSF) using Microbacterium species immobilized onto sand silica matrix. After 72 hours of fermentation, predominant esters in the animal fats were found to be with 83.9% conversion rate. Later, esterified animal fats were transesterified at 3 hour reaction time with 1% NaOH (w/v %), 6% methanol to oil ratio (w/v %) to produce 89% conversion rate. C13 NMR revealed long carbon chain in fatty acid methyl esters at 22.2817-31.9727 ppm. Methyl esters of palmitic, stearic, oleic represented the major components in biodiesel.

Using Phase Equilibrium Theory to Calculate Solubility of γ-Oryzanol in Supercritical CO2

Even its content is rich in antioxidants ϒ-oryzanol, rice bran is not used properly as functional food. This research aims to (1) extract ϒ-oryzanol; (2) determine the solubility of ϒ-oryzanol in supercritical CO2 based on phase equilibrium theory; and (3) study the effect of process variables on solubility. Extraction experiments were carried out for rice bran (5 g) at various extraction pressures, temperatures and reaction times. The flowrate of supercritical fluid through the extraction vessel was 25 g/min. The extracts were collected and analysed with high-pressure liquid chromatography (HPLC). The conclusion based on the experiments are as: (1) The highest experimental solubility was 0.303 mcg/mL RBO at T= 60°C, P= 90 atm, t= 30 min; (2) Solubility of ϒ-oryzanol was influenced by pressure and temperature. As the pressure and temperature increase, the solubility increases; (3) The solubility data of supercritical extraction can be successfully determined using phase equilibrium theory. Meanwhile, tocopherol was found and slightly investigated in this work.

Structure of the Working Time of Nurses in Emergency Departments in Polish Hospitals

An analysis of the distribution of nurses’ working time constitutes vital information for the management in planning employment. The objective of the study was to analyze the distribution of nurses’ working time in an emergency department. The study was conducted in an emergency department of a teaching hospital in Lublin, in Southeast Poland. The catalogue of activities performed by nurses was compiled by means of continuous observation. Identified activities were classified into four groups: Direct care, indirect care, coordination of work in the department and personal activities. Distribution of nurses’ working time was determined by work sampling observation (Tippett) at random intervals. The research project was approved by the Research Ethics Committee by the Medical University of Lublin (Protocol 0254/113/2010). On average, nurses spent 31% of their working time on direct care, 47% on indirect care, 12% on coordinating work in the department and 10% on personal activities. The most frequently performed direct care tasks were diagnostic activities – 29.23% and treatment-related activities – 27.69%. The study has provided information on the complexity of performed activities and utilization of nurses’ working time. Enhancing the effectiveness of nursing actions requires working out a strategy for improved management of the time nurses spent at work. Increasing the involvement of auxiliary staff and optimizing communication processes within the team may lead to reduction of the time devoted to indirect care for the benefit of direct care.