Abstract: Recently, a vehicular ad-hoc networks(VANETs) for
Intelligent Transport System(ITS) have become able safety and convenience services surpassing the simple services such as
an electronic toll collection system. To provide the proper services,
VANET needs infrastructure over the country infrastructure. Thus, we have to spend a huge sum of
human resources. In this reason, several studies have been made on the
usage of cellular networks instead of new protocols
this study is to assess a performance evaluation of the
cellular network for VANET. In this paper, the result of a
for the suitability of cellular networks for VANET
experiment, The LTE(Long Term Evolution) of cellular networks found to be most suitable among the others cellular networks
Abstract: to simulate the phenomenon of electronic transport in semiconductors, we try to adapt a numerical method, often and most frequently it’s that of Monte Carlo. In our work, we applied this method in the case of a ternary alloy semiconductor GaInP in its cubic form; The Calculations are made using a non-parabolic effective-mass energy band model. We consider a band of conduction to three valleys (ΓLX), major of the scattering mechanisms are taken into account in this modeling, as the interactions with the acoustic phonons (elastic collisions) and optics (inelastic collisions). The polar optical phonons cause anisotropic collisions, intra-valleys, very probable in the III-V semiconductors. Other optical phonons, no polar, allow transitions inter-valleys. Initially, we present the full results obtained by the simulation of Monte Carlo in GaInP in stationary regime. We consider thereafter the effects related to the application of an electric field varying according to time, we thus study the transient phenomenon which make their appearance in ternary material
Abstract: The success of an electronic system in a System-on- Chip is highly dependent on the efficiency of its interconnection network, which is constructed from routers and channels (the routers move data across the channels between nodes). Since neither classical bus based nor point to point architectures can provide scalable solutions and satisfy the tight power and performance requirements of future applications, the Network-on-Chip (NoC) approach has recently been proposed as a promising solution. Indeed, in contrast to the traditional solutions, the NoC approach can provide large bandwidth with moderate area overhead. The selected topology of the components interconnects plays prime rule in the performance of NoC architecture as well as routing and switching techniques that can be used. In this paper, we present two generic NoC architectures that can be customized to the specific communication needs of an application in order to reduce the area with minimal degradation of the latency of the system. An experimental study is performed to compare these structures with basic NoC topologies represented by 2D mesh, Butterfly-Fat Tree (BFT) and SPIN. It is shown that Cluster mesh (CMesh) and MinRoot schemes achieves significant improvements in network latency and energy consumption with only negligible area overhead and complexity over existing architectures. In fact, in the case of basic NoC topologies, CMesh and MinRoot schemes provides substantial savings in area as well, because they requires fewer routers. The simulation results show that CMesh and MinRoot networks outperforms MESH, BFT and SPIN in main performance metrics.
Abstract: In this paper, an intelligent algorithm for optimal
document archiving is presented. It is kown that electronic archives
are very important for information system management. Minimizing
the size of the stored data in electronic archive is a main issue to
reduce the physical storage area. Here, the effect of different types of
Arabic fonts on electronic archives size is discussed. Simulation
results show that PDF is the best file format for storage of the Arabic
documents in electronic archive. Furthermore, fast information
detection in a given PDF file is introduced. Such approach uses fast
neural networks (FNNs) implemented in the frequency domain. The
operation of these networks relies on performing cross correlation in
the frequency domain rather than spatial one. It is proved
mathematically and practically that the number of computation steps
required for the presented FNNs is less than that needed by
conventional neural networks (CNNs). Simulation results using
MATLAB confirm the theoretical computations.
Abstract: For decades, the defense business has been plagued by
not having a reliable, deterministic method to know when the Kalman
filter solution for passive ranging application is reliable for use by the
fighter pilot. This has made it hard to accurately assess when the
ranging solution can be used for situation awareness and weapons
use. To date, we have used ad hoc rules-of-thumb to assess when we
think the estimate of the Kalman filter standard deviation on range is
reliable. A reliable algorithm has been developed at BAE Systems
Electronics & Integrated Solutions that monitors the Kalman gain
matrix elements – and a patent is pending. The “settling" of the gain
matrix elements relates directly to when we can assess the time when
the passive ranging solution is within the 10 percent-of-truth value.
The focus of the paper is on surface-based passive ranging – but the
method is applicable to airborne targets as well.
Abstract: DC-DC converters are widely used in regulated switched mode power supplies and in DC motor drive applications. There are several sources of unwanted nonlinearity in practical power converters. In addition, their operation is characterized by switching that gives birth to a variety of nonlinear dynamics. DC-DC buck and boost converters controlled by pulse-width modulation (PWM) have been simulated. The voltage waveforms and attractors obtained from the circuit simulation have been studied. With the onset of instability, the phenomenon of subharmonic oscillations, quasi-periodicity, bifurcations, and chaos have been observed. This paper is mainly motivated by potential contributions of chaos theory in the design, analysis and control of power converters, in particular and power electronics circuits, in general.
Abstract: A major challenge in biomaterials research is the
regulation of protein adsorption which is a key factor for controlling
the subsequent cell adhesion at implant surfaces. The aim of the
present study was to control the adsorption of fibronectin (FN) and
the attachment of MG-63 osteoblasts with an electronic
nanostructure. Shallow doping line lattices with a period of 260 nm
were produced for this purpose by implantation of phosphorous in
silicon wafers. Protein coverage was determined after incubating the
substrate with FN by means of an immunostaining procedure and the
measurement of the fluorescence intensity with a TECAN analyzer.
We observed an increased amount of adsorbed FN on the
nanostructure compared to control substrates. MG-63 osteoblasts
were cultivated for 24h on FN-incubated substrates and their
morphology was assessed by SEM. Preferred orientation and
elongation of the cells in direction of the doping lattice lines was
observed on FN-coated nanostructures.
Abstract: Metal matrix composites (MMC) are generating
extensive interest in diverse fields like defense, aerospace, electronics
and automotive industries. In this present investigation, material
removal rate (MRR) modeling has been carried out using an
axisymmetric model of Al-SiC composite during electrical discharge
machining (EDM). A FEA model of single spark EDM was
developed to calculate the temperature distribution.Further, single
spark model was extended to simulate the second discharge. For
multi-discharge machining material removal was calculated by
calculating the number of pulses. Validation of model has been done
by comparing the experimental results obtained under the same
process parameters with the analytical results. A good agreement was
found between the experimental results and the theoretical value.
Abstract: As the information age matures, major social
infrastructures such as communication, finance, military and energy,
have become ever more dependent on information communication
systems. And since these infrastructures are connected to the Internet,
electronic intrusions such as hacking and viruses have become a new
security threat. Especially, disturbance or neutralization of a major
social infrastructure can result in extensive material damage and social
disorder. To address this issue, many nations around the world are
researching and developing various techniques and information
security policies as a government-wide effort to protect their
infrastructures from newly emerging threats. This paper proposes an
evaluation method for information security levels of CIIP (Critical
Information Infrastructure Protection), which can enhance the security
level of critical information infrastructure by checking the current
security status and establish security measures accordingly to protect
infrastructures effectively.
Abstract: Result of the study on knowledge management systems in businesses was shown that the most of these businesses provide internet accessibility for their employees in order to study new knowledge via internet, corporate website, electronic mail, and electronic learning system. These business organizations use information technology application for knowledge management because of convenience, time saving, ease of use, accuracy of information and knowledge usefulness. The result indicated prominent improvements for corporate knowledge management systems as the following; 1) administrations must support corporate knowledge management system 2) the goal of corporate knowledge management must be clear 3) corporate culture should facilitate the exchange and sharing of knowledge within the organization 4) cooperation of personnel of all levels must be obtained 5) information technology infrastructure must be provided 6) they must develop the system regularly and constantly.
Abstract: Electronic voting (E-voting) using an internet has been
recently performed in some nations and regions. There is no spatial
restriction which a voter directly has to visit the polling place, but an
e-voting using an internet has to go together the computer in which the
internet connection is possible. Also, this voting requires an access
code for the e-voting through the beforehand report of a voter. To
minimize these disadvantages, we propose a method in which a voter,
who has the wireless certificate issued in advance, uses its own cellular
phone for an e-voting without the special registration for a vote. Our
proposal allows a voter to cast his vote in a simple and convenient way
without the limit of time and location, thereby increasing the voting
rate, and also ensuring confidentiality and anonymity.
Abstract: A new method of adaptation in a partially integrated learning environment that includes electronic textbook (ET) and integrated tutoring system (ITS) is described. The algorithm of adaptation is described in detail. It includes: establishment of Interconnections of operations and concepts; estimate of the concept mastering level (for all concepts); estimate of student-s non-mastering level on the current learning step of information on each page of ET; creation of a rank-order list of links to the e-manual pages containing information that require repeated work.
Abstract: The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital-electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent levels of trust and security served in conventional paper-based payment transactions. The paper addresses the challenge of the first trade problem in e-commerce, provides a brief literature review on electronic payment and attempts to explain the underlying concept and method of trust in relevance to electronic payment.
Abstract: Globalization, supported by information and
communication technologies, changes the rules of competitiveness
and increases the significance of information, knowledge and
network cooperation. In line with this trend, the need for efficient
trust-building tools has emerged. The absence of trust building
mechanisms and strategies was identified within several studies.
Through trust development, participation on e-business network and
usage of network services will increase and provide to SMEs new
economic benefits. This work is focused on effective trust building
strategies development for electronic business network platforms.
Based on trust building mechanism identification, the questionnairebased
analysis of its significance and minimum level of requirements
was conducted. In the paper, we are confirming the trust dependency
on e-Skills which play crucial role in higher level of trust into the
more sophisticated and complex trust building ICT solutions.
Abstract: Starting from the basic pillars of the supportability
analysis this paper queries its characteristics in LCI (Life Cycle
Integration) environment. The research methodology contents a
review of modern logistics engineering literature with the objective to
collect and synthesize the knowledge relating to standards of
supportability design in e-logistics environment. The results show
that LCI framework has properties which are in fully compatibility
with the requirement of simultaneous logistics support and productservice
bundle design. The proposed approach is a contribution to the
more comprehensive and efficient supportability design process.
Also, contributions are reflected through a greater consistency of
collected data, automated creation of reports suitable for different
analysis, as well as the possibility of their customization according
with customer needs. In addition to this, convenience of this approach
is its practical use in real time. In a broader sense, LCI allows
integration of enterprises on a worldwide basis facilitating electronic
business.
Abstract: With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography). Implementations of these two algorithms have been realized for experimental purposes. The results of analysis are given in this paper.
Abstract: A new multi-step comprehensive experience-based
learning program was developed and carried out so that the students
understood about what was the principle of the circuit function and
how the designed circuit was used in actual advanced applications.
Abstract: This article proposes a current-mode square-rooting
circuit using current follower transconductance amplifier (CTFA).
The amplitude of the output current can be electronically controlled
via input bias current with wide input dynamic range. The proposed
circuit consists of only single CFTA. Without any matching
conditions and external passive elements, the circuit is then
appropriate for an IC architecture. The magnitude of the output signal
is temperature-insensitive. The PSpice simulation results are
depicted, and the given results agree well with the theoretical
anticipation. The power consumption is approximately 1.96mW at
±1.5V supply voltages.
Abstract: Carbon fibers have specific characteristics in
comparison with industrial and structural materials used in different
applications. Special properties of carbon fibers make them attractive
for reinforcing and fabrication of composites. These fibers have been
utilized for composites of metals, ceramics and plastics. However,
it-s mainly used in different forms to reinforce lightweight polymer
materials such as epoxy resin, polyesters or polyamides. The
composites of carbon fiber are stronger than steel, stiffer than
titanium, and lighter than aluminum and nowadays they are used in a
variety of applications. This study explains applications of carbon
fibers in different fields such as space, aviation, transportation,
medical, construction, energy, sporting goods, electronics, and the
other commercial/industrial applications. The last findings of
composites with polymer, metal and ceramic matrices containing
carbon fibers and their applications in the world investigated.
Researches show that carbon fibers-reinforced composites due to
unique properties (including high specific strength and specific
modulus, low thermal expansion coefficient, high fatigue strength,
and high thermal stability) can be replaced with common industrial
and structural materials.
Abstract: In this study three commercial semiconductor devices
were characterized in the laboratory for computed tomography
dosimetry: one photodiode and two phototransistors. It was evaluated
four responses to the irradiation: dose linearity, energy dependence,
angular dependence and loss of sensitivity after X ray exposure. The
results showed that the three devices have proportional response with
the air kerma; the energy dependence displayed for each device
suggests that some calibration factors would be applied for each one;
the angular dependence showed a similar pattern among the three
electronic components. In respect to the fourth parameter analyzed,
one phototransistor has the highest sensitivity however it also showed
the greatest loss of sensitivity with the accumulated dose. The
photodiode was the device with the smaller sensitivity to radiation,
on the other hand, the loss of sensitivity after irradiation is negligible.
Since high accuracy is a desired feature for a dosimeter, the
photodiode can be the most suitable of the three devices for
dosimetry in tomography. The phototransistors can also be used for
CT dosimetry, however it would be necessary a correction factor due
to loss of sensitivity with accumulated dose.