Abstract: Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.
Abstract: Virtually all existing networked system management
tools use a Manager/Agent paradigm. That is, distributed agents are
deployed on managed devices to collect local information and report
it back to some management unit. Even those that use standard
protocols such as SNMP fall into this model. Using standard protocol
has the advantage of interoperability among devices from different
vendors. However, it may not be able to provide customized
information that is of interest to satisfy specific management needs.
In this dissertation work, different approaches are used to
collect information regarding the devices attached to a Local Area
Network. An SNMP aware application is being developed that will
manage the discovery procedure and will be used as data collector.
Abstract: Hydrogenated biodiesel is one of the most promising
renewable fuels. It has many advantages over conventional biodiesel,
including higher cetane number, higher heating value, lower
viscosity, and lower corrosiveness due to its absence of oxygen.
From previous work, Pd/TiO2 gave high conversion and selectivity in
hydrogenated biodiesel. In this work, the effect of biomass feedstocks
(i.e. beef fat, chicken fat, pork fat, and jatropha oil) on the production
of hydrogenated biodiesel over Pd/TiO2 has been studied. Biomass
feedstocks were analyzed by ICP-OES (inductively coupled plasma
optical emission spectrometry) to identify the content of impurities
(i.e. P, K, Ca, Na, and Mg). The deoxygenation catalyst, Pd/TiO2,
was prepared by incipient wetness impregnation (IWI) and tested in a
continuous flow packed-bed reactor at 500 psig, 325°C, H2/feed
molar ratio of 30, and LHSV of 4 h-1 for its catalytic activity and
selectivity in hydrodeoxygenation. All feedstocks gave high
selectivity in diesel specification range hydrocarbons and the main
hydrocarbons were n-pentadecane (n-C15) and n-heptadecane (n-
C17), resulting from the decarbonylation/decarboxylation reaction.
Intermediates such as oleic acid, stearic acid, palmitic acid, and esters
were also detected in minor amount. The conversion of triglycerides
in jatropha oil is higher than those of chicken fat, pork fat, and beef
fat, respectively. The higher concentration of metal impurities in
feedstock, the lower conversion of feedstock.
Abstract: This paper present some preliminary work on the
preparation and physicochemical caracterization of nanocomposite
MFI-alumina structures based on alumina hollow fibres. The fibers
are manufactured by a wet spinning process. α-alumina particles were
dispersed in a solution of polysulfone in NMP. The resulting slurry is
pressed through the annular gap of a spinneret into a precipitation
bath. The resulting green fibres are sintered. The mechanical strength
of the alumina hollow fibres is determined by a three-point-bending
test while the pore size is characterized by bubble-point testing. The
bending strength is in the range of 110 MPa while the average pore
size is 450 nm for an internal diameter of 1 mm and external diameter
of 1.7 mm. To characterize the MFI membranes various techniques
were used for physicochemical characterization of MFI–ceramic
hollow fibres membranes: The nitrogen adsorption, X-ray
diffractometry, scanning electron microscopy combined with X
emission microanalysis. Scanning Electron Microscopy (SEM) and
Energy Dispersive Microanalysis by the X-ray were used to observe
the morphology of the hollow fibre membranes (thickness,
infiltration into the carrier, defects, homogeneity). No surface film,
has been obtained, as observed by SEM and EDX analysis and
confirmed by high temperature variation of N2 and CO2 gas
permeances before cation exchange. Local analysis and characterise
(SEM and EDX) and overall (by ICP elemental analysis) were
conducted on two samples exchanged to determine the quantity and
distribution of the cation of cesium on the cross section fibre of the
zeolite between the cavities.
Abstract: The growing problem of youth unemployment in
Egypt after the 25th January Revolution has directed the attention of
some human resource experts towards considering remote
employment as a partial remedy for the unemployed youth instead of
the unavailable traditional jobs, a trend which will also help with the
congested offices and unsolved traffic problem in Cairo and spread
a flexible work culture, but despite of that, the main issue remains
unresolved for these organizations to deal with the system challenges.
In the past few years, in developed countries, there has been a
growing trend for many companies to shift to remote employment
instead of the traditional office employment for many reasons: due to
the growing technological advances that helped some employees do
their work from home on a part time basis, the need for achieving an
employee-s work balance in the middle of unbalanced complicated
life, top management focus on employee-s productivity rather their
time spent at work. The objective of this paper is to study and analyze
the advantages and challenges that Egypt-s labor force will be facing
in their implementation of remote or virtual employment in both
government and private organizations after the 25th January
revolution. Therefore, the research question will be: What are the
advantages and different challenges that Egyptian organizations
might face in their implementation for remote employment system
and how can they manage these challenges for the system to work
effectively? The study is divided into six main parts: the introduction,
objective and importance of the study, research problem,
methodology, experience of some countries that implemented remote
employment, advantages and challenges of implementing remote
employment in Egypt and then the conclusion which discuses the
results and recommendations of the study.
Abstract: Texture classification is a trendy and a catchy
technology in the field of texture analysis. Textures, the repeated
patterns, have different frequency components along different
orientations. Our work is based on Texture Classification and its
applications. It finds its applications in various fields like Medical
Image Classification, Computer Vision, Remote Sensing,
Agricultural Field, and Textile Industry. Weed control has a major
effect on agriculture. A large amount of herbicide has been used for
controlling weeds in agriculture fields, lawns, golf courses, sport
fields, etc. Random spraying of herbicides does not meet the exact
requirement of the field. Certain areas in field have more weed
patches than estimated. So, we need a visual system that can
discriminate weeds from the field image which will reduce or even
eliminate the amount of herbicide used. This would allow farmers to
not use any herbicides or only apply them where they are needed. A
machine vision precision automated weed control system could
reduce the usage of chemicals in crop fields. In this paper, an
intelligent system for automatic weeding strategy Multi Resolution
Combined Statistical & spatial Frequency is used to discriminate the
weeds from the crops and to classify them as narrow, little and broad
weeds.
Abstract: Achieving success is a highly critical issue for the
companies to survive in a competitive business environment. The
construction industry is also an area where there is strong
competition due to a large number of construction contractors. There
have been many factors such as qualified employees, quality
workmanship and financial management that can lead to company
success in the construction industry. The aim of this study was to
investigate the critical factors leading to construction company
success. Within this context, a survey was carried out among 40
Turkish construction companies which are located in the Northwest
region of Turkey. In this survey, top-level managers and owners of
the companies were interviewed. The interviews took place over a
five month period between January and May 2007. Finally, the
ranking of the critical success factors has been determined by using
the Simple Multi Attribute Rating Technique (SMART). Based on
the results, business management, financial conditions and
owner/manager characteristics were determined as the most
important factors to company success.
Abstract: the current study presents a modeling framework to determine the torsion strength of an induction hardened splined shaft by considering geometry and material aspects with the aim to optimize the static torsion strength by selection of spline geometry and hardness depth. Six different spline geometries and seven different hardness profiles including non-hardened and throughhardened shafts have been considered. The results reveal that the torque that causes initial yielding of the induction hardened splined shaft is strongly dependent on the hardness depth and the geometry of the spline teeth. Guidelines for selection of the appropriate hardness depth and spline geometry are given such that an optimum static torsion strength of the component can be achieved.
Abstract: In this work the design and characterization of an optoelectronic automated measurement system it is presented. The optoelectronic devices of this system are an optical transmitter, the optical components and the optical receiver, which were selected for a great precision of the system. The mechanical system allows free displacement of the components as well as the devices that generate the movement. The results, length and profile of the objects are display in Lab View.
Abstract: In this document we studied more in detail the Performances of the vertical handover in the networks WLAN, WiMAX, UMTS before studying of it the Procedure of Handoff Vertical, the whole buckled by simulations putting forward the performances of the handover in the heterogeneous networks. The goal of Vertical Handover is to carry out several accesses in real-time in the heterogeneous networks. This makes it possible a user to use several networks (such as WLAN UMTS andWiMAX) in parallel, and the system to commutate automatically at another basic station, without disconnecting itself, as if there were no cut and with little loss of data as possible.
Abstract: Space Vector Modulation (SVM) is an optimum Pulse Width Modulation (PWM) technique for an inverter used in a variable frequency drive applications. It is computationally rigorous and hence limits the inverter switching frequency. Increase in switching frequency can be achieved using Neural Network (NN) based SVM, implemented on application specific chips. This paper proposes a neural network based SVM technique for a Voltage Source Inverter (VSI). The network proposed is independent of switching frequency. Different architectures are investigated keeping the total number of neurons constant. The performance of the inverter is compared for various switching frequencies for different architectures of NN based SVM. From the results obtained, the network with minimum resource and appropriate word length is identified. The bit precision required for this application is identified. The network with 8-bit precision is implemented in the IC XCV 400 and the results are presented. The performance of NN based general purpose SVM with higher bit precision is discussed.
Abstract: In the current study we present a system that is
capable to deliver proxy based differentiated service. It will help the
carrier service node to sell a prepaid service to clients and limit the
use to a particular mobile device or devices for a certain time. The
system includes software and hardware architecture for a mobile
device with moderate computational power, and a secure protocol for
communication between it and its carrier service node. On the
carrier service node a proxy runs on a centralized server to be
capable of implementing cryptographic algorithms, while the mobile
device contains a simple embedded processor capable of executing
simple algorithms. One prerequisite is needed for the system to run
efficiently that is a presence of Global Trusted Verification Authority
(GTVA) which is equivalent to certifying authority in IP networks.
This system appears to be of great interest for many commercial
transactions, business to business electronic and mobile commerce,
and military applications.
Abstract: This paper reviews the optimization available
transmission capability (ATC) of power systems using a device of
FACTS named SSSC equipped with energy storage devices. So that,
emplacement and improvement of parameters of SSSC will be
illustrated. Thus, voltage magnitude constraints of network buses,
line transient stability constraints and voltage breakdown constraints
are considered. To help the calculations, a comprehensive program in
DELPHI is provided, which is able to simulate and trace the
parameters of SSSC has been installed on a specific line.
Furthermore, the provided program is able to compute ATC, TTC
and maximum value of their enhancement after using SSSC.
Abstract: The paper describes the workings for four models of
CONWIP systems used till date; the basic CONWIP system, the
hybrid CONWIP system, the multi-product CONWIP system, and the
parallel CONWIP system. The final novel model is introduced in this
paper in a general form. These models may be adopted for analysis
for both simulation studies and implementation on the shop floor. For
each model, input parameters of interest are highlighted and their
impacts on several system performance measures are addressed.
Abstract: Construction site safety in China has aroused
comprehensive concern all over the world. It is imperative to
investigate the main causes of poor construction site safety. This paper
divides all the causes into four aspects, namely the factors of workers,
object, environment and management and sets up the accident causes
element system based on Delphi Method. This is followed by the
application of structural equation modeling to examine the importance
of each aspect of causes from the standpoints of different roles related
to the construction respectively. The results indicate that all the four
aspects of factors are in need of improvement, and different roles have
different ideas considering the priority of those factors. The paper has
instructive significance for the practitioners to take measures to
improve construction site safety in China accordingly.
Abstract: In this paper, a neural network technique is applied to
real-time classifying media while a projectile is penetrating through
them. A laboratory-scaled penetrating setup was built for the
experiment. Features used as the network inputs were extracted from
the acceleration of penetrator. 6000 set of features from a single
penetration with known media and status were used to train the neural
network. The trained system was tested on 30 different penetration
experiments. The system produced an accuracy of 100% on the
training data set. And, their precision could be 99% for the test data
from 30 tests.
Abstract: It is expected that ubiquitous era will come soon. A ubiquitous environment has features like peer-to-peer and nomadic environments. Such features can be represented by peer-to-peer systems and mobile ad-hoc networks (MANETs). The features of P2P systems and MANETs are similar, appealing for implementing P2P systems in MANET environment. It has been shown that, however, the performance of the P2P systems designed for wired networks do not perform satisfactorily in mobile ad-hoc environment. Subsequently, this paper proposes a method to improve P2P performance using cross-layer design and the goodness of a node as a peer. The proposed method uses routing metric as well as P2P metric to choose favorable peers to connect. It also utilizes proactive approach for distributing peer information. According to the simulation results, the proposed method provides higher query success rate, shorter query response time and less energy consumption by constructing an efficient overlay network.
Abstract: The voice signal in Voice over Internet protocol (VoIP) system is processed through the best effort policy based IP network, which leads to the network degradations including delay, packet loss jitter. The work in this paper presents the implementation of finite impulse response (FIR) filter for voice quality improvement in the VoIP system through distributed arithmetic (DA) algorithm. The VoIP simulations are conducted with AMR-NB 6.70 kbps and G.729a speech coders at different packet loss rates and the performance of the enhanced VoIP signal is evaluated using the perceptual evaluation of speech quality (PESQ) measurement for narrowband signal. The results show reduction in the computational complexity in the system and significant improvement in the quality of the VoIP voice signal.
Abstract: Mobile Ad Hoc network is an infrastructure less
network which operates with the coordination of each node. Each node
believes to help another node, by forwarding its data to/from another
node. Unlike a wired network, nodes in an ad hoc network are resource
(i.e. battery, bandwidth computational capability and so on)
constrained. Such dependability of one node to another and limited
resources of nodes can result in non cooperation by any node to
accumulate its resources. Such non cooperation is known as selfish
behavior.
This paper discusses the performance analysis of very well known
MANET single-path (i.e. AODV) and multi-path (i.e. AOMDV)
routing protocol, in the presence of selfish behaviors. Along with
existing selfish behaviors, a new variation is also studied. Extensive
simulations were carried out using ns-2 and the study concluded that
the multi-path protocol (i.e. AOMDV) with link disjoint configuration
outperforms the other two configurations.