Abstract: Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.
Abstract: The goal of this paper is to present an addressing scheme that allows for assigning a unique IPv6 address to each node in the Internet of Things (IoT) network. This scheme guarantees uniqueness by extracting the clock skew of each communication device and converting it into an IPv6 address. Simulation analysis confirms that the presented scheme provides reductions in terms of energy consumption, communication overhead and response time as compared to four studied addressing schemes Strong DAD, LEADS, SIPA and CLOSA.
Abstract: This study was conducted in the area of Vlora Bay,
Albania. Data about Sea Turtles Caretta caretta and Chelonia mydas,
belonging to two periods of time (1984 – 1991; 2008 – 2014) are
given. All data gathered were analyzed using recent methodologies.
For all turtles captured (as by catch), the Curve Carapace Length
(CCL) and Curved Carapace Width (CCW) were measured. These
data were statistically analyzed, where the mean was 67.11 cm for
CCL and 57.57 cm for CCW of all individuals studied (n=13). All
untagged individuals of marine turtles were tagged using metallic
tags (Stockbrand’s titanium tag) with an Albanian address. Sex was
determined and resulted that 45.4% of individuals were females,
27.3% males and 27.3% juveniles. All turtles were studied for the
presence of the epibionts. The area of Vlora Bay is used from marine
turtles (Caretta caretta) as a migratory corridor to pass from
Mediterranean to the northern part of the Adriatic Sea.
Abstract: In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.
Abstract: In the frame of this work, we present an optical multicasting approach based on optical code-words. Our approach associates, in the edge node, an optical code-word to a group multicast address. In the core node, a set of tunable decoders are used to send a traffic data to multiple destinations based on the received code-word. The use of code-words, which correspond to the combination of an input port and a set of output ports, allows the implementation of an optical switching matrix. At the reception of a burst, it will be delayed in an optical memory. And, the received optical code-word is split to a set of tunable optical decoders. When it matches a configured code-word, the delayed burst is switched to a set of output ports.
Abstract: Since Network-on-Chip (NoC) uses network
interfaces (NIs) to improve the design productivity, by now, there
have been a few papers addressing the design and implementation of a
NI module. However, none of them considered the difference of
address encoding methods between NoC and the traditional
bus-shared architecture. On the basis of this difference, in the paper,
we introduce a transmit mechanism to solve such a problem for global
asynchronous locally synchronous (GALS) NoC. Furthermore, we
give the concrete implementation of the NI module in this transmit
mechanism. Finally, we evaluate its performance and area overhead
by a VHDL-based cycle-accurate RTL model and simulation results
confirm the validity of this address-oriented transmit mechanism.
Abstract: Since its independence in 1962, Algeria has struggled
to establish an educational system tailored to the needs of the
population it may address. Considering the historical connection with
France, Algeria has always looked at the French language as a
cultural imperative until late in the seventies. After the Arabization
policy of 1971 and the socioeconomic changes taking place
worldwide, the use of English as a communicating vehicle started to
gain more space within globalized Algeria. Consequently, disparities
in the use of French started to fade away at the cross-roads leaving
more space to the teaching of English as a second foreign language.
Moreover, the introduction of the Bologna Process and the
European Credit Transfer System in Higher Education has
necessitated some innovations in the design and development of new
curricula adapted to the socioeconomic market. In this paper, I will
try to highlight the important historical dimensions Algeria has taken
towards the implementation of an English language methodology and
to the status it acquired from second foreign language, to first foreign
language to “the language of knowledge and sciences". I will also
propose new pedagogical perspectives for a better treatment of the
English language in order to encourage independent and autonomous
learning.
Abstract: In this paper, an efficient technique is proposed to manage the cache memory. The proposed technique introduces some modifications on the well-known set associative mapping technique. This modification requires a little alteration in the structure of the cache memory and on the way by which it can be referenced. The proposed alteration leads to increase the set size virtually and consequently to improve the performance and the utilization of the cache memory. The current mapping techniques have accomplished good results. In fact, there are still different cases in which cache memory lines are left empty and not used, whereas two or more processes overwrite the lines of each other, instead of using those empty lines. The proposed algorithm aims at finding an efficient way to deal with such problem.
Abstract: Address Matching is an important application of
Geographic Information System (GIS). Prior to Address Matching
working, obtaining X,Y coordinates is necessary, which process is
calling Address Geocoding. This study will illustrate the effective
address geocoding process of using household registry database, and
the check system for geocoded address.
Abstract: This paper presents a web based remote access
microcontroller laboratory. Because of accelerated development in
electronics and computer technologies, microcontroller-based devices
and appliances are found in all aspects of our daily life. Before the
implementation of remote access microcontroller laboratory an
experiment set is developed by teaching staff for training
microcontrollers. Requirement of technical teaching and industrial
applications are considered when experiment set is designed.
Students can make the experiments by connecting to the experiment
set which is connected to the computer that set as the web server. The
students can program the microcontroller, can control digital and
analog inputs and can observe experiment. Laboratory experiment
web page can be accessed via www.elab.aku.edu.tr address.
Abstract: This paper describes a UDP over IP based, server-oriented redundant host configuration protocol (RHCP) that can be used by collaborating embedded systems in an ad-hoc network to acquire a dynamic IP address. The service is provided by a single network device at a time and will be dynamically reassigned to one of the other network clients if the primary provider fails. The protocol also allows all participating clients to monitor the dynamic makeup of the network over time. So far the algorithm has been implemented and tested on an 8-bit embedded system architecture with a 10Mbit Ethernet interface.