Abstract: Current spectrums of a high power induction machine was calculated for the cases of full symmetry, static and dynamic eccentricity. The calculations involve integration of 93 electrical plus four mechanical ordinary differential equations. Electrical equations account for variable inductances affected by slotting and eccentricities. The calculations were followed by Fourier analysis of the stator currents in steady state operation. The paper presents the stator current spectrums in full symmetry, static and dynamic eccentricity cases, and demonstrates the harmonics present in each case. The effect of dynamic eccentricity is demonstrating via comparing the current spectrums related to dynamic eccentricity cases with the full symmetry one. The paper includes one case study, refers to dynamic eccentricity, to present the spectrum of the measured current and demonstrate the existence of the harmonics related to dynamic eccentricity. The zooms of current spectrums around the main slot harmonic zone are included to simplify the comparison and prove the existence of the dynamic eccentricity harmonics in both calculated and measured current spectrums.
Abstract: In an interval graph G = (V,E) the distance between two vertices u, v is de£ned as the smallest number of edges in a path joining u and v. The eccentricity of a vertex v is the maximum among distances from all other vertices of V . The diameter (δ) and radius (ρ) of the graph G is respectively the maximum and minimum among all the eccentricities of G. The center of the graph G is the set C(G) of vertices with eccentricity ρ. In this context our aim is to establish the relation ρ = δ 2 for an interval graph and to determine the center of it.
Abstract: Airport capacity has always been perceived in the
traditional sense as the number of aircraft operations during a
specified time corresponding to a tolerable level of average delay and
it mostly depends on the airside characteristics, on the fleet mix
variability and on the ATM. The adoption of the Directive
2002/30/EC in the EU countries drives the stakeholders to conceive
airport capacity in a different way though. Airport capacity in this
sense is fundamentally driven by environmental criteria, and since
acoustical externalities represent the most important factors, those are
the ones that could pose a serious threat to the growth of airports and
to aviation market itself in the short-medium term. The importance of
the regional airports in the deregulated market grew fast during the
last decade since they represent spokes for network carriers and a
preferential destination for low-fares carriers. Not only regional
airports have witnessed a fast and unexpected growth in traffic but
also a fast growth in the complaints for the nuisance by the people
living near those airports. In this paper the results of a study
conducted in cooperation with the airport of Bologna G. Marconi are
presented in order to investigate airport acoustical capacity as a defacto
constraint of airport growth.
Abstract: Link reliability and transmitted power are two important design constraints in wireless network design. Error control coding (ECC) is a classic approach used to increase link reliability and to lower the required transmitted power. It provides coding gain, resulting in transmitter energy savings at the cost of added decoder power consumption. But the choice of ECC is very critical in the case of wireless sensor network (WSN). Since the WSNs are energy constraint in nature, both the BER and power consumption has to be taken into count. This paper develops a step by step approach in finding suitable error control codes for WSNs. Several simulations are taken considering different error control codes and the result shows that the RS(31,21) fits both in BER and power consumption criteria.
Abstract: Modular multiplication is the basic operation
in most public key cryptosystems, such as RSA, DSA, ECC,
and DH key exchange. Unfortunately, very large operands
(in order of 1024 or 2048 bits) must be used to provide
sufficient security strength. The use of such big numbers
dramatically slows down the whole cipher system, especially
when running on embedded processors.
So far, customized hardware accelerators - developed on
FPGAs or ASICs - were the best choice for accelerating
modular multiplication in embedded environments. On the
other hand, many algorithms have been developed to speed
up such operations. Examples are the Montgomery modular
multiplication and the interleaved modular multiplication
algorithms. Combining both customized hardware with
an efficient algorithm is expected to provide a much faster
cipher system.
This paper introduces an enhanced architecture for computing
the modular multiplication of two large numbers X
and Y modulo a given modulus M. The proposed design is
compared with three previous architectures depending on
carry save adders and look up tables. Look up tables should
be loaded with a set of pre-computed values. Our proposed
architecture uses the same carry save addition, but replaces
both look up tables and pre-computations with an enhanced
version of sign detection techniques. The proposed architecture
supports higher frequencies than other architectures.
It also has a better overall absolute time for a single operation.
Abstract: According to the masonry standard the compressive
strength is basically dependent on factors such as the mortar strength
and the relative values of unit and mortar strength. However
interlocking brick has none or less use of mortar. Therefore there is a need to investigate the behavior of masonry walls using interlocking
bricks. In this study a series of tests have been conducted; physical
properties and compressive strength of brick units and masonry walls
were constructed from interlocking bricks and tested under constant
vertical load at different eccentricities. The purpose of the
experimental investigations is to obtain the force displacement curves, analyze the behavior of masonry walls. The results showed
that the brick is categorized as common brick (BS 3921:1985) and severe weathering grade (ASTM C62). The maximum compressive stress of interlocking brick wall is 3.6 N/mm2 and fulfilled the requirement of standard for residential building.
Abstract: European Rail Traffic Management System (ERTMS) is the European reference for interoperable and safer signaling systems to efficiently manage trains running. If implemented, it allows trains cross seamlessly intra-European national borders. ERTMS has defined a secure communication protocol, EURORADIO, based on open communication networks. Its RadioInfill function can improve the reaction of the signaling system to changes in line conditions, avoiding unnecessary braking: its advantages in terms of power saving and travel time has been analyzed. In this paper a software implementation of the EURORADIO protocol with RadioInfill for ERTMS Level 1 using GSM-R is illustrated as part of the SR-Secure Italian project. In this building-blocks architecture the EURORADIO layers communicates together through modular Application Programm Interfaces. Security coding rules and railway industry requirements specified by EN 50128 standard have been respected. The proposed implementation has successfully passed conformity tests and has been tested on a computer-based simulator.
Abstract: Because of architectural condition and structure application, sometimes mass source and stiffness source are not coincidence, and the structure is irregular. The structure is also might be asymmetric as an asymmetric bracing in plan which leads to unbalance distribution of stiffness or because of unbalance distribution of the mass. Both condition lead to eccentricity and torsion in the structure. The deficiency of ordinary code to evaluate the performance of steel structures against earthquake has been caused designing based on performance level or capacity spectrum be used. By using the mentioned methods it is possible to design a structure that its behavior against different earthquakes be predictive. In this article 5- story buildings with different percentage of asymmetric which is because of stiffness changes have been designed. The static and dynamic nonlinear analysis under three acceleration recording has been done. Finally performance level of the structure has been evaluated.
Abstract: In this paper, we argue the security protocols of
ZigBee wireless sensor network in MAC layer. AES 128-bit
encryption algorithm in CCM* mode is secure transferred data;
however, AES-s secret key will be break within nearest future.
Efficient public key algorithm, ECC has been mixed with AES to
rescue the ZigBee wireless sensor from cipher text and replay attack.
Also, the proposed protocol can parallelize the integrity function to
increase system performance.
Abstract: This paper studies a vital issue in wireless
communications, which is the transmission of images over Wireless
Personal Area Networks (WPANs) through the Bluetooth network. It
presents a simple method to improve the efficiency of error control
code of old Bluetooth versions over mobile WPANs through
Interleaved Error Control Code (IECC) technique. The encoded
packets are interleaved by simple block interleaver. Also, the paper
presents a chaotic interleaving scheme as a tool against bursts of
errors which depends on the chaotic Baker map. Also, the paper
proposes using the chaotic interleaver instead of traditional block
interleaver with Forward Error Control (FEC) scheme. A comparison
study between the proposed and standard techniques for image
transmission over a correlated fading channel is presented.
Simulation results reveal the superiority of the proposed chaotic
interleaving scheme to other schemes. Also, the superiority of FEC
with proposed chaotic interleaver to the conventional interleavers
with enhancing the security level with chaotic interleaving packetby-
packet basis.
Abstract: A new and highly efficient architecture for elliptic curve scalar point multiplication which is optimized for a binary field recommended by NIST and is well-suited for elliptic curve cryptographic (ECC) applications is presented. To achieve the maximum architectural and timing improvements we have reorganized and reordered the critical path of the Lopez-Dahab scalar point multiplication architecture such that logic structures are implemented in parallel and operations in the critical path are diverted to noncritical paths. With G=41, the proposed design is capable of performing a field multiplication over the extension field with degree 163 in 11.92 s with the maximum achievable frequency of 251 MHz on Xilinx Virtex-4 (XC4VLX200) while 22% of the chip area is occupied, where G is the digit size of the underlying digit-serial finite field multiplier.
Abstract: The purpose of this study was to explore the complex
flow structure a novel active-type micromixer that based on concept of
Wankle-type rotor. The characteristics of this micromixer are two
folds; a rapid mixing of reagents in a limited space due to the
generation of multiple vortices and a graduate increment in dynamic
pressure as the mixed reagents is delivered to the output ports.
Present micro-mixer is consisted of a rotor with shape of triangle
column, a blending chamber and several inlet and outlet ports. The
geometry of blending chamber is designed to make the rotor can be
freely internal rotated with a constant eccentricity ratio. When the
shape of the blending chamber and the rotor are fixed, the effects of
rotating speed of rotor and the relative locations of ports on the mixing
efficiency are numerical studied. The governing equations are
unsteady, two-dimensional incompressible Navier-Stokes equation
and the working fluid is the water. The species concentration equation
is also solved to reveal the mass transfer process of reagents in various
regions then to evaluate the mixing efficiency.
The dynamic mesh technique was implemented to model the
dynamic volume shrinkage and expansion of three individual
sub-regions of blending chamber when the rotor conducted a complete
rotating cycle. Six types of ports configuration on the mixing
efficiency are considered in a range of Reynolds number from 10 to
300. The rapid mixing process was accomplished with the multiple
vortex structures within a tiny space due to the equilibrium of shear
force, viscous force and inertial force. Results showed that the highest
mixing efficiency could be attained in the following conditions: two
inlet and two outlet ports configuration, that is an included angle of 60
degrees between two inlets and an included angle of 120 degrees
between inlet and outlet ports when Re=10.
Abstract: Short Message Service (SMS) has grown in
popularity over the years and it has become a common way of
communication, it is a service provided through General System
for Mobile Communications (GSM) that allows users to send text
messages to others.
SMS is usually used to transport unclassified information, but
with the rise of mobile commerce it has become a popular tool for
transmitting sensitive information between the business and its
clients. By default SMS does not guarantee confidentiality and
integrity to the message content.
In the mobile communication systems, security (encryption)
offered by the network operator only applies on the wireless link.
Data delivered through the mobile core network may not be
protected. Existing end-to-end security mechanisms are provided
at application level and typically based on public key
cryptosystem.
The main concern in a public-key setting is the authenticity of
the public key; this issue can be resolved by identity-based (IDbased)
cryptography where the public key of a user can be derived
from public information that uniquely identifies the user.
This paper presents an encryption mechanism based on the IDbased
scheme using Elliptic curves to provide end-to-end security
for SMS. This mechanism has been implemented over the standard
SMS network architecture and the encryption overhead has been
estimated and compared with RSA scheme. This study indicates
that the ID-based mechanism has advantages over the RSA
mechanism in key distribution and scalability of increasing
security level for mobile service.
Abstract: The present models and simulation algorithms of intracellular stochastic kinetics are usually based on the premise that diffusion is so fast that the concentrations of all the involved species are homogeneous in space. However, recents experimental measurements of intracellular diffusion constants indicate that the assumption of a homogeneous well-stirred cytosol is not necessarily valid even for small prokaryotic cells. In this work a mathematical treatment of diffusion that can be incorporated in a stochastic algorithm simulating the dynamics of a reaction-diffusion system is presented. The movement of a molecule A from a region i to a region j of the space is represented as a first order reaction Ai k- ! Aj , where the rate constant k depends on the diffusion coefficient. The diffusion coefficients are modeled as function of the local concentration of the solutes, their intrinsic viscosities, their frictional coefficients and the temperature of the system. The stochastic time evolution of the system is given by the occurrence of diffusion events and chemical reaction events. At each time step an event (reaction or diffusion) is selected from a probability distribution of waiting times determined by the intrinsic reaction kinetics and diffusion dynamics. To demonstrate the method the simulation results of the reaction-diffusion system of chaperoneassisted protein folding in cytoplasm are shown.