Abstract: This project aims at building an efficient and
automatic power monitoring SCADA system, which is capable of
monitoring the electrical parameters of high voltage powered devices
in real time for example RMS voltage and current, frequency, energy
consumed, power factor etc. The system uses RS-485 serial
communication interface to transfer data over longer distances.
Embedded C programming is the platform used to develop two
hardware modules namely: RTU and Master Station modules, which
both use the CC2540 BLE 4.0 microcontroller configured in slave /
master mode. The Si8900 galvanic ally isolated microchip is used to
perform ADC externally. The hardware communicates via UART
port and sends data to the user PC using the USB port. Labview
software is used to design a user interface to display current state of
the power loads being monitored as well as logs data to excel
spreadsheet file. An understanding of the Si8900’s auto baud rate
process is key to successful implementation of this project.
Abstract: An analysis of the air tightness level is performed on a representative sample of school classrooms in Southern Spain, which allows knowing the infiltration level of these classrooms, mainly through its envelope, which can affect both energy demand and occupant's thermal comfort. By using a pressurization/depressurization equipment (Blower-Door test), a characterization of 45 multipurpose classrooms have been performed in nine non-university educational institutions of the main climate zones of Southern Spain. In spite of having two doors and a high ratio between glass surface and outer surface, it is possible to see in these classrooms that there is an adequate level of airtightness, since all the n50 values obtained are lower than 9.0 ACH, with an average value around 7.0 ACH.
Abstract: We investigate the large scale of networks in the
context of network survivability under attack. We use appropriate
techniques to evaluate and the attacker-based- and the defenderbased-
network survivability. The attacker is unaware of the operated
links by the defender. Each attacked link has some pre-specified
probability to be disconnected. The defender choice is so that to
maximize the chance of successfully sending the flow to the
destination node. The attacker however will select the cut-set with
the highest chance to be disabled in order to partition the network.
Moreover, we extend the problem to the case of selecting the best p
paths to operate by the defender and the best k cut-sets to target by
the attacker, for arbitrary integers p,k>1. We investigate some
variations of the problem and suggest polynomial-time solutions.
Abstract: Maintenance and design engineers have great concern
for the functioning of rotating machineries due to the vibration
phenomenon. Improper functioning in rotating machinery originates
from the damage to rolling element bearings. The status of rolling
element bearings require advanced technologies to monitor their
health status efficiently and effectively. Avoiding vibration during
machine running conditions is a complicated process. Vibration
simulation should be carried out using suitable sensors/ transducers to
recognize the level of damage on bearing during machine operating
conditions. Various issues arising in rotating systems are interlinked
with bearing faults. This paper presents an approach for fault
diagnosis of bearings using neural networks and time/frequencydomain
vibration analysis.
Abstract: Lateral Geniculate Nucleus (LGN) is the relay center
in the visual pathway as it receives most of the input information
from retinal ganglion cells (RGC) and sends to visual cortex. Low
threshold calcium currents (IT) at the membrane are the unique
indicator to characterize this firing functionality of the LGN neurons
gained by the RGC input. According to the LGN functional
requirements such as functional mapping of RGC to LGN, the
morphologies of the LGN neurons were developed. During the
neurological disorders like glaucoma, the mapping between RGC and
LGN is disconnected and hence stimulating LGN electrically using
deep brain electrodes can restore the functionalities of LGN. A
computational model was developed for simulating the LGN neurons
with three predominant morphologies each representing different
functional mapping of RGC to LGN. The firings of action potentials
at LGN neuron due to IT were characterized by varying the
stimulation parameters, morphological parameters and orientation. A
wide range of stimulation parameters (stimulus amplitude, duration
and frequency) represents the various strengths of the electrical
stimulation with different morphological parameters (soma size,
dendrites size and structure). The orientation (0-1800) of LGN
neuron with respect to the stimulating electrode represents the angle
at which the extracellular deep brain stimulation towards LGN
neuron is performed. A reduced dendrite structure was used in the
model using Bush–Sejnowski algorithm to decrease the
computational time while conserving its input resistance and total
surface area. The major finding is that an input potential of 0.4 V is
required to produce the action potential in the LGN neuron which is
placed at 100 μm distance from the electrode. From this study, it can
be concluded that the neuroprostheses under design would need to
consider the capability of inducing at least 0.4V to produce action
potentials in LGN.
Abstract: This paper will discuss how we optimize our physical
verification flow in our IC Design Department having various rule
decks from multiple foundries. Our ultimate goal is to achieve faster
time to tape-out and avoid schedule delay. Currently the physical
verification runtimes and memory usage have drastically increased
with the increasing number of design rules, design complexity, and
the size of the chips to be verified. To manage design violations, we
use a number of solutions to reduce the amount of violations needed
to be checked by physical verification engineers. The most important
functions in physical verifications are DRC (design rule check), LVS
(layout vs. schematic), and XRC (extraction). Since we have a
multiple number of foundries for our design tape-outs, we need a
flow that improve the overall turnaround time and ease of use of the
physical verification process. The demand for fast turnaround time is
even more critical since the physical design is the last stage before
sending the layout to the foundries.
Abstract: In this paper, we report the development of the device
for diagnostics of cardiovascular system state and associated
automated workstation for large-scale medical measurement data
collection and analysis. It was shown that optimal design for the
monitoring device is wristband as it represents engineering trade-off
between accuracy and usability. Monitoring device is based on the
infrared reflective photoplethysmographic sensor, which allows
collecting multiple physiological parameters, such as heart rate and
pulsing wave characteristics. Developed device uses BLE interface
for medical and supplementary data transmission to the coupled
mobile phone, which processes it and send it to the doctor's
automated workstation. Results of this experimental model
approbation confirmed the applicability of the proposed approach.
Abstract: The work aims to develop a robot in the form of
autonomous vehicle to detect, inspection and mapping of
underground pipelines through the ATmega328 Arduino platform.
Hardware prototyping is very similar to C / C ++ language that
facilitates its use in robotics open source, resembles PLC used in
large industrial processes. The robot will traverse the surface
independently of direct human action, in order to automate the
process of detecting buried pipes, guided by electromagnetic
induction. The induction comes from coils that send the signal to the
Arduino microcontroller contained in that will make the difference in
intensity and the treatment of the information, and then this
determines actions to electrical components such as relays and
motors, allowing the prototype to move on the surface and getting the
necessary information. This change of direction is performed by a
stepper motor with a servo motor. The robot was developed by
electrical and electronic assemblies that allowed test your application.
The assembly is made up of metal detector coils, circuit boards and
microprocessor, which interconnected circuits previously developed
can determine, process control and mechanical actions for a robot
(autonomous car) that will make the detection and mapping of buried
pipelines plates. This type of prototype can prevent and identifies
possible landslides and they can prevent the buried pipelines suffer an
external pressure on the walls with the possibility of oil leakage and
thus pollute the environment.
Abstract: Nowadays, cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime. It also provides an optimized and secured access to the resources and gives more security for the data which is stored in the platform. However, some companies do not trust Cloud providers, they think that providers can access and modify some confidential data such as bank accounts. Many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, but, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some operations on the data before sending them to the provider Cloud in the objective to make them unreadable. The principal idea is to allow user how it can protect his data with his own methods. In this paper, we are going to demonstrate our approach and prove that is more efficient in term of execution time than some existing methods. This work aims at enhancing the quality of service of providers and ensuring the trust of the customers.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: This paper introduces a video sharing platform based
on WiFi, which consists of camera, mobile phone and PC server. This
platform can receive wireless signal from the camera and show the live
video on the mobile phone captured by camera. In addition, it is able to
send commands to camera and control the camera’s holder to rotate.
The platform can be applied to interactive teaching and dangerous
area’s monitoring and so on. Testing results show that the platform can
share the live video of mobile phone. Furthermore, if the system’s PC
server and the camera and many mobile phones are connected
together, it can transfer photos concurrently.
Abstract: One of the crucial parameters of digital cryptographic
systems is the selection of the keys used and their distribution. The
randomness of the keys has a strong impact on the system’s security
strength being difficult to be predicted, guessed, reproduced, or
discovered by a cryptanalyst. Therefore, adequate key randomness
generation is still sought for the benefit of stronger cryptosystems.
This paper suggests an algorithm designed to generate and test
pseudo random number sequences intended for cryptographic
applications. This algorithm is based on mathematically manipulating
a publically agreed upon information between sender and receiver
over a public channel. This information is used as a seed for
performing some mathematical functions in order to generate a
sequence of pseudorandom numbers that will be used for
encryption/decryption purposes. This manipulation involves
permutations and substitutions that fulfill Shannon’s principle of
“confusion and diffusion”. ASCII code characters were utilized in the
generation process instead of using bit strings initially, which adds
more flexibility in testing different seed values. Finally, the obtained
results would indicate sound difficulty of guessing keys by attackers.
Abstract: Transmission system performance analysis is vital to
proper planning and operations of power systems in the presence of
deregulation. Key performance indicators (KPIs) are often used as
measure of degree of performance. This paper gives a novel method
to determine the transmission efficiency by evaluating the ratio of
real power losses incurred from a specified transfer direction.
Available Transmission Transfer Efficiency (ATTE) expresses the
percentage of real power received resulting from inter-area available
power transfer. The Tie line (Rated system path) performance is seen
to differ from system wide (Network response) performance and
ATTE values obtained are transfer direction specific. The required
sending end quantities with specified receiving end ATC and the
receiving end power circle diagram are obtained for the tie line
analysis. The amount of real power loss load relative to the available
transfer capability gives a measure of the transmission grid
efficiency.
Abstract: IEEE 802.11a/b/g standards provide multiple
transmission rates, which can be changed dynamically according to the
channel condition. Cooperative communications were introduced to
improve the overall performance of wireless LANs with the help of
relay nodes with higher transmission rates. The cooperative
communications are based on the fact that the transmission is much
faster when sending data packets to a destination node through a relay
node with higher transmission rate, rather than sending data directly to
the destination node at low transmission rate. To apply the cooperative
communications in wireless LAN, several MAC protocols have been
proposed. Some of them can result in collisions among relay nodes in a
dense network. In order to solve this problem, we propose a new
protocol. Relay nodes are grouped based on their transmission rates.
And then, relay nodes only in the highest group try to get channel
access. Performance evaluation is conducted using simulation, and
shows that the proposed protocol significantly outperforms the
previous protocol in terms of throughput and collision probability.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: Images are important source of information used as
evidence during any investigation process. Their clarity and accuracy
is essential and of the utmost importance for any investigation.
Images are vulnerable to losing blocks and having noise added to
them either after alteration or when the image was taken initially,
therefore, having a high performance image processing system and it
is implementation is very important in a forensic point of view. This
paper focuses on improving the quality of the forensic images.
For different reasons packets that store data can be affected,
harmed or even lost because of noise. For example, sending the
image through a wireless channel can cause loss of bits. These types
of errors might give difficulties generally for the visual display
quality of the forensic images.
Two of the images problems: noise and losing blocks are covered.
However, information which gets transmitted through any way of
communication may suffer alteration from its original state or even
lose important data due to the channel noise. Therefore, a developed
system is introduced to improve the quality and clarity of the forensic
images.
Abstract: The development of the agricultural sector in Ghana
has been reliant on the use of irrigation systems to ensure food
security. However, the manual operation of these systems has not
facilitated their maximum efficiency due to human limitations.
This paper seeks to address this problem by designing and
implementing an efficient, cost effective automated system which
monitors and controls the water flow of irrigation through
communication with an authorized operator via text messages. The
automatic control component of the system is timer based with an
Atmega32 microcontroller and a real time clock from the SM5100B
cellular module. For monitoring purposes, the system sends periodic
notification of the system on the performance of duty via SMS to the
authorized person(s). Moreover, the GSM based Irrigation
Monitoring and Control System saves time and labour and reduces
cost of operating irrigation systems by saving electricity usage and
conserving water.
Field tests conducted have proven its operational efficiency and
ease of assessment of farm irrigation equipment due to its costeffectiveness
and data logging capabilities.
Abstract: Communication and effective information exchange
within technology has become a crucial part of delivering knowledge
to students during the learning process. It enables better
understanding, builds trust and respect, and increases the sharing of
knowledge between students. This paper examines the
communication between undergraduate students and their lecturers
during the traditional lecture and when using the Interactive
Electronic Lecture System (IELS). The IELS is an application that
offers a set of components which support the effective
communication between students and their peers and between
students and their lecturers. Moreover, this paper highlights
communication skills such as sender, receiver, channel and feedback.
It will show how the IELS creates a rich communication environment
between its users and how they communicate effectively. To examine
and assess the effectiveness of communication, an experiment was
conducted on groups of users; students and lecturers. The first group
communicated in the traditional lecture while the second group
communicated by means of the IELS application. The results show
that there was more effective communication between the second
group than the first.
Abstract: Different order modulations combined with different
coding schemes, allow sending more bits per symbol, thus achieving
higher throughputs and better spectral efficiencies. However, it must
also be noted that when using a modulation technique such as 64-
QAM with less overhead bits, better signal-to-noise ratios (SNRs) are
needed to overcome any Inter symbol Interference (ISI) and maintain
a certain bit error ratio (BER). The use of adaptive modulation allows
wireless technologies to yielding higher throughputs while also
covering long distances. The aim of this paper is to implement an
Adaptive Modulation and Coding (AMC) features of the WiMAX
PHY in MATLAB and to analyze the performance of the system in
different channel conditions (AWGN, Rayleigh and Rician fading
channel) with channel estimation and blind equalization. Simulation
results have demonstrated that the increment in modulation order
causes to increment in throughput and BER values. These results
derived a trade-off among modulation order, FFT length, throughput,
BER value and spectral efficiency. The BER changes gradually for
AWGN channel and arbitrarily for Rayleigh and Rician fade
channels.