Abstract: E-Learning enables the users to learn at anywhere at
any time. In E-Learning systems, authenticating the E-Learning user
has security issues. The usage of appropriate communication
networks for providing the internet connectivity for E-learning is
another challenge. WiMAX networks provide Broadband Wireless
Access through the Multicast Broadcast Service so these networks
can be most suitable for E-Learning applications. The authentication
of E-Learning user is vulnerable to session hijacking problems. The
repeated authentication of users can be done to overcome these
issues. In this paper, session based Profile Caching Authentication is
proposed. In this scheme, the credentials of E-Learning users can be
cached at authentication server during the initial authentication
through the appropriate subscriber station. The proposed cache based
authentication scheme performs fast authentication by using cached
user profile. Thus, the proposed authentication protocol reduces the
delay in repeated authentication to enhance the security in ELearning.
Abstract: The aim of irrigation is to recharge the available water
in the soil. Quality of irrigation water is essential for the yield and
quality of crops produced, maintenance of soil productivity and
protection of the environment. The analysis of irrigation water arises
as a need to know the impact of irrigation water on the yield of crops,
the effect, and the necessary control measures to rectify the effect of
this for optimum production and yield of crops. This study was conducted to assess the quality of irrigation water
with its performance on crop planted, in Josepdam irrigation scheme
Bacita, Nigeria. Field visits were undertaken to identify and locate
water supply sources and collect water samples from these sources;
X1 Drain, Oshin, River Niger loop and Ndafa. Laboratory
experiments were then undertaken to determine the quality of raw
water from these sources. The analysis was carried for various parameters namely; physical
and chemical analyses after water samples have been taken from four
sources. The samples were tested in laboratory. Results showed that
the raw water sources shows no salinity tendencies with SAR values
less than 1me/l and Ecvaules at Zero while the pH were within the
recommended range by FAO, there are increase in potassium and
sulphate content contamination in three of the location. From this, it
is recommended that there should be proper monitoring of the
scheme by conducting analysis of water and soil in the environment,
preferable test should be carried out at least one year to cover the
impact of seasonal variations and to determine the physical and
chemical analysis of the water used for irrigation at the scheme.
Abstract: In IEEE 802.11 networks, it is well known that the
traditional time-domain contention often leads to low channel
utilization. The first frequency-domain contention scheme, the time to
frequency (T2F), has recently been proposed to improve the channel
utilization and has attracted a great deal of attention. In this paper, we
present the latest research progress on the weighed frequency-domain
contention. We compare the basic ideas, work principles of these
related schemes and point out their differences. This paper is very
useful for further study on frequency-domain contention.
Abstract: Fractal based digital image compression is a specific
technique in the field of color image. The method is best suited for
irregular shape of image like snow bobs, clouds, flame of fire; tree
leaves images, depending on the fact that parts of an image often
resemble with other parts of the same image. This technique has
drawn much attention in recent years because of very high
compression ratio that can be achieved. Hybrid scheme incorporating
fractal compression and speedup techniques have achieved high
compression ratio compared to pure fractal compression. Fractal
image compression is a lossy compression method in which selfsimilarity
nature of an image is used. This technique provides high
compression ratio, less encoding time and fart decoding process. In
this paper, fractal compression with quad tree and DCT is proposed
to compress the color image. The proposed hybrid schemes require
four phases to compress the color image. First: the image is
segmented and Discrete Cosine Transform is applied to each block of
the segmented image. Second: the block values are scanned in a
zigzag manner to prevent zero co-efficient. Third: the resulting image
is partitioned as fractals by quadtree approach. Fourth: the image is
compressed using Run length encoding technique.
Abstract: Orthogonal Frequency Division Multiplexing
(OFDM) has been used in many advanced wireless communication
systems due to its high spectral efficiency and robustness to
frequency selective fading channels. However, the major concern
with OFDM system is the high peak-to-average power ratio (PAPR)
of the transmitted signal. Some of the popular techniques used for
PAPR reduction in OFDM system are conventional partial transmit
sequences (CPTS) and clipping. In this paper, a parallel
combination/hybrid scheme of PAPR reduction using clipping and
CPTS algorithms is proposed. The proposed method intelligently
applies both the algorithms in order to reduce both PAPR as well as
computational complexity. The proposed scheme slightly degrades
bit error rate (BER) performance due to clipping operation and it can
be reduced by selecting an appropriate value of the clipping ratio
(CR). The simulation results show that the proposed algorithm
achieves significant PAPR reduction with much reduced
computational complexity.
Abstract: This paper presents a fault-tolerant implementation for
adder schemes using the dual duplication code. To prove the
efficiency of the proposed method, the circuit is simulated in double
pass transistor CMOS 32nm technology and some transient faults are
voluntary injected in the Layout of the circuit. This fully differential
implementation requires only 20 transistors which mean that the
proposed design involves 28.57% saving in transistor count
compared to standard CMOS technology.
Abstract: The out-of-band impedance environment is considered
to be of paramount importance in engineering the in-band impedance
environment. Presenting the frequency independent and constant outof-
band impedances across the wide modulation bandwidth is
extremely important for reliable device characterization for future
wireless systems. This paper presents an out-of-band impedance
optimization scheme based on simultaneous engineering of
significant baseband components IF1 (twice the modulation
frequency) and IF2 (four times the modulation frequency) and higher
baseband components such as IF3 (six times the modulation
frequency) and IF4 (eight times the modulation frequency) to
engineer the in-band impedance environment. The investigations
were carried out on a 10W GaN HEMT device driven to deliver a
peak envelope power of approximately 40.5dBm under modulated
excitation. The presentation of frequency independent baseband
impedances to all the significant baseband components whilst
maintaining the optimum termination for fundamental tones as well
as reactive termination for 2nd harmonic under class-J mode of
operation has outlined separate optimum impedances for best
intermodulation (IM) linearity.
Abstract: This paper proposes an APPLE scheme that aims at providing absolute and proportional throughput guarantees, and maximizing system throughput simultaneously for wireless LANs with homogeneous and heterogenous traffic. We formulate our objectives as an optimization problem, present its exact and approximate solutions, and prove the existence and uniqueness of the approximate solution. Simulations validate that APPLE scheme is accurate, and the approximate solution can well achieve the desired objectives already.
Abstract: In wireless sensor network, sensor node transmits the
sensed data to the sink node in multi-hop communication
periodically. This high traffic induces congestion at the node which is
present one-hop distance to the sink node. The packet transmission
and reception rate of these nodes should be very high, when
compared to other sensor nodes in the network. Therefore, the energy
consumption of that node is very high and this effect is known as the
“funneling effect”. The tree based-data aggregation technique
(TBDA) is used to reduce the energy consumption of the node. The
throughput of the overall performance shows a considerable decrease
in the number of packet transmissions to the sink node. The proposed
scheme, TBDA, avoids the funneling effect and extends the lifetime
of the wireless sensor network. The average case time complexity for
inserting the node in the tree is O(n log n) and for the worst case time
complexity is O(n2).
Abstract: This first-attempt study revealed that decolorized
intermediates of azo dyes could act as redox mediators to assist
wastewater (WW) decolorization due to enhancement of
electron-transport phenomena. Electrochemical impedance spectra
indicated that hydroxyl and amino-substituent(s) were functional
group(s) as redox-mediator(s). As azo dyes are usually multiple
benzene-rings structured, their derived decolorized intermediates are
likely to play roles of electron shuttles due to lower barrier of energy
gap for electron shuttling. According to cyclic voltammetric profiles,
redox mediating characteristics of decolorized intermediates of azo
dyes (e.g., RBu171, RR198, RR141, RBk5) were clearly disclosed.
With supplementation of biodecolorized metabolites of RR141 and
198, decolorization performance of could be evidently augmented.
This study also suggested the optimal modes of microbial fuel cell
(MFC)-assisted WW decolorization would be plug-flow or batch
mode of operation with no mix. Single chamber-MFCs would be more
favourable than double chamber MFCs due to non-mixing contacting
reactor scheme for operation.
Abstract: By using a fixed point theorem of a sum operator, the
existence and uniqueness of positive solution for a class of
boundary value problem of nonlinear fractional differential equation
is studied. An iterative scheme is constructed to approximate it.
Finally, an example is given to illustrate the main result.
Abstract: Small-size and low-power sensors with sensing, signal
processing and wireless communication capabilities is suitable for the
wireless sensor networks. Due to the limited resources and battery
constraints, complex routing algorithms used for the ad-hoc networks
cannot be employed in sensor networks. In this paper, we propose
node-disjoint multi-path hexagon-based routing algorithms in wireless
sensor networks. We suggest the details of the algorithm and compare
it with other works. Simulation results show that the proposed scheme
achieves better performance in terms of efficiency and message
delivery ratio.
Abstract: Brushless DC motors (BLDC) are widely used in
industrial areas. The BLDC motors are driven either by indirect ACAC
converters or by direct AC-AC converters. Direct AC-AC
converters i.e. matrix converters are used in this paper to drive the
three phase BLDC motor and it eliminates the bulky DC link energy
storage element. A matrix converter converts the AC power supply to
an AC voltage of variable amplitude and variable frequency. A
control technique is designed to generate the switching pulses for the
three phase matrix converter. For the control of speed of the BLDC
motor a separate PI controller and Fuzzy Logic Controller (FLC) are
designed and a hysteresis current controller is also designed for the
control of motor torque. The control schemes are designed and tested
separately. The simulation results of both the schemes are compared
and contrasted in this paper. The results show that the fuzzy logic
control scheme outperforms the PI control scheme in terms of
dynamic performance of the BLDC motor. Simulation results are
validated with the experimental results.
Abstract: Since the advances in digital imaging technologies have led to
development of high quality digital devices, there are a lot of illegal copies
of copyrighted video content on the Internet. Also, unauthorized editing is
occurred frequently. Thus, we propose an editing prevention technique for
high-quality (HQ) video that can prevent these illegally edited copies from
spreading out. The proposed technique is applied spatial and temporal gradient
methods to improve the fidelity and detection performance. Also, the scheme
duplicates the embedding signal temporally to alleviate the signal reduction
caused by geometric and signal-processing distortions. Experimental results
show that the proposed scheme achieves better performance than previously
proposed schemes and it has high fidelity. The proposed scheme can be used
in unauthorized access prevention method of visual communication or traitor
tracking applications which need fast detection process to prevent illegally
edited video content from spreading out.
Abstract: Response Surface Methods (RSM) provide
statistically validated predictive models that can then be manipulated
for finding optimal process configurations. Variation transmitted to
responses from poorly controlled process factors can be accounted
for by the mathematical technique of propagation of error (POE),
which facilitates ‘finding the flats’ on the surfaces generated by
RSM. The dual response approach to RSM captures the standard
deviation of the output as well as the average. It accounts for
unknown sources of variation. Dual response plus propagation of
error (POE) provides a more useful model of overall response
variation. In our case, we implemented this technique in predicting
compressive strength of concrete of 28 days in age. Since 28 days is
quite time consuming, while it is important to ensure the quality
control process. This paper investigates the potential of using design
of experiments (DOE-RSM) to predict the compressive strength of
concrete at 28th day. Data used for this study was carried out from
experiment schemes at university of Benghazi, civil engineering
department. A total of 114 sets of data were implemented. ACI mix
design method was utilized for the mix design. No admixtures were
used, only the main concrete mix constituents such as cement, coarseaggregate,
fine aggregate and water were utilized in all mixes.
Different mix proportions of the ingredients and different water
cement ratio were used. The proposed mathematical models are
capable of predicting the required concrete compressive strength of
concrete from early ages.
Abstract: In this paper, a robust fault detection and isolation
(FDI) scheme is developed to monitor a multivariable nonlinear
chemical process called the Chylla-Haase polymerization reactor,
when it is under the cascade PI control. The scheme employs a radial
basis function neural network (RBFNN) in an independent mode to
model the process dynamics, and using the weighted sum-squared
prediction error as the residual. The Recursive Orthogonal Least
Squares algorithm (ROLS) is employed to train the model to
overcome the training difficulty of the independent mode of the
network. Then, another RBFNN is used as a fault classifier to isolate
faults from different features involved in the residual vector. Several
actuator and sensor faults are simulated in a nonlinear simulation of
the reactor in Simulink. The scheme is used to detect and isolate the
faults on-line. The simulation results show the effectiveness of the
scheme even the process is subjected to disturbances and
uncertainties including significant changes in the monomer feed rate,
fouling factor, impurity factor, ambient temperature, and
measurement noise. The simulation results are presented to illustrate
the effectiveness and robustness of the proposed method.
Abstract: In the Solid-State-Drive (SSD) performance, whether
the data has been well parallelized is an important factor. SSD
parallelization is affected by allocation scheme and it is directly
connected to SSD performance. There are dynamic allocation and
static allocation in representative allocation schemes. Dynamic
allocation is more adaptive in exploiting write operation parallelism,
while static allocation is better in read operation parallelism.
Therefore, it is hard to select the appropriate allocation scheme when
the workload is mixed read and write operations. We simulated
conditions on a few mixed data patterns and analyzed the results to
help the right choice for better performance. As the results, if data
arrival interval is long enough prior operations to be finished and
continuous read intensive data environment static allocation is more
suitable. Dynamic allocation performs the best on write performance
and random data patterns.
Abstract: In this paper, we calculate the two-photon ionization
(TPI) cross-section for pump-probe scheme in Ag neutral cluster. The
pump photon energy is assumed to be close to the surface plasmon
(SP) energy of cluster in dielectric media. Due to this choice, the
pump wave excites collective oscillations of electrons-SP and the
probe wave causes ionization of the cluster. Since the interband
transition energy in Ag exceeds the SP resonance energy, the main
contribution into the TPI comes from the latter. The advantage of Ag
clusters as compared to the other noble metals is that the SP
resonance in silver cluster is much sharper because of peculiarities of
its dielectric function. The calculations are performed by separating
the coordinates of electrons corresponding to the collective
oscillations and the individual motion that allows taking into account
the resonance contribution of excited SP oscillations. It is shown that
the ionization cross section increases by two orders of magnitude if
the energy of the pump photon matches the surface plasmon energy
in the cluster.
Abstract: The floor beams of steel buildings, cold-formed steel
floor joists in particular, often require large web openings, which may
affect their shear capacities. A cost effective way to mitigate the
detrimental effects of such openings is to weld/fasten reinforcements.
A difficulty associated with an experimental investigation to establish
suitable reinforcement schemes for openings in shear zone is that
moment always coexists with the shear, and thus, it is impossible to
create pure shear state in experiments, resulting in moment
influenced results. However, Finite Element Method (FEM) based
analysis can be conveniently used to investigate the pure shear
behaviour of webs including webs with reinforced openings. This
paper presents the details associated with the finite element analysis
of thick/thin-plates (representing the web of hot-rolled steel beam,
and the web of a cold-formed steel member) having a large
reinforced opening. The study considered simply-supported
rectangular plates subjected to in-plane shear loadings until failure
(including post-buckling behaviour). The plate was modelled using
geometrically non-linear quadrilateral shell elements, and non-linear
stress-strain relationship based on experiments. Total Langrangian
with large displacement/small strain formulation was used for such
analyses. The model also considered the initial geometric
imperfections. This study considered three reinforcement schemes,
namely, flat, lip, and angle reinforcements. This paper discusses the
modelling considerations and presents the results associated with the
various reinforcement schemes under consideration.
Abstract: For the last decade, researchers have started to focus
their interest on Multicast Group Key Management Framework. The
central research challenge is secure and efficient group key
distribution. The present paper is based on the Bit model based
Secure Multicast Group key distribution scheme using the most
popular absolute encoder output type code named Gray Code. The
focus is of two folds. The first fold deals with the reduction of
computation complexity which is achieved in our scheme by
performing fewer multiplication operations during the key updating
process. To optimize the number of multiplication operations, an
O(1) time algorithm to multiply two N-bit binary numbers which
could be used in an N x N bit-model of reconfigurable mesh is used
in this proposed work. The second fold aims at reducing the amount
of information stored in the Group Center and group members while
performing the update operation in the key content. Comparative
analysis to illustrate the performance of various key distribution
schemes is shown in this paper and it has been observed that this
proposed algorithm reduces the computation and storage complexity
significantly. Our proposed algorithm is suitable for high
performance computing environment.