Abstract: In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input multiple output (SIMO) Gaussian wire-tap channels and then use scalar approach to convert it into two equivalent multiple input single output (MISO) channels. The secrecy capacity model is then developed for the condition where the channel state information (CSI) for main channel only is known to the transmitter. The results show that the secret communication is possible when the eavesdropper channel noise is greater than a cutoff noise level. The outage probability is also analyzed of secrecy capacity is also analyzed. The effect of fading and outage probability is also analyzed.
Abstract: This paper presents a physics-based model for the
high-voltage fast recovery diodes. The model provides a good
trade-off between reverse recovery time and forward voltage drop
realized through a combination of lifetime control and emitter
efficiency reduction techniques. The minority carrier lifetime can be
extracted from the reverse recovery transient response and forward
characteristics. This paper also shows that decreasing the amount of
the excess carriers stored in the drift region will result in softer
characteristics which can be achieved using a lower doping level. The
developed model is verified by experiment and the measurement data
agrees well with the model.
Abstract: Internet application in China has maintained a constant
development tendency in the past decade. China is now one of the
most populous countries in terms of internet user population. While
offering enormous opportunities, the dramatic digitalization also
brings about a series of challenges that demand urgent attention.
Digital divide is one of the challenges that affect China as well as other
countries in the world. This paper examines digital divide in the
Chinese context from the perspective of development communication.
Through a case study of a rural township under the backdrop of the
rapid internet development in China, the paper discusses the
economic, psychological and cultural roots of digital divide; and
explores development communication strategies addressing the roots
of digital divide. It is argued that development communication must be
responsive to the potentialities and preferences of the specific society
and serve the purposes of participation and sustainability.
Abstract: Gas turbine systems with wet compression have a
potential for future power generation, since they can offer a high
efficiency and a high specific power with a relatively low cost. In this
study influence of ambient condition on the performance of the wet
compression process is investigated with a non-equilibrium analytical
modeling based on droplet evaporation. Transient behaviors of droplet
diameter and temperature of mixed air are investigated for various
ambient temperatures. Special attention is paid for the effects of
ambient temperature, pressure ratio, and water injection ratios on the
important wet compression variables including compressor outlet
temperature and compression work. Parametric studies show that
downing of the ambient temperature leads to lower compressor outlet
temperature and consequently lower consumption of compression
work even in wet compression processes.
Abstract: This paper investigates the influence of various
parameters on the behaviour of water droplets on polymeric surfaces
under high electric fields. An inclined plane test was carried out to
understand the droplet behaviour in strong electric field. Parameters
such as water droplet conductivity, droplet volume, polymeric
surface roughness and droplet positioning with respect to the
electrodes were studied. The flashover voltage is affected by all
aforementioned parameters. The droplet positioning is in some cases
more vital than the droplet volume. Surface damages were analysed
using Scanning Electron Microscopy (SEM) studies and by Energy
dispersive X-ray Analysis (EDAX). It is observes that magnitude of
discharge have direct influence on amount of surface da
Abstract: In the present work, an attempt has been made to
understand the feasibility of using UHF technique for identification
of any corona discharges/ arcing in insulating material due to water
droplets. The sensors of broadband type are useful for identification
of such discharges. It is realised that arcing initiated by liquid droplet
radiates UHF signals in the entire bandwidth up to 2 GHz. The
frequency content of the UHF signal generated due to corona/arcing
is not much varied in epoxy nanocomposites with different weight
percentage of clay content. The exfoliated/intercalated properties
were analysed through TEM studies. It is realized that corona
initiated discharges are of intermittent process. The hydrophobicity
of the material characterized through contact angle measurement. It
is realized that low Wt % of nanoclay content in epoxy resin reduces
the surface carbonization due to arcing/corona discharges. The results
of the study with gamma irradiated specimen indicates that contact
angle, discharge inception time and evaporation time of the liquid are
much lower than the virgin epoxy nanocomposite material.
Abstract: Recent widespread use of information and
communication technology has greatly changed information security
risks that businesses and institutions encounter. Along with this
situation, in order to ensure security and have confidence in electronic
trading, it has become important for organizations to take competent
information security measures to provide international confidence that
sensitive information is secure. Against this backdrop, the approach to
information security checking has come to an important issue, which
is believed to be common to all countries. The purpose of this paper is
to introduce the new system of information security checking program
in Korea and to propose synthetic information security
countermeasures under domestic circumstances in order to protect
physical equipment, security management and technology, and the
operation of security check for securing services on ISP(Internet
Service Provider), IDC(Internet Data Center), and
e-commerce(shopping malls, etc.)
Abstract: Multiparty voice over IP (MVoIP) systems allows a group of people to freely communicate each other via the internet, which have many applications such as online gaming, teleconferencing, online stock trading etc. Peertalk is a peer to peer multiparty voice over IP system (MVoIP) which is more feasible than existing approaches such as p2p overlay multicast and coupled distributed processing. Since the stream mixing and distribution are done by the peers, it is vulnerable to major security threats like nodes misbehavior, eavesdropping, Sybil attacks, Denial of Service (DoS), call tampering, Man in the Middle attacks etc. To thwart the security threats, a security framework called PEERTS (PEEred Reputed Trustworthy System for peertalk) is implemented so that efficient and secure communication can be carried out between peers.
Abstract: Traffic flow in adverse weather conditions have been investigated in this study for general traffic, week day and week end traffic. The empirical evidence is strong in support of the view that rainfall affects macroscopic traffic flow parameters. Data generated from a basic highway section along J5 in Johor Bahru, Malaysia was synchronized with 161 rain events over a period of three months. This revealed a 4.90%, 6.60% and 11.32% reduction in speed for light rain, moderate rain and heavy rain conditions respectively. The corresponding capacity reductions in the three rainfall regimes are 1.08% for light rain, 6.27% for moderate rain and 29.25% for heavy rain. In the week day traffic, speed drops of 8.1% and 16.05% were observed for light and heavy conditions. The moderate rain condition speed increased by 12.6%. The capacity drops for week day traffic are 4.40% for light rain, 9.77% for moderate rain and 45.90% for heavy rain. The weekend traffic indicated speed difference between the dry condition and the three rainy conditions as 6.70% for light rain, 8.90% for moderate rain and 13.10% for heavy rain. The capacity changes computed for the weekend traffic were 0.20% in light rain, 13.90% in moderate rain and 16.70% in heavy rain. No traffic instabilities were observed throughout the observation period and the capacities reported for each rain condition were below the norain condition capacity. Rainfall has tremendous impact on traffic flow and this may have implications for shock wave propagation.
Abstract: The study investigated the hydrophilic to hydrophobic
transition of modified polyacrylamide hydrogel with the inclusion of
N-isopropylacrylamide (NIAM). The modification was done by
mimicking micellar polymerization, which resulted in better
arrangement of NIAM chains in the polyacrylamide network. The
degree of NIAM arrangement is described by NH number. The
hydrophilic to hydrophobic transition was measured through the
partition coefficient, K, of Orange II and Methylene Blue in hydrogel
and in water. These dyes were chosen as a model for solutes with
different degree of hydrophobicity. The study showed that the
hydrogel with higher NH values resulted in better solubility of both
dyes. Moreover, in temperature above the lower critical solution
temperature (LCST) of Poly(N-isopropylacrylamide) (PNIAM)also
caused the collapse of NIPAM chains which results in a more
hydrophobic environment that increases the solubility of Methylene
Blue and decreases the solubility of Orange II in the hydrogels with
NIPAM present.
Abstract: Nanoemulsions are a class of emulsions with a droplet
size in the range of 50–500 nm and have attracted a great deal of
attention in recent years because it is unique characteristics. The
physicochemical properties of nanoemulsion suggests that it can be
successfully used to recover the residual oil which is trapped in the
fine pore of reservoir rock by capillary forces after primary and
secondary recovery. Oil-in-water nanoemulsion which can be formed
by high-energy emulsification techniques using specific surfactants
can reduce oil-water interfacial tension (IFT) by 3-4 orders of
magnitude. The present work is aimed on characterization of oil-inwater
nanoemulsion in terms of its phase behavior, morphological
studies; interfacial energy; ability to reduce the interfacial tension and
understanding the mechanisms of mobilization and displacement of
entrapped oil blobs by lowering interfacial tension both at the
macroscopic and microscopic level. In order to investigate the
efficiency of oil-water nanoemulsion in enhanced oil recovery
(EOR), experiments were performed to characterize the emulsion in
terms of their physicochemical properties and size distribution of the
dispersed oil droplet in water phase. Synthetic mineral oil and a series
of surfactants were used to prepare oil-in-water emulsions.
Characterization of emulsion shows that it follows pseudo-plastic
behaviour and drop size of dispersed oil phase follows lognormal
distribution. Flooding experiments were also carried out in a
sandpack system to evaluate the effectiveness of the nanoemulsion as
displacing fluid for enhanced oil recovery. Substantial additional
recoveries (more than 25% of original oil in place) over conventional
water flooding were obtained in the present investigation.
Abstract: We propose an enhanced key management scheme
based on Key Infection, which is lightweight scheme for tiny sensors.
The basic scheme, Key Infection, is perfectly secure against node
capture and eavesdropping if initial communications after node
deployment is secure. If, however, an attacker can eavesdrop on
the initial communications, they can take the session key. We use
common neighbors for each node to generate the session key. Each
node has own secret key and shares it with its neighbor nodes. Then
each node can establish the session key using common neighbors-
secret keys and a random number. Our scheme needs only a few
communications even if it uses neighbor nodes- information. Without
losing the lightness of basic scheme, it improves the resistance against
eavesdropping on the initial communications more than 30%.
Abstract: A computational platform is presented in this
contribution. It has been designed as a virtual laboratory to be used
for exploring optimization algorithms in biological problems. This
platform is built on a blackboard-based agent architecture. As a test
case, the version of the platform presented here is devoted to the
study of protein folding, initially with a bead-like description of the
chain and with the widely used model of hydrophobic and polar
residues (HP model). Some details of the platform design are
presented along with its capabilities and also are revised some
explorations of the protein folding problems with different types of
discrete space. It is also shown the capability of the platform to
incorporate specific tools for the structural analysis of the runs in
order to understand and improve the optimization process.
Accordingly, the results obtained demonstrate that the ensemble of
computational tools into a single platform is worthwhile by itself,
since experiments developed on it can be designed to fulfill different
levels of information in a self-consistent fashion. By now, it is being
explored how an experiment design can be useful to create a
computational agent to be included within the platform. These
inclusions of designed agents –or software pieces– are useful for the
better accomplishment of the tasks to be developed by the platform.
Clearly, while the number of agents increases the new version of the
virtual laboratory thus enhances in robustness and functionality.
Abstract: Cavitation in pumps is known as the formation of
vapor bubbles due to pressure drop and collapsing these bubbles. In
some conditions, it has been observed that the formation of bubbles
occurs at the pressure side of centrifugal pump blades. In this study,
the formation of bubbles at the pressure side of blades has been
investigated. Water is used in this study as the fluid and performance
curves were depicted for different flow rates in an approximately
constant speed. The results show that when a centrifugal pump works
in low flow rates, a secondary flow namely recirculation starts to
begin. In this condition, separation of flow increases which causes
vortex formation and local pressure drop and eventually the
formation of vapor bubbles starts.
Abstract: Many Wireless Sensor Network (WSN) applications necessitate secure multicast services for the purpose of broadcasting delay sensitive data like video files and live telecast at fixed time-slot. This work provides a novel method to deal with end-to-end delay and drop rate of packets. Opportunistic Routing chooses a link based on the maximum probability of packet delivery ratio. Null Key Generation helps in authenticating packets to the receiver. Markov Decision Process based Adaptive Scheduling algorithm determines the time slot for packet transmission. Both theoretical analysis and simulation results show that the proposed protocol ensures better performance in terms of packet delivery ratio, average end-to-end delay and normalized routing overhead.
Abstract: There has been a growing interest in utilizing surfactants in remediation processes to separate the hydrophobic volatile organic compounds (HVOCs) from aqueous solution. One attractive process is cloud point extraction (CPE), which utilizes nonionic surfactants as a separating agent. Since the surfactant cost is a key determination of the economic viability of the process, it is important that the surfactants are recycled and reused. This work aims to study the performance of the co-current vacuum stripping using a packed column for HVOCs removal from contaminated surfactant solution. Six types HVOCs are selected as contaminants. The studied surfactant is the branched secondary alcohol ethoxylates (AEs), Tergitol TMN-6 (C14H30O2). The volatility and the solubility of HVOCs in surfactant system are determined in terms of an apparent Henry’s law constant and a solubilization constant, respectively. Moreover, the HVOCs removal efficiency of vacuum stripping column is assessed in terms of percentage of HVOCs removal and the overall liquid phase volumetric mass transfer coefficient. The apparent Henry’s law constant of benzenz , toluene, and ethyl benzene were 7.00×10-5, 5.38×10-5, 3.35× 10-5 respectively. The solubilization constant of benzene, toluene, and ethyl benzene were 1.71, 2.68, 7.54 respectively. The HVOCs removal for all solute were around 90 percent.
Abstract: We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in security loss as an eavesdropper can distinguish between signal and decoy pulses by measuring the carrier photon number without affecting other statistics. We overcome this problem by optimizing the ratio of carrier photon number of decoy-to-signal pulse to be as close to unity as possible. In our method the switching between signal and decoy pulses is achieved by changing the amplitude of RF signal as opposed to modulating the intensity of optical signal thus reducing system cost. We find an improvement by a factor of 100 approximately in the key generation rate using decoy-state protocol. We also study the effect of source fluctuation on key rate. Our simulation results show a key generation rate of 1.5×10-4/pulse for link lengths up to 70km. Finally, we discuss the optimum value of average photon number of signal pulse for a given key rate while also optimizing the carrier ratio.
Abstract: Three dimensional simulations in tube in tube heat
exchangers are investigated numerically in this study. In these
simulations forced convective heat transfer and laminar flow of
single-phase water are considered. In order to measure heat transfer
parameters in these heat exchangers, FLUENT CFD Solver is used in
this numerical method. For the purpose of creating geometry and
exert boundary and initial conditions in the present model, finite
volume method in Computational Fluid Dynamics is used in this
study. In the present study, at each Z-location, variation of local
temperatures, heat flux and Nusselt number at the whole tube is
investigated in detail. Thereafter, averaged computational Nusselt
number in this model is calculated. In addition, conceivable pressure
drops have been obtained at each Z-location in this model. Then,
pressure drop values in the present model are explored. Finally, all
the numerical results for this kind of heat exchanger will be discussed
precisely.
Abstract: This paper attempts to explain response components of Electrovestibulography (EVestG) using a computer simulation of a three-canal model of the vestibular system. EVestG is a potentially new diagnostic method for Meniere's disease. EVestG is a variant of Electrocochleography (ECOG), which has been used as a standard method for diagnosing Meniere's disease - it can be used to measure the SP/AP ratio, where an SP/AP ratio greater than 0.4-0.5 is indicative of Meniere-s Disease. In EVestG, an applied head tilt replaces the acoustic stimulus of ECOG. The EVestG output is also an SP/AP type plot, where SP is the summing potential, and AP is the action potential amplitude. AP is thought of as being proportional to the size of a population of afferents in an excitatory neural firing state. A simulation of the fluid volume displacement in the vestibular labyrinth in response to various types of head tilts (ipsilateral, backwards and horizontal rotation) was performed, and a simple neural model based on these simulations developed. The simple neural model shows that the change in firing rate of the utricle is much larger in magnitude than the change in firing rates of all three semi-circular canals following a head tilt (except in a horizontal rotation). The data suggests that the change in utricular firing rate is a minimum 2-3 orders of magnitude larger than changes in firing rates of the canals during ipsilateral/backward tilts. Based on these results, the neural response recorded by the electrode in our EVestG recordings is expected to be dominated by the utricle in ipsilateral/backward tilts (It is important to note that the effect of the saccule and efferent signals were not taken into account in this model). If the utricle response dominates the EVestG recordings as the modeling results suggest, then EVestG has the potential to diagnose utricular hair cell damage due to a viral infection (which has been cited as one possible cause of Meniere's Disease).
Abstract: The wireless mesh networks (WMNs) are emerging technology in wireless networking as they can serve large scale high speed internet access. Due to its wireless multi-hop feature, wireless mesh network is prone to suffer from many attacks, such as denial of service attack (DoS). We consider a special case of DoS attack which is selective forwarding attack (a.k.a. gray hole attack). In such attack, a misbehaving mesh router selectively drops the packets it receives rom its predecessor mesh router. It is very hard to detect that packet loss is due to medium access collision, bad channel quality or because of selective forwarding attack. In this paper, we present a review of detection algorithms of selective forwarding attack and discuss their advantage & disadvantage. Finally we conclude this paper with open research issues and challenges.