Abstract: The objective of this research is to mitigate and prevent
the alkali silica reactivity (ASR) in highway construction projects.
ASR is a deleterious reaction initiated when the silica content of the
aggregate reacts with alkali hydroxides in cement in the presence of
relatively high moisture content. The ASR results in the formation of
an expansive white colored gel-like material which forms the
destructive tensile stresses inside hardened concrete. In this research, different types of local aggregates available in the
State of Arkansas were mixed and mortar bars were poured according
to the ASTM specifications. Mortar bars expansion was measured
versus time and aggregates with potential ASR problems were
detected. Different types of supplementary cementitious materials
(SCMs) were used in remixing mortar bars with highly reactive
aggregates. Length changes for remixed bars proved that different
types of SCMs can be successfully used in reducing the expansive
effect of ASR. SCMs percentage by weight is highly dependent on
the SCM type. The result of this study will help avoiding future
losses due to ASR cracking in construction project and reduce the
maintenance, repair, and replacement budgets required for highways
network.
Abstract: Many cluster based routing protocols have been
proposed in the field of wireless sensor networks, in which a group of
nodes are formed as clusters. A cluster head is selected from one
among those nodes based on residual energy, coverage area, number
of hops and that cluster-head will perform data gathering from
various sensor nodes and forwards aggregated data to the base station
or to a relay node (another cluster-head), which will forward the
packet along with its own data packet to the base station. Here a
Game Theory based Diligent Energy Utilization Algorithm (GTDEA)
for routing is proposed. In GTDEA, the cluster head selection is done
with the help of game theory, a decision making process, that selects
a cluster-head based on three parameters such as residual energy
(RE), Received Signal Strength Index (RSSI) and Packet Reception
Rate (PRR). Finding a feasible path to the destination with minimum
utilization of available energy improves the network lifetime and is
achieved by the proposed approach. In GTDEA, the packets are
forwarded to the base station using inter-cluster routing technique,
which will further forward it to the base station. Simulation results
reveal that GTDEA improves the network performance in terms of
throughput, lifetime, and power consumption.
Abstract: Energy has a prominent role for development of
nations. Countries which have energy resources also have strategic
power in the international trade of energy since it is essential for all
stages of production in the economy. Thus, it is important for
countries to analyze the weaknesses and strength of the system. On
the other side, international trade is one of the fields that are analyzed
as a complex network via network analysis. Complex network is one
of the tools to analyze complex systems with heterogeneous agents
and interaction between them. A complex network consists of nodes
and the interactions between these nodes. Total properties which
emerge as a result of these interactions are distinct from the sum of
small parts (more or less) in complex systems. Thus, standard
approaches to international trade are superficial to analyze these
systems. Network analysis provides a new approach to analyze
international trade as a network. In this network, countries constitute
nodes and trade relations (export or import) constitute edges. It
becomes possible to analyze international trade network in terms of
high degree indicators which are specific to complex networks such
as connectivity, clustering, assortativity/disassortativity, centrality,
etc. In this analysis, international trade of crude oil and coal which
are types of fossil fuel has been analyzed from 2005 to 2014 via
network analysis. First, it has been analyzed in terms of some
topological parameters such as density, transitivity, clustering etc.
Afterwards, fitness to Pareto distribution has been analyzed via
Kolmogorov-Smirnov test. Finally, weighted HITS algorithm has
been applied to the data as a centrality measure to determine the real
prominence of countries in these trade networks. Weighted HITS
algorithm is a strong tool to analyze the network by ranking countries
with regards to prominence of their trade partners. We have
calculated both an export centrality and an import centrality by
applying w-HITS algorithm to the data. As a result, impacts of the
trading countries have been presented in terms of high-degree
indicators.
Abstract: The early-stage damage detection in offshore
structures requires continuous structural health monitoring and for the
large area the position of sensors will also plays an important role in
the efficient damage detection. Determining the dynamic behavior of
offshore structures requires dense deployment of sensors. The wired
Structural Health Monitoring (SHM) systems are highly expensive
and always needs larger installation space to deploy. Wireless sensor
networks can enhance the SHM system by deployment of scalable
sensor network, which consumes lesser space. This paper presents the
results of wireless sensor network based Structural Health Monitoring
method applied to a scaled experimental model of offshore structure
that underwent wave loading. This method determines the
serviceability of the offshore structure which is subjected to various
environment loads. Wired and wireless sensors were installed in the
model and the response of the scaled BLSRP model under wave
loading was recorded. The wireless system discussed in this study is
the Raspberry pi board with Arm V6 processor which is programmed
to transmit the data acquired by the sensor to the server using Wi-Fi
adapter, the data is then hosted in the webpage. The data acquired
from the wireless and wired SHM systems were compared and the
design of the wireless system is verified.
Abstract: We investigate the large scale of networks in the
context of network survivability under attack. We use appropriate
techniques to evaluate and the attacker-based- and the defenderbased-
network survivability. The attacker is unaware of the operated
links by the defender. Each attacked link has some pre-specified
probability to be disconnected. The defender choice is so that to
maximize the chance of successfully sending the flow to the
destination node. The attacker however will select the cut-set with
the highest chance to be disabled in order to partition the network.
Moreover, we extend the problem to the case of selecting the best p
paths to operate by the defender and the best k cut-sets to target by
the attacker, for arbitrary integers p,k>1. We investigate some
variations of the problem and suggest polynomial-time solutions.
Abstract: In wireless sensor network, sensor node transmits the
sensed data to the sink node in multi-hop communication
periodically. This high traffic induces congestion at the node which is
present one-hop distance to the sink node. The packet transmission
and reception rate of these nodes should be very high, when
compared to other sensor nodes in the network. Therefore, the energy
consumption of that node is very high and this effect is known as the
“funneling effect”. The tree based-data aggregation technique
(TBDA) is used to reduce the energy consumption of the node. The
throughput of the overall performance shows a considerable decrease
in the number of packet transmissions to the sink node. The proposed
scheme, TBDA, avoids the funneling effect and extends the lifetime
of the wireless sensor network. The average case time complexity for
inserting the node in the tree is O(n log n) and for the worst case time
complexity is O(n2).
Abstract: Companies face increasing challenges in research due
to higher costs and risks. The intensifying technology complexity and
interdisciplinarity require unique know-how. Therefore, companies
need to decide whether research shall be conducted internally or
externally with partners. On the other hand, research institutes meet
increasing efforts to achieve good financing and to maintain high
research reputation. Therefore, relevant research topics need to be
identified and specialization of competency is necessary. However,
additional competences for solving interdisciplinary research projects
are also often required. Secured financing can be achieved by
bonding industry partners as well as public fundings. The realization
of faster and better research drives companies and research institutes
to cooperate in organized research networks, which are managed by
an administrative organization. For an effective and efficient
cooperation, necessary processes, roles, tools and a set of rules need
to be determined. Goal of this paper is to show the state-of-art
research and to propose a governance framework for organized
research networks.
Abstract: Small-size and low-power sensors with sensing, signal
processing and wireless communication capabilities is suitable for the
wireless sensor networks. Due to the limited resources and battery
constraints, complex routing algorithms used for the ad-hoc networks
cannot be employed in sensor networks. In this paper, we propose
node-disjoint multi-path hexagon-based routing algorithms in wireless
sensor networks. We suggest the details of the algorithm and compare
it with other works. Simulation results show that the proposed scheme
achieves better performance in terms of efficiency and message
delivery ratio.
Abstract: In this paper, a robust fault detection and isolation
(FDI) scheme is developed to monitor a multivariable nonlinear
chemical process called the Chylla-Haase polymerization reactor,
when it is under the cascade PI control. The scheme employs a radial
basis function neural network (RBFNN) in an independent mode to
model the process dynamics, and using the weighted sum-squared
prediction error as the residual. The Recursive Orthogonal Least
Squares algorithm (ROLS) is employed to train the model to
overcome the training difficulty of the independent mode of the
network. Then, another RBFNN is used as a fault classifier to isolate
faults from different features involved in the residual vector. Several
actuator and sensor faults are simulated in a nonlinear simulation of
the reactor in Simulink. The scheme is used to detect and isolate the
faults on-line. The simulation results show the effectiveness of the
scheme even the process is subjected to disturbances and
uncertainties including significant changes in the monomer feed rate,
fouling factor, impurity factor, ambient temperature, and
measurement noise. The simulation results are presented to illustrate
the effectiveness and robustness of the proposed method.
Abstract: Wireless networks are built upon the open shared
medium which makes easy for attackers to conduct malicious
activities. Jamming is one of the most serious security threats to
information economy and it must be dealt efficiently. Jammer
prevents legitimate data to reach the receiver side and also it
seriously degrades the network performance. The objective of this
paper is to provide a general overview of jamming in wireless
network. It covers relevant works, different jamming techniques,
various types of jammers and typical prevention techniques.
Challenges associated with comparing several anti-jamming
techniques are also highlighted.
Abstract: A geoelectric survey was carried out in some parts of
Angwan Gwari, an outskirt of Lapai Local Government Area on
Niger State which belongs to the Nigerian Basement Complex, with
the aim of evaluating the soil corrosivity, aquifer transmissivity and
protective capacity of the area from which aquifer characterisation
was made. The G41 Resistivity Meter was employed to obtain fifteen
Schlumberger Vertical Electrical Sounding data along profiles in a
square grid network. The data were processed using interpex 1-D
sounding inversion software, which gives vertical electrical sounding
curves with layered model comprising of the apparent resistivities,
overburden thicknesses, and depth. This information was used to
evaluate longitudinal conductance and transmissivities of the layers.
The results show generally low resistivities across the survey area
and an average longitudinal conductance variation from
0.0237Siemens in VES 6 to 0.1261Siemens in VES 15 with almost
the entire area giving values less than 1.0 Siemens. The average
transmissivity values range from 96.45 Ω.m2 in VES 4 to 299070
Ω.m2 in VES 1. All but VES 4 and VES14 had an average
overburden greater than 400 Ω.m2, these results suggest that the
aquifers are highly permeable to fluid movement within, leading to
the possibility of enhanced migration and circulation of contaminants
in the groundwater system and that the area is generally corrosive.
Abstract: Wireless Sensor Networks (WSNs), which sense
environmental data with battery-powered nodes, require multi-hop
communication. This power-demanding task adds an extra workload
that is unfairly distributed across the network. As a result, nodes run
out of battery at different times: this requires an impractical
individual node maintenance scheme. Therefore we investigate a new
Cooperative Sensing approach that extends the WSN operational life
and allows a more practical network maintenance scheme (where all
nodes deplete their batteries almost at the same time). We propose a
novel cooperative algorithm that derives a piecewise representation
of the sensed signal while controlling approximation accuracy.
Simulations show that our algorithm increases WSN operational life
and spreads communication workload evenly. Results convey a
counterintuitive conclusion: distributing workload fairly amongst
nodes may not decrease the network power consumption and yet
extend the WSN operational life. This is achieved as our cooperative
approach decreases the workload of the most burdened cluster in the
network.
Abstract: The energy need is growing rapidly due to the
population growth and the large new usage of power. Several works
put considerable efforts to make the electricity grid more intelligent
to reduce essentially energy consumption and provide efficiency and
reliability of power systems. The Smart Grid is a complex
architecture that covers critical devices and systems vulnerable to
significant attacks. Hence, security is a crucial factor for the success
and the wide deployment of Smart Grids. In this paper, we present
security issues of the Smart Grid architecture and we highlight open
issues that will make the Smart Grid security a challenging research
area in the future.
Abstract: Since the last decade, there has been a rapid growth in
digital multimedia, such as high-resolution media files and threedimentional
movies. Hence, there is a need for large digital storage
such as Hard Disk Drive (HDD). As such, users expect to have a
quieter HDD in their laptop. In this paper, a jury test has been
conducted on a group of 34 people where 17 of them are students
who are the potential consumer, and the remaining are engineers who
know the HDD. A total 13 HDD sound samples have been selected
from over hundred HDD noise recordings. These samples are
selected based on an agreed subjective feeling. The samples are
played to the participants using head acoustic playback system, which
enabled them to experience as similar as possible the same
environment as have been recorded. Analysis has been conducted and
the obtained results have indicated different group has different
perception over the noises. Two neural network-based acoustic
annoyance models are established based on back propagation neural
network. Four psychoacoustic metrics, loudness, sharpness,
roughness and fluctuation strength, are used as the input of the
model, and the subjective evaluation results are taken as the output.
The developed models are reasonably accurate in simulating both
training and test samples.
Abstract: In this paper, synchronization of multiple chaotic
semiconductor lasers is achieved by appealing to complex system
theory. In particular, we consider dynamical networks composed by
semiconductor laser, as interconnected nodes, where the interaction
in the networks are defined by coupling the first state of each node.
An interest case is synchronized with master-slave configuration in
star topology. Nodes of these networks are modeled for the laser and
simulate by Matlab. These results are applicable to private
communication.
Abstract: The design of Reverse logistics Network has attracted
growing attention with the stringent pressures from both
environmental awareness and business sustainability. Reverse
logistical activities include return, remanufacture, disassemble and
dispose of products can be quite complex to manage. In addition,
demand can be difficult to predict, and decision making is one of the
challenges task in such network. This complexity has amplified the
need to develop an integrated architecture for product return as an
enterprise system. The main purpose of this paper is to design Multi
Agent System (MAS) architecture using the Prometheus
methodology to efficiently manage reverse logistics processes. The
proposed MAS architecture includes five types of agents: Gate
keeping Agent, Collection Agent, Sorting Agent, Processing Agent
and Disposal Agent which act respectively during the five steps of
reverse logistics Network.
Abstract: Mobile Adhoc Networks (MANETs) are
infrastructure-less, dynamic network of collections of wireless mobile
nodes communicating with each other without any centralized
authority. A MANET is a mobile device of interconnections through
wireless links, forming a dynamic topology. Routing protocols have a
big role in data transmission across a network. Routing protocols,
two major classifications are unipath and multipath. This study
evaluates performance of an on-demand multipath routing protocol
named Adhoc On-demand Multipath Distance Vector routing
(AOMDV). This study proposes Energy Aware AOMDV (EAAOMDV)
an extension of AOMDV which decreases energy
consumed on a route.
Abstract: This study found that most corporate personnel are
using social media to communicate with colleagues to make the
process of working more efficient. Complete satisfaction occurred on
the use of security within the University’s computer network. The
social network usage for communication, collaboration,
entertainment and demonstrating concerns accounted for fifty percent
of variance to predict interpersonal relationships of corporate
personnel. This evaluation on the effectiveness of social networking
involved 213 corporate personnel’s. The data was collected by
questionnaires. This data was analyzed by using percentage, mean,
and standard deviation.
The results from the analysis and the effectiveness of using online
social networks were derived from the attitude of private users and
safety data within the security system. The results showed that the
effectiveness on the use of an online social network for corporate
personnel of Suan Sunandha Rajabhat University was specifically at
a good level, and the overall effects of each aspect was (Ẋ=3.11).
Abstract: The new era of digital communication has brought up
many challenges that network operators need to overcome. The high
demand of mobile data rates require improved networks, which is a
challenge for the operators in terms of maintaining the quality of
experience (QoE) for their consumers. In live video transmission,
there is a sheer need for live surveillance of the videos in order to
maintain the quality of the network. For this purpose objective
algorithms are employed to monitor the quality of the videos that are
transmitted over a network. In order to test these objective algorithms,
subjective quality assessment of the streamed videos is required, as the
human eye is the best source of perceptual assessment. In this paper we
have conducted subjective evaluation of videos with varying spatial
and temporal impairments. These videos were impaired with frame
freezing distortions so that the impact of frame freezing on the quality
of experience could be studied. We present subjective Mean Opinion
Score (MOS) for these videos that can be used for fine tuning the
objective algorithms for video quality assessment.
Abstract: The Trustworthy link failure recovery algorithm is
introduced in this paper, to provide the forwarding continuity even
with compound link failures. The ephemeral failures are common in
IP networks and it also has some proposals based on local rerouting.
To ensure forwarding continuity, we are introducing the compound
link failure recovery algorithm, even with compound link failures.
For forwarding the information, each packet carries a blacklist, which
is a min set of failed links encountered along its path, and the next
hop is chosen by excluding the blacklisted links. Our proposed
method describes how it can be applied to ensure forwarding to all
reachable destinations in case of any two or more link or node
failures in the network. After simulating with NS2 contains lot of
samples proved that the proposed protocol achieves exceptional
concert even under elevated node mobility using Trustworthy link
Failure Recovery Algorithm.