Abstract: Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.
Abstract: Rotating stages in semiconductor, display industry and many other fields require challenging accuracy to perform their functions properly. Especially, Axis of rotation error on rotary system is significant; such as the spindle error motion of the aligner, wire bonder and inspector machine which result in the poor state of manufactured goods. To evaluate and improve the performance of such precision rotary stage, unessential movements on the other 5 degrees of freedom of the rotary stage must be measured and analyzed. In this paper, we have measured the three translations and two tilt motions of a rotating stage with high precision capacitive sensors. To obtain the radial error motion from T.I.R (Total Indicated Reading) of radial direction, we have used Donaldson's reversal technique. And the axial components of the spindle tilt error motion can be obtained accurately from the axial direction outputs of sensors by Estler face motion reversal technique. Further more we have defined and measured the sensitivity of positioning error to the five error motions.
Abstract: One of the key research issues in wireless sensor networks (WSNs) is how to efficiently deploy sensors to cover an area. In this paper, we present a Fishnet Based Dispatch Scheme (FiBDS) with energy aware mobility and interest based sensing angle. We propose two algorithms, one is FiBDS centralized algorithm and another is FiBDS distributed algorithm. The centralized algorithm is designed specifically for the non-time critical applications, commonly known as non real-time applications while the distributed algorithm is designed specifically for the time critical applications, commonly known as real-time applications. The proposed dispatch scheme works in a phase-selection manner. In this in each phase a specific constraint is dealt with according to the specified priority and then moved onto the next phase and at the end of each only the best suited nodes for the phase are chosen. Simulation results are presented to verify their effectiveness.
Abstract: This paper examines the issues, the dangers and the
saving graces of life in a transparent global community where there is
truly “no place to hide". In recent years, social networks and online
groups have transformed issues of privacy and the ways in which we
perceive and interact with others. The idea of reputation is critical to
this dynamic. The discussion begins with a brief etymological history
of the concept of reputation and moves to an exploration of how and
why online communication changes our basic nature, our various
selves and the Bakhtin idea of the polyphonic nature of truth. The
discussion considers the damaging effects of bullying and gossip,
both of which constitute an assault on reputation and the latter of
which is not limited to the lifetime of the person. It concludes with
guidelines and specific recommendations.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: Modern applications realized onto FPGAs exhibit high connectivity demands. Throughout this paper we study the routing constraints of Virtex devices and we propose a systematic methodology for designing a novel general-purpose interconnection network targeting to reconfigurable architectures. This network consists of multiple segment wires and SB patterns, appropriately selected and assigned across the device. The goal of our proposed methodology is to maximize the hardware utilization of fabricated routing resources. The derived interconnection scheme is integrated on a Virtex style FPGA. This device is characterized both for its high-performance, as well as for its low-energy requirements. Due to this, the design criterion that guides our architecture selections was the minimal Energy×Delay Product (EDP). The methodology is fully-supported by three new software tools, which belong to MEANDER Design Framework. Using a typical set of MCNC benchmarks, extensive comparison study in terms of several critical parameters proves the effectiveness of the derived interconnection network. More specifically, we achieve average Energy×Delay Product reduction by 63%, performance increase by 26%, reduction in leakage power by 21%, reduction in total energy consumption by 11%, at the expense of increase of channel width by 20%.
Abstract: In this paper, we argue the security protocols of
ZigBee wireless sensor network in MAC layer. AES 128-bit
encryption algorithm in CCM* mode is secure transferred data;
however, AES-s secret key will be break within nearest future.
Efficient public key algorithm, ECC has been mixed with AES to
rescue the ZigBee wireless sensor from cipher text and replay attack.
Also, the proposed protocol can parallelize the integrity function to
increase system performance.
Abstract: In this paper, we first consider the quality of service
problems in heterogeneous wireless networks for sending the video
data, which their problem of being real-time is pronounced. At last,
we present a method for ensuring the end-to-end quality of service at
application layer level for adaptable sending of the video data at
heterogeneous wireless networks. To do this, mechanism in different
layers has been used. We have used the stop mechanism, the
adaptation mechanism and the graceful degrade at the application
layer, the multi-level congestion feedback mechanism in the network
layer and connection cutting off decision mechanism in the link
layer. At the end, the presented method and the achieved
improvement is simulated and presented in the NS-2 software.
Abstract: The IEEE 802.11e which is an enhanced version of the 802.11 WLAN standards incorporates the Quality of Service (QoS) which makes it a better choice for multimedia and real time applications. In this paper we study various aspects concerned with 802.11e standard. Further, the analysis results for this standard are compared with the legacy 802.11 standard. Simulation results show that IEEE 802.11e out performs legacy IEEE 802.11 in terms of quality of service due to its flow differentiated channel allocation and better queue management architecture. We also propose a method to improve the unfair allocation of bandwidth for downlink and uplink channels by varying the medium access priority level.
Abstract: A wireless power transfer system can attribute to the
fields in robot, aviation and space in which lightening the weight of
device and improving the movement play an important role. A
wireless power transfer system was investigated to overcome the
inconvenience of using power cable. Especially a wireless power
transfer technology is important element for mobile robots. We
proposed the wireless power transfer system of the half-bridge
resonant converter with the frequency tracking and optimized
power transfer control unit. And the possibility of the application
and development system was verified through the experiment with
LED loads.
Abstract: In recent times there has been a growing interest in the
development of quasi-two-dimensional niobium pentoxide (Nb2O5)
as a semiconductor for the potential electronic applications such as
capacitors, filtration, dye-sensitised solar cells and gas sensing
platforms. Therefore once the purpose is established, Nb2O5 can be
prepared in a number of nano- and sub-micron-structural
morphologies that include rods, wires, belts and tubes. In this study
films of Nb2O5 were prepared on gold plated silicon substrate using
spin-coating technique and subsequently by mechanical exfoliation.
The reason this method was employed was to achieve layers of less
than 15nm in thickness. The sintering temperature of the specimen
was 800oC. The morphology and structural characteristics of the
films were analyzed by Atomic Force Microscopy (AFM), Raman
Spectroscopy, X-ray Photoelectron Spectroscopy (XPS).
Abstract: The main idea behind in network aggregation is that,
rather than sending individual data items from sensors to sinks,
multiple data items are aggregated as they are forwarded by the
sensor network. Existing sensor network data aggregation techniques
assume that the nodes are preprogrammed and send data to a central
sink for offline querying and analysis. This approach faces two major
drawbacks. First, the system behavior is preprogrammed and cannot
be modified on the fly. Second, the increased energy wastage due to
the communication overhead will result in decreasing the overall
system lifetime. Thus, energy conservation is of prime consideration
in sensor network protocols in order to maximize the network-s
operational lifetime. In this paper, we give an energy efficient
approach to query processing by implementing new optimization
techniques applied to in-network aggregation. We first discuss earlier
approaches in sensors data management and highlight their
disadvantages. We then present our approach “Energy Efficient
Indexed Aggregation" (EEIA) and evaluate it through several
simulations to prove its efficiency, competence and effectiveness.
Abstract: Information of nodes’ locations is an important
criterion for lots of applications in Wireless Sensor Networks. In the
hop-based range-free localization methods, anchors transmit the
localization messages counting a hop count value to the whole
network. Each node receives this message and calculates its own
distance with anchor in hops and then approximates its own position.
However the estimative distances can provoke large error, and affect
the localization precision. To solve the problem, this paper proposes
an algorithm, which makes the unknown nodes fix the nearest anchor
as a reference and select two other anchors which are the most
accurate to achieve the estimated location. Compared to the DV-Hop
algorithm, experiment results illustrate that proposed algorithm has
less average localization error and is more effective.
Abstract: Silicon nanowire (SiNW) based thermoelectric device (TED) has potential applications in areas such as chip level cooling/ energy harvesting. It is a great challenge however, to assemble an efficient device with these SiNW. The presence of parasitic in the form of interfacial electrical resistance will have a significant impact on the performance of the TED. In this work, we explore the effect of the electrical contact resistance on the performance of a TED. Numerical simulations are performed on SiNW to investigate such effects on its cooling performance. Intrinsically, SiNW individually without the unwanted parasitic effect has excellent cooling power density. However, the cooling effect is undermined with the contribution of the electrical contact resistance.
Abstract: The importance of our country-s communication
system is noticeable when a disaster occurs. The communication
system in our country includes wired and wireless telephone
networks, radio, satellite system and more increasingly internet. Even
though our communication system is most extensive and dependable,
extreme conditions can put a strain on them. Interoperability between
heterogeneous wireless networks can be used to provide efficient
communication for emergency first response. IEEE 802.21 specifies
Media Independent Handover (MIH) services to enhance the mobile
user experience by optimizing handovers between heterogeneous
access networks. This paper presents an algorithm to improve
congestion control in MIH framework. It is analytically shown that
by including time factor in network selection we can optimize
congestion in the network.
Abstract: This paper reports the results of an experimental study
conducted to characterise the gas-liquid multiphase flows
experienced within a vertical riser transporting a range of gas-liquid
flow rates. The scale experiments were performed using an
air/silicone oil mixture within a 6 m long riser. The superficial air
velocities studied ranged from 0.047 to 2.836 m/ s, whilst
maintaining a liquid superficial velocity at 0.047 m/ s. Measurements
of the mean cross-sectional and time average radial void fraction
were obtained using a wire mesh sensor (WMS). The data were
recorded at an acquisition frequency of 1000 Hz over an interval of
60 seconds. For the range of flow conditions studied, the average
void fraction was observed to vary between 0.1 and 0.9. An analysis
of the data collected concluded that the observed void fraction was
strongly affected by the superficial gas velocity, whereby the higher
the superficial gas velocity, the higher was the observed average void
fraction. The average void fraction distributions observed were in
good agreement with the results obtained by other researchers. When
the air-silicone oil flows were fully developed reasonably symmetric
profiles were observed, with the shape of the symmetry profile being
strongly dependent on the superficial gas velocity.
Abstract: This paper describes a prototype aircraft that can fly
slowly, safely and transmit wireless video for tasks like reconnaissance,
surveillance and target acquisition. The aircraft is designed to
fly in closed quarters like forests, buildings, caves and tunnels which
are often spacious but GPS reception is poor. Envisioned is that a
small, safe and slow flying vehicle can assist in performing dull,
dangerous and dirty tasks like disaster mitigation, search-and-rescue
and structural damage assessment.
Abstract: In this paper, a multi-agent robot system is presented. The system consists of four robots. The developed robots are able to automatically enter and patrol a harmful environment, such as the building infected with virus or the factory with leaking hazardous gas. Further, every robot is able to perform obstacle avoidance and search for the victims. Several operation modes are designed: remote control, obstacle avoidance, automatic searching, and so on.
Abstract: The main goal of this paper is to establish a
methodology for testing and optimizing GPRS performance over
Libya GSM network as well as to propose a suitable optimization
technique to improve performance. Some measurements of
download, upload, throughput, round-trip time, reliability, handover,
security enhancement and packet loss over a GPRS access network
were carried out. Measured values are compared to the theoretical
values that could be calculated beforehand. This data should be
processed and delivered by the server across the wireless network to
the client. The client on the fly takes those pieces of the data and
process immediately. Also, we illustrate the results by describing the
main parameters that affect the quality of service. Finally, Libya-s
two mobile operators, Libyana Mobile Phone and Al-Madar al-
Jadeed Company are selected as a case study to validate our
methodology.
Abstract: This paper proposes a three-phase four-wire currentcontrolled
Voltage Source Inverter (CC-VSI) for both power quality
improvement and PV energy extraction. For power quality
improvement, the CC-VSI works as a grid current-controlling shunt
active power filter to compensate for harmonic and reactive power of
loads. Then, the PV array is coupled to the DC bus of the CC-VSI
and supplies active power to the grid. The MPPT controller employs
the particle swarm optimization technique. The output of the MPPT
controller is a DC voltage that determines the DC-bus voltage
according to PV maximum power. The PSO method is simple and
effective especially for a partially shaded PV array. From computer
simulation results, it proves that grid currents are sinusoidal and inphase
with grid voltages, while the PV maximum active power is
delivered to loads.