Version-2 (Mar-Apr 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | A Low-Delay MAC Protocol for QoS VLC Networks |
Country | : | Saudi Arabia |
Authors | : | Abdullah Baz |
: | 10.9790/0661-2002020109 |
Abstract: The Visible Lighting Communication (VLC) forms on of the enabling technology for modern and envision communication systems. Although VLC has received lots of attention from standard bodies and industrial committees to standardize its operations, most of these efforts overlooked the issues relating to Quality of Service (QoS). This paper considers such needs and introduces a novel mathematical framework to evaluate the end-to-end delay of VLC networks employing collision avoidance over carrier sensing multiple access protocol. Our model is built on near realistic assumptions in modeling which yields closed matches with simulation results. Based on the outcomes of the proposed model, this paper proposed to replace the exponential back-off mechanism of the above standard with linear back-off that results in low-delay.
Index Terms—IEEE 802.15.7, Visible Lighting Communication, CSMA-CA
[1] Cisco Networks, "Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015–2020," [Online], https://www.cisco.com/c/dam/m/en_in/innovation/enterprise/assets/mobile-white-paper-c11-520862.pdf, accessed on 29th of January 2018.
[2] P. H. Pathak, X. Feng, P. Hu and P. Mohapatra, "Visible Light Communication, Networking, and Sensing: A Survey, Potential and Challenges," in IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2047-2077, Fourthquarter 2015.
[3] D. Karunatilaka, F. Zafar, V. Kalavally and R. Parthiban, "LED Based Indoor Visible Light Communications: State of the Art," in IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1649-1678, thirdquarter 2015.
[4] G. M. Saridis, D. Alexandropoulos, G. Zervas and D. Simeonidou, "Survey and Evaluation of Space Division Multiplexing: From Technologies to Optical Networks," in IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2136-2156, Fourthquarter 2015.
[5] IEEE Standard for Local and Metropolitan Area Networks--Part 15.7: Short-Range Wireless Optical Communication Using Visible Light," in IEEE Std 802.15.7-2011 , vol., no., pp.1-309, Sept. 6 2011..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: To minimize the cost of routing in computer networks, the shortest path problem is greatly used in order to find the minimum distance path from source to destination. The shortest path problem is sometimes called the min-delay path problem. The main objective of this paper is to evaluate and discuss the general aspect of Dijkstra's Algorithm in solving the shortest path problem. Explanation and evaluation of the algorithm is illustrated in graphical forms in order to exhibit the functionality of the algorithm..
Keywords: Routing, Computer Networks, Min-Delay Path Problem, Dijkstra's Algorithm.
[1]. Srivastava, S.K, Srivastava, Deepali.( 2011). Data Structures Through C in Depth. BPB publications.
[2]. Baluja, G.S.(2008). Data Structures Through C. Dhanpat Rai & Co.(Pvt) Ltd.
[3]. Kairanbay, M., Jani, H. M.(2013). A Review And Evaluations Of Shortest Path Algorithms. international journal of scientific & technology research volume 2, issue 6.
[4]. Ojekudo, N.A., Akpan, N. P.(2017). Anapplication of Dijkstra's Algorithm to shortest route problem. Volume 13, Issue 3, PP 20-32.
[5]. Ahmat, K. A. (n.d.). Graph Theory and Optimization Problems for Very Large Networks. New York: City University of New York/Information Technology.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A numerical modeling was performed that simulates the thermal and fluid-dynamic behavior and generation of chemical species from the biomass gasification process in a downdraft reactor using computational fluid dynamics (CFD). The simulation process was assumed as a stationary state, energy models, turbulence, transport of species and multiphase were established to adequately represent the equations that govern the transfer of mass, momentum and energy in the thermo-chemical degradation process of biomass. Variations in the airflow rate entered into the reactor were established in order to determine the optimum point of operation of the reactor. It was determined that using a flow rate of 400 l/min of air, the best results in terms of the quality of syngas produced are obtained, establishing this condition as the optimum operating point of the reactor.
Keywords:Biomass, CFD, downdraft gasifier, syngas.
[1]. Intelligent Energy Europe. Final guideline for safe and eco-friendly biomass gasification. Bruselas: EuropeanCommission; 2009. 10 p.
[2]. Roldán VC. Informe de capacidad de energías limpias en Costa Rica 2010. Cartago, Tecnológico de Costa Rica, Escuela de Química, 2010.
[3]. Herguido J, Corella J, González-Saiz J. Steam gasification of lignocellulosic residues in a fluidized bed at a small pilot scale. Effect of the type of feedstock. IndEngChem Res. 1992;31(5):1274–82.
[4]. Wang Y, Yan L. CFD Studies on Biomass Thermochemical Conversion. Int J Mol Sci. 2008;9:1108-30.
[5]. Magnussen BF, Hjertager BH. On mathematical Modeling of turbulent combustion with special emphasis on soot formation and combustion. En: 16th symposium (international) on combustion. Pittsburgh, EstadosUnidos; 1976 Agosto 15-20. p. 719–29...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Home Automation For Visually Challenged |
Country | : | |
Authors | : | Nisarg Kahane || Kalpesh Rahate || Sayali Parkar || Prof. Renuka Nagpure |
: | 10.9790/0661-2002022730 |
Abstract: In comparison to the last decade, our lives have been drastically changed by technology. This has increased the quality of life and the next step of this evolution is the home automation. Home automation is the cornerstone to improving the quality of life visually challenged individuals as home automation can be used with various methods of input such as voice. We have focused on this specific demographic and pursued development in this field. With the help of Arduinos and voice-controlled operations, we can help visually challenged individuals feel more at home at their own homes and do things which may not come as easily to them..
[1]. Carelin Felix, I. Jacob Raglend, "Home Automation Using GSM",Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN 2011)
[2]. Azmul Hasan, Abdullah Al Mamun KhanNezam Uddin,AbuFarzan Mitul, "Design and Implementation of Touchscreen and Remote Control Based Home Automation System",Proceedings of 2013 2nd International Conference on Advances in Electrical Engineering (ICAEE 2013) 19-21 December, 2013, Dhaka, Bangladesh
[3]. E. A. Kosmatos, N. D. Tselikas, and A. C. Boucouvalas, "Integrating RFIDs and smart objects into a unified Internet of things architecture," Advances in Internet of Things, vol. 1, pp. 5-12, 2011.
[4]. Humaid AlShu'eili, Gourab Sen Gupta, Subhas Mukhopadhyay, "Voice Recognition Based Wireless Home Automation System", 2011 4 International Conference on Mechatronics (ICOM), 17-19 May 2011, Kuala Lumpur, Malaysia
[5]. Andreas Rosendahl, J. Felix Hampe, Goetz Botterweck, "Mobile Home Automation – Merging Mobile Value added Services and Home Automation Technologies", Sixth International Conference on the Management of Mobile Business (ICMB 2007)...
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Sequel to the over proliferation of industries in Kaduna coupled with the ethnic-religious crisis in many other parts of the northern Nigeria, resulting in the migration of very many people to Kaduna, the natural resources in the area, especially land and space became over consumed, causing many other environmental problems over the years. This study, therefore, was conducted to model and map landcover and landuse changes in Kaduna using Cellular Automata and multiple logistic regression with a view to ascertaining changes in the area. The objectives of this research work includes; classifying the multi-temporal satellite imageries of landsat ETM+ into built-up area, open space, farmland, vegetation and water bodies using 2004, 2009 and 2014 imageries; also to model the landcover and landuse changes of Kaduna and Environs using Cellular Automata and to predict the pattern of changes..............
Keywords: Mapping, Landcover/Landuse, Cellular Automata, and Multiple Logistic Regression
[1]. Almeida, C.M., Monteiro, M.V & Camara, G. (2000). Modeling the urban evolution of landuse transitions using cellular automata and logistic regression. International Journal of Remote sensing. 20 (2) 2708 – 2721.
[2]. Araya, Y.H (2009). Urban landuse change analysis and modeling: A case study of Setubal and sesimbra. Portugal, unpublished M.Sc Thesis. Institute for geo-informatics. University of Munster.
[3]. Batty, M., Xie, Y., & Sun, Z. (2004). Modeling urban dynamics through GIS-based cellular automata: Journal of Geo-physical Research, 97 (1) 2678 – 2696.
[4]. Brown,D. B., Pijanowski, O. & Duh, J. (2000). Modeling the Relationships between landuse and landcover on Private lands in the upper Mid – west, WA. Journal of Environmental Management 59 (2) 247 – 263.
[5]. Cui, W., Gao, T & Wu, F. (2014): An integrated approach based on cellular automata for simulation of urban landuse changes. An International Journal on Applied Mathematics and Information Sciences. 9 (2) 769 –775...
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The purpose of this study is to develop teaching materials handout to improve the ability of science literacy and decision –making skills , the type of research with the subjects of test students as much one class in the class XI SMAN I NARMADA west Lombok and students as much one class in class XI daughter pondok pesantren nurul hakim west Lombok, handout validation feasibility test by expert ,expert handout and senior teacher showed that the material of handout developed-developed feasible with 3,24.The feasibility and readability test using uestionnaire , while the effectiveness test using pretest-posttest , attractiveness by the students in two schools showed 3,30 and 3,25 feasible, while the feasibility test of teacher and student"s response in using handout materials 3,33 and 3,24 shows that the development of handout materials is very feasible to be used KBM process of material hydrocarbon.
Keywords: Hydrocarbons, Taching Materian Handout, Literacy Science, Skill Decision- Making
[1]. Agus susilo , 2015 . Jurnal Pengembangan perangkat pembelajaran kimia berbasis saintifik untuk peningkatan kemampuan aplikatif dalam proses pembelajaran . malang : Universitas Brawijaya.
[2]. Colthorpeykay , Zimbardi,Kristen smith arron and andrea bugarcis. 2015. Jurnal Mathematics education progressive development of scientific literacy through assessment inquiry based biomedical science curricula. Brisbane. Australia : University of Queensland.
[3]. Dahar, R.W. 2011. Teori-teori Belajar dan Pembelajaran. Jakarta: Erlangga.
[4]. Daryanto. 2013. Menyusun Modul. Yogyakarta. Gava Media.
[5]. DIah Andayani, 2015 . Pengembangan modul kimia berbasis saintifik pada pembelajaran eletrolisis sebagai sumber belajar peserta didik kelas XII. Jogjakarta : Universitas islam negeri..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: With digitization, data hiding has become more important than ever. Steganography forms an undisputable tool to attain privacy during data sharing. Steganography is the art and science of hiding data within seemingly innocuous data so as to not draw suspicion. This paper provides a survey on steganography, its advantage over cryptography, the types of digital media over which steganography can be applied and the progress of steganographic methods and recent trends in steganography. Images, video, text, audio are the digital media which serve as cover-media through which secret data may be transmitted often by exchanging stego-key..
Keywords: cover-media, data hiding, digital media, steganographic technique, stego-key
[1] T. K. Hazra, R. Ghosh, S. Kumar, S. Dutta and A. K. Chakraborty, "File encryption using Fisher-Yates Shuffle," 2015 International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, BC, 2015, pp. 1-7. doi: 10.1109/IEMCON.2015.7344521
[2] T. K. Hazra, S. R. Chowdhury and A. K. Chakraborty, "Encrypted Image Retrieval System: A machine learning approach," 2016 IEEE 7thAnnual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, 2016, pp. 1-6.doi: 10.1109/IEMCON.2016.7746351
[3] T. K. Hazra and S. Bhattacharyya, "Image encryption by blockwise pixel shuffling using Modified Fisher Yates shuffle and pseudorandom permutations," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON),Vancouver, BC, 2016, pp. 1-6. doi: 10.1109/IEMCON.2016.7746312
[4] T. K. Hazra, N. Kumari, Monica, S. Priya and A. K. Chakraborty,"Image encryption and decryption using phase mask over sinusoidal single and cross grating," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference(IEMCON), Vancouver, BC, 2016, pp. 1-6. doi:10.1109/IEMCON.2016.7746317
[5] N. U. Sheikh, T. K. Hazra, H. Rahman, K. Mustafi and A. K. Chakraborty, "Multi-variable bijective mapping for secure encryption and decryption," 2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, 2017, pp. 338-345. doi: 10.1109/IEMECON.2017.8079619..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: General packet radio service (GPRS) is a 2.5 generation cellular technology that was introduced as an extension of Global System for Mobile (GSM) networks to address their limitations in providing packet-oriented services. The modern-day mobile devices allow their users to stay connected to the digital world and access a large variety of services. The nature of these services cannot be described just as one global service because the capacity demand and time constraints vary from one type of service to another. Multimedia applications require soft Quality of Service (QoS) constraints. However, network traffic is highly diverse and each traffic type has unique bandwidth, delay, and availability requirements...........
[1]. Brizmer A., "The impact of radio network factors on the QoS of GPRS applications", Tallinn University Of Technology, Radio and Communication Engineering, GPRS service quality of the wireless network settings No.: LT IRT84 ,Estonia 2005.
[2]. Narayanan R., "Modeling and Performance Evaluation of General Packet Radio Service", M.S.c, thesis ,of applied science , school of Engineering Science, Simon Fraser University, Burnaby, BC, Canada,2006.
[3]. Sarraf C., El-khazan L, Zoghby T, Maksoud J, El-asmar and . Nassif J. "Measuring QOS for GPRS Mobile Networks", Ministry of Telecommunications and Faculty of engineering - Lebanese University, Lebanon, 2004.
[4]. Narayanan R., Omueti M., Trajkovic L, "Effect of Cell Update on Performance of General Packet Radio Service", Simon Fraser University, Canada, Session 1541, 2G/2.5G/3G Networks II, OPNET Technologies, Inc.2006.
[5]. Bujari A, Palazzi C, Cervi E., "P2P File Sharing on Mobile Phones: Design and Implementation of a Prototype" Department of Pure and Applied Mathematics, University of Padua, Padua, Italy 2009..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Wireless Sensor Network consists of several resource constrained sensor nodes which are expected to operate autonomously for a long time, e.g., for months or even years. Due to limited availability of power supply, a major concern in WSN is energy conservation. During the earlier stages of the development of WSN, nodes were static and communication between any two nodes was done by using a multi-hop path. A lot of research was done and literature was available about various energy conservation schemes of static WSN. Later mobility is introduced, and it has been considered as an alternative solution for energy-efficient data collection in wireless sensor networks. Several issues regarding connectivity can be solved by introducing mobility in WSN. In this paper, we.........
Key Words: Energy Efficiency, Mobile Wireless sensor Networks, Mobile Sink, Mobile Relay, Cross Layer, Routing, Clustering.
[1] I.F. Akyildiz, I.H. Kasimoglu. Wireless sensor and actor networks: research challenges. Ad Hoc Networks Journal. 2004; 2 (4):351–367.
[2] X. Wang, X. Lin, Q. Wang, and W. Luan. Mobility increases the connectivity of wireless networks. IEEE/ACM Trans. Networking. 2013; 21(2) :440–454.
[3] M. Cattani, S. Guna, and G. P. Picco. Group monitoring in mobile wireless sensor networks. in Proc. Int. Conf. Distrib. Comput. Sensor Syst. Workshops (DCOSS). 2011;1–8.
[4] T. Melodia, D. Pompili, and I. F. Akyldiz. Handling mobility in wireless sensor and actor networks. IEEE Trans. Mobile Computing. 2010; 9(2):160–173.
[5] W.-Y. Lee, K. Hur, K.-I. Hwang, D.-S. Eom, and J.-O. Kim. Mobile robot navigation using wireless sensor networks without localization procedure. Wireless Pers. Communication. 2012; 62(2): 257–275...
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A Cloud computing is a dynamic computing sharing resource. The cloud computing paradigm has emerged and that is transforming the IT industry at huge. In cloud computing, all resources are available as services and accessible through the Internet. Especially Software-As-A-Service (SaaS) is a service delivery model that support end users to access any software or an application as a service via the Internet without installing at local. The usage of SaaS has been increased by many users and thus leads to need to evaluate the quality of SaaS to select the best one that suits to cloud service users. In this paper, a quality model is implemented by using data mining Estimation and Maximization (EM)-clustering model for evaluating the quality of software as a service (SaaS) in the cloud computing environment.
Key Words: SaaS, Cloud Computing, EM-Clustering..
[1] N. Alldrin, A. Smith, and D. Turnbull, "Clustering with EM and K-means," Univ. San Diego, California, pp. 261–95, 2003.
[2] A. Kak and A. Kak, "Expectation Maximization Tutorial Expectation-Maximization Algorithm for Clustering Multidimensional Numerical Data Expectation Maximization Tutorial," vol. 2012, no. November, 2014.
[3] T. M. Mitchell, "Expectation Maximization, and Learning from Partly Unobserved Data (part 2)," Mach. Learn., vol. 15, no. April, 2005.
[4] G. Distribution and I. Criteria, "Package "EMCluster,‟" 2015.
[5] S. Borman, "The Expectation Maximization Algorithm A short tutorial," Submitt. Publ., vol. 25, no. x, pp. 1–9, 2009....
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Secure Digi locker application is an advanced application where we can store the files or documents such as certificates, PAN Card, Birth certificates, legal documents or confidential documents etc. in the internal memory. It makes it easy because holding or carrying the documents manually is difficult as there may be chances of misplacing. The application is developed where the files are uploaded and stored in the encrypted format with the key generation to avoid any kind of hacking. The registered users have permission to access the files. If the user is an intruder and wants to access the files then the message is sent to the actual user. The security is provided with the help of key generated with password entered..
Key Words: secure, encryption, key generation.
[1] Visual Cryptography Authentication for Locker Systems using Biometric Input, Siddhesh Urkude, Pranjali Vaidya, Shagufta Rajguru. International Journal of Computer Applications (0975 – 8887) Volume 130 – No.1, November 2015.
[2] A Digital Locker for Scanned Documents by using Steganography and Visual Cryptography, Ms. Vaishnavi J. Deshmukh , Dr. M .A. Pund, International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 ISSN 2229-5518.
[3] Digital Locker. Ms.Mehek Gulati , Ms.Kanika Verma. June 2016, Volume 3, Issue 6 JETIR (ISSN-2349-5162).
[4] Digilocker (Digital Locker - Ambitious Aspect of Digital India Programme)., Purushottam Petare,, Pratapsinh Mohite, Mugdha Joshi, GE-International Journal of Management Research, Volume - 3, Issue- 6 (June 2015) if-4.316 ISSN:(2321-1709) Page no-299-308.
[5] Secure Storing and Sharing of Documents on Cloud Pavan Ughade, Nikita Kapsi, Asha Mallappagol, Apoorva Tangod IOSR Journal of Computer Engineering (IOSR- JCE) e-ISSN: 2278-0661, P-ISSN: 2278-8727 PP 67-71..