Search results for: crystallographic packet
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 205

Search results for: crystallographic packet

115 Experimental Evaluation of UDP in Wireless LAN

Authors: Omar Imhemed Alramli

Abstract:

As Transmission Control Protocol (TCP), User Datagram Protocol (UDP) is transfer protocol in the transportation layer in Open Systems Interconnection model (OSI model) or in TCP/IP model of networks. The UDP aspects evaluation were not recognized by using the pcattcp tool on the windows operating system platform like TCP. The study has been carried out to find a tool which supports UDP aspects evolution. After the information collection about different tools, iperf tool was chosen and implemented on Cygwin tool which is installed on both Windows XP platform and also on Windows XP on virtual box machine on one computer only. Iperf is used to make experimental evaluation of UDP and to see what will happen during the sending the packets between the Host and Guest in wired and wireless networks. Many test scenarios have been done and the major UDP aspects such as jitter, packet losses, and throughput are evaluated.

Keywords: TCP, UDP, IPERF, wireless LAN

Procedia PDF Downloads 327
114 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.

Keywords: DSR, OLSR, quality of service, routing protocols, MANET

Procedia PDF Downloads 527
113 Modelling Ibuprofen with Human Albumin

Authors: U. L. Fulco, E. L. Albuquerque, José X. Lima Neto, L. R. Da Silva

Abstract:

The binding of the nonsteroidal anti-inflammatory drug ibuprofen (IBU) to human serum albumin (HSA) is investigated using density functional theory (DFT) calculations within a fragmentation strategy. Crystallographic data for the IBU–HSA supramolecular complex shows that the ligand is confined to a large cavity at the subdomain IIIA and at the interface between the subdomains IIA and IIB, whose binding sites are FA3/FA4 and FA6, respectively. The interaction energy between the IBU molecule and each amino acid residue of these HSA binding pockets was calculated using the Molecular Fractionation with Conjugate Caps (MFCC) approach employing a dispersion corrected exchange–correlation functional. Our investigation shows that the total interaction energy of IBU bound to HSA at binding sites of the fatty acids FA3/FA4 (FA6) converges only for a pocket radius of at least 8.5 °A, mainly due to the action of residues Arg410, Lys414 and Ser489 (Lys351, Ser480 and Leu481) and residues in nonhydrophobic domains, namely Ile388, Phe395, Phe403, Leu407, Leu430, Val433, and Leu453 (Phe206, Ala210, Ala213, and Leu327), which is unusual. Our simulations are valuable for a better understanding of the binding mechanism of IBU to albumin and can lead to the rational design and the development of novel IBU-derived drugs with improved potency.

Keywords: ibuprofen, human serum albumin, density functional theory, binding energies

Procedia PDF Downloads 326
112 Comparative Study of Ad Hoc Routing Protocols in Vehicular Ad-Hoc Networks for Smart City

Authors: Khadija Raissi, Bechir Ben Gouissem

Abstract:

In this paper, we perform the investigation of some routing protocols in Vehicular Ad-Hoc Network (VANET) context. Indeed, we study the efficiency of protocols like Dynamic Source Routing (DSR), Ad hoc On-demand Distance Vector Routing (AODV), Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing convention (OLSR) and Vehicular Multi-hop algorithm for Stable Clustering (VMASC) in terms of packet delivery ratio (PDR) and throughput. The performance evaluation and comparison between the studied protocols shows that the VMASC is the best protocols regarding fast data transmission and link stability in VANETs. The validation of all results is done by the NS3 simulator.

Keywords: VANET, smart city, AODV, OLSR, DSR, OLSR, VMASC, routing protocols, NS3

Procedia PDF Downloads 266
111 Performance Analysis and Energy Consumption of Routing Protocol in Manet Using Grid Topology

Authors: Vivek Kumar Singh, Tripti Singh

Abstract:

An ad hoc wireless network consists of mobile networks which creates an underlying architecture for communication without the help of traditional fixed-position routers. Ad-hoc On-demand Distance Vector (AODV) is a routing protocol used for Mobile Ad hoc Network (MANET). Nevertheless, the architecture must maintain communication routes although the hosts are mobile and they have limited transmission range. There are different protocols for handling the routing in the mobile environment. Routing protocols used in fixed infrastructure networks cannot be efficiently used for mobile ad-hoc networks, so that MANET requires different protocols. This paper presents the performance analysis of the routing protocols used various parameter-patterns with Two-ray model.

Keywords: AODV, packet transmission rate, pause time, ZRP, QualNet 6.1

Procedia PDF Downloads 796
110 Coding of RMAC and Its Theoretical and Simulation-Based Performance Comparison with SMAC

Authors: Hamida Qumber Ali, Waseem Muhammad Arain, Shama Siddiqui, Sayeed Ghani

Abstract:

We present an implementing of RMAC in TinyOS 1.x. RMAC is a cross layer and Duty-cycle MAC protocols that was proposed to provide energy efficient transmission services for wireless sensor networks. The protocol has a unique and efficient packet transmission scheduling mechanism that enables it to overcome delivery latency and overcome traffic congestion. Design details and implementation challenges are divulged. Experiments are conducted to show the correctness of our implementation with numerous assumptions. Simulations are performed to compare the performance of RMAC and SMAC. Our results show that RMAC outperforms SMAC in energy efficiency and delay.

Keywords: MAC protocol, performance, RMAC, wireless sensor networks

Procedia PDF Downloads 295
109 Performance Study of ZigBee-Based Wireless Sensor Networks

Authors: Afif Saleh Abugharsa

Abstract:

The IEEE 802.15.4 standard is designed for low-rate wireless personal area networks (LR-WPAN) with focus on enabling wireless sensor networks. It aims to give a low data rate, low power consumption, and low cost wireless networking on the device-level communication. The objective of this study is to investigate the performance of IEEE 802.15.4 based networks using simulation tool. In this project the network simulator 2 NS2 was used to several performance measures of wireless sensor networks. Three scenarios were considered, multi hop network with a single coordinator, star topology, and an ad hoc on demand distance vector AODV. Results such as packet delivery ratio, hop delay, and number of collisions are obtained from these scenarios.

Keywords: ZigBee, wireless sensor networks, IEEE 802.15.4, low power, low data rate

Procedia PDF Downloads 396
108 Dynamics of Light Induced Current in 1D Coupled Quantum Dots

Authors: Tokuei Sako

Abstract:

Laser-induced current in a quasi-one-dimensional nanostructure has been studied by a model of a few electrons confined in a 1D electrostatic potential coupled to electrodes at both ends and subjected to a pulsed laser field. The time-propagation of the one- and two-electron wave packets has been calculated by integrating the time-dependent Schrödinger equation directly by the symplectic integrator method with uniform Fourier grid. The temporal behavior of the resultant light-induced current in the studied systems has been discussed with respect to the lifetime of the quasi-bound states formed when the static bias voltage is applied.

Keywords: pulsed laser field, nanowire, electron wave packet, quantum dots, time-dependent Schrödinger equation

Procedia PDF Downloads 332
107 Home-Based Care with Follow-Up at Outpatient Unit or Community-Follow-Up Center with/without Food Supplementation and/or Psychosocial Stimulation of Children with Moderate Acute Malnutrition in Bangladesh

Authors: Md Iqbal Hossain, Tahmeed Ahmed, Kenneth H. Brown

Abstract:

Objective: To assess the effect of community-based follow up, with or without food-supplementation and/or psychosocial stimulation, as an alternative to current hospital-based follow-up of children with moderate-acute-malnutrition (WHZ < -2 to -3) (MAM). Design/methods: The study was conducted at the ICDDR,B Dhaka Hospital and in four urban primary health care centers of Dhaka, Bangladesh during 2005-2007. The efficacy of five different randomly assigned interventions was compared with respect to the rate of completion of follow-up, growth and morbidity in 227 MAM children aged 6-24 months who were initially treated at ICDDR,B for diarrhea and/or other morbidities. The interventions were: 1) Fortnightly follow-up care (FFC) at the ICDDR,B’s outpatient-unit, including growth monitoring, health education, and micro-nutrient supplementation (H-C, n=49). 2) FFC at community follow-up unit (CNFU) [established in the existing urban primary health-care centers close to the residence of the child] but received the same regimen as H-C (C-C, n=53). 3) As per C-C plus cereal-based supplementary food (SF) (C-SF, n=49). The SF packets were distributed on recruitment and at every visit in CNFU [@1 packet/day for 6–11 and 2 packets/day for 12-24 month old children. Each packet contained 20g toasted rice-powder, 10g toasted lentil-powder, 5g molasses, and 3g soy bean oil, to provide a total of ~ 150kcal with 11% energy from protein]. 4) As per C-C plus psychosocial stimulation (PS) (C-PS, n=43). PS consisted of child-stimulation and parental-counseling conducted by trained health workers. 5) As per C-C plus both SF+PS (C-SF+PS, n=33). Results: A total of 227children (48.5% female), with a mean ± SD age of 12.6 ±3.8 months, and WHZ of - 2.53±0.28 enrolled. Baseline characteristics did not differ by treatment group. The rate of spontaneous attendance at scheduled follow-up visits gradually decreased in all groups. Follow-up attendance and gain in weight and length were greater in groups C-SF, C-SF+PS, and C-PS than C-C, and these indicators were observed least in H-C. Children in the H-C group more often suffered from diarrhea (25 % vs. 4-9%) and fever (28% vs. 8-11%) than other groups (p < 0.05). Children who attended at least five of the total six scheduled follow-up visits gained more in weight (median: 0.86 vs. 0.62 kg, p=0.002), length (median: 2.4 vs. 2.0 cm, p=0.009) than those who attended fewer. Conclusions: Community-based service delivery, especially including supplementary food with or without psychosocial stimulation, permits better rehabilitation of children with MAM compared to current hospital outpatients-based care. By scaling the community-based follow-up including food supplementation with or without psychosocial stimulation, it will be possible to rehabilitate a greater number of MAM children in a better way.

Keywords: community-based management, moderate acute malnutrition, psychosocial stimulation, supplementary food

Procedia PDF Downloads 409
106 Theoretical and Experimental Electrostatic Parameters Determination of 4-Methyl-N-[(5- Nitrothiophen-2-Ylmethylidene)] Aniline Compound

Authors: N. Boukabcha, Y. Megrouss, N. Benhalima, S. Yahiaoui, A. Chouaih, F. Hamzaoui

Abstract:

We present the electron density analysis of organic compound 4-methyl-N-[(5- nitrothiophen-2-ylmethylidene)] aniline with chemical formula C12H10N2O2S. Indeed, determining the electrostatic properties of nonlinear optical organic compounds requires knowledge of the distribution of the electron density with high precision. On the other hand, a structural analysis is performed. Two methods are used to obtain the structure, X-ray diffraction and theoretical calculation with density functional theory (DFT). The electron density study is performed using the Mopro program1503 based on the multipolar model of Hansen and Coppens. Electron density analysis allows determination of the value and orientation of the dipole moment. The net atomic charges, electrostatic potential and the molecular dipole moment have been determined in order to understand the nature of inter- and intramolecular charge transfer. The study reveals the nature of intermolecular interactions including charge transfer and hydrogen bonds in the title compound. Crystallographic data: monoclinic system - space group P21 / n. Celle parameters: a = 4.7606 (4) Å, b = 22.415 (2) Å, c = 10.7008 (15) Å, β = 92.566 (13) 0, V = 1140.7 (2) Å3, Z = 4, R = 0.0034 for 2693 observed reflections.

Keywords: electron density, dipole moment, electrostatic potential, DFT, Mopro

Procedia PDF Downloads 280
105 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 383
104 A New Verification Based Congestion Control Scheme in Mobile Networks

Authors: P. K. Guha Thakurta, Shouvik Roy, Bhawana Raj

Abstract:

A congestion control scheme in mobile networks is proposed in this paper through a verification based model. The model proposed in this work is represented through performance metric like buffer Occupancy, latency and packet loss rate. Based on pre-defined values, each of the metric is introduced in terms of three different states. A Markov chain based model for the proposed work is introduced to monitor the occurrence of the corresponding state transitions. Thus, the estimation of the network status is obtained in terms of performance metric. In addition, the improved performance of our proposed model over existing works is shown with experimental results.

Keywords: congestion, mobile networks, buffer, delay, call drop, markov chain

Procedia PDF Downloads 416
103 Voice over IP Quality of Service Evaluation for Mobile Ad Hoc Network in an Indoor Environment for Different Voice Codecs

Authors: Lina Abou Haibeh, Nadir Hakem, Ousama Abu Safia

Abstract:

In this paper, the performance and quality of Voice over IP (VoIP) calls carried over a Mobile Ad Hoc Network (MANET) which has a number of SIP nodes registered on a SIP Proxy are analyzed. The testing campaigns are carried out in an indoor corridor structure having a well-defined channel’s characteristics and model for the different voice codecs, G.711, G.727 and G.723.1. These voice codecs are commonly used in VoIP technology. The calls’ quality are evaluated using four Quality of Service (QoS) metrics, namely, mean opinion score (MOS), jitter, delay, and packet loss. The relationship between the wireless channel’s parameters and the optimum codec is well-established. According to the experimental results, the voice codec G.711 has the best performance for the proposed MANET topology

Keywords: wireless channel modelling, Voip, MANET, session initiation protocol (SIP), QoS

Procedia PDF Downloads 196
102 Mobility Management via Software Defined Networks (SDN) in Vehicular Ad Hoc Networks (VANETs)

Authors: Bilal Haider, Farhan Aadil

Abstract:

A Vehicular Ad hoc Network (VANET) provides various services to end-users traveling on the road at high speeds. However, this high-speed mobility of mobile nodes can cause frequent service disruptions. Various mobility management protocols exist for managing node mobility, but due to their centralized nature, they tend to suffer in the VANET environment. In this research, we proposed a distributed mobility management protocol using software-defined networks (SDN) for VANETs. Instead of relying on a centralized mobility anchor, the mobility functionality is distributed at multiple infrastructural nodes. The protocol is based on the classical Proxy Mobile IP version 6 (PMIPv6). It is evident from simulation results that this work has improved the network performance with respect to nodes throughput, delay, and packet loss.

Keywords: SDN, VANET, mobility management, optimization

Procedia PDF Downloads 142
101 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 132
100 Experimental and Theoretical Approach, Hirshfeld Surface, Reduced Density Gradient, Molecular Docking of a Thiourea Derivative

Authors: Noureddine Benharkat, Abdelkader Chouaih, Nourdine Boukabcha

Abstract:

A thiourea derivative compound was synthesized and subjected to structural analysis using single-crystal X-ray diffraction (XRD). The crystallographic data unveiled its crystallization in the P21/c space group within the monoclinic system. Examination of the dihedral angles indicated a notable non-planar structure. To support and interpret these resulats, density functional theory (DFT) calculations were conducted utilizing the B3LYP functional along with a 6–311 G (d, p) basis set. Additionally, to assess the contribution of intermolecular interactions, Hirshfeld surface analysis and 2D fingerprint plots were employed. Various types of interactions, whether weak intramolecular or intermolecular, within a molecule can significantly impact its stability. The distinctive signature of non-covalent interactions can be detected solely through electron density analysis. The NCI-RDG analysis was employed to investigate both repulsive and attractive van der Waals interactions while also calculating the energies associated with intermolecular interactions and their characteristics. Additionally, a molecular docking study was studied to explain the structure-activity relationship, revealing that the title compound exhibited an affinity energy of -6.8 kcal/mol when docked with B-DNA (1BNA).

Keywords: computational chemistry, density functional theory, crystallography, molecular docking, molecular structure, powder x-ray diffraction, single crystal x-ray diffraction

Procedia PDF Downloads 21
99 On the Use of Analytical Performance Models to Design a High-Performance Active Queue Management Scheme

Authors: Shahram Jamali, Samira Hamed

Abstract:

One of the open issues in Random Early Detection (RED) algorithm is how to set its parameters to reach high performance for the dynamic conditions of the network. Although original RED uses fixed values for its parameters, this paper follows a model-based approach to upgrade performance of the RED algorithm. It models the routers queue behavior by using the Markov model and uses this model to predict future conditions of the queue. This prediction helps the proposed algorithm to make some tunings over RED's parameters and provide efficiency and better performance. Widespread packet level simulations confirm that the proposed algorithm, called Markov-RED, outperforms RED and FARED in terms of queue stability, bottleneck utilization and dropped packets count.

Keywords: active queue management, RED, Markov model, random early detection algorithm

Procedia PDF Downloads 516
98 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 338
97 Analysis of Cooperative Hybrid ARQ with Adaptive Modulation and Coding on a Correlated Fading Channel Environment

Authors: Ibrahim Ozkan

Abstract:

In this study, a cross-layer design which combines adaptive modulation and coding (AMC) and hybrid automatic repeat request (HARQ) techniques for a cooperative wireless network is investigated analytically. Previous analyses of such systems in the literature are confined to the case where the fading channel is independent at each retransmission, which can be unrealistic unless the channel is varying very fast. On the other hand, temporal channel correlation can have a significant impact on the performance of HARQ systems. In this study, utilizing a Markov channel model which accounts for the temporal correlation, the performance of non-cooperative and cooperative networks are investigated in terms of packet loss rate and throughput metrics for Chase combining HARQ strategy.

Keywords: cooperative network, adaptive modulation and coding, hybrid ARQ, correlated fading

Procedia PDF Downloads 115
96 Research on ARQ Transmission Technique in Mars Detection Telecommunications System

Authors: Zhongfei Cai, Hui He, Changsheng Li

Abstract:

This paper studied in the automatic repeat request (ARQ) transmission technique in Mars detection telecommunications system. An ARQ method applied to proximity-1 space link protocol was proposed by this paper. In order to ensure the efficiency of data reliable transmission, this ARQ method combined these different ARQ maneuvers characteristics. Considering the Mars detection communication environments, this paper analyzed the characteristics of the saturation throughput rate, packet dropping probability, average delay and energy efficiency with different ARQ algorithms. Combined thus results with the theories of ARQ transmission technique, an ARQ transmission project in Mars detection telecommunications system was established. The simulation results showed that this algorithm had excellent saturation throughput rate and energy efficiency with low complexity.

Keywords: ARQ, mars, CCSDS, proximity-1, deepspace

Procedia PDF Downloads 313
95 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 289
94 Ab Initio Study of Co2ZrGe and Co2NbB Full Heusler Compounds

Authors: A. Abada, S. Hiadsi, T. Ouahrani, B. Amrani, K. Amara

Abstract:

Using the first-principles full-potential linearized augmented plane wave plus local orbital (FP-LAPW+lo) method based on density functional theory (DFT), we have investigated the electronic structure and magnetism of some Co2- based full Heusler alloys, namely Co2ZrGe and Co2NbB. The calculations show that these compounds are to be half-metallic ferromagnets (HMFs) with a total magnetic moment of 2.000 µB per formula unit, well consistent with the Slater-Pauling rule. Our calculations show indirect band gaps of 0.58 eV and 0.47 eV in the minority spin channel of density of states (DOS) for Co2ZrGe and Co2NbB, respectively. Analysis of the DOS and magnetic moments indicates that their magnetism is mainly related to the d-d hybridization between the Co and Zr (or Nb) atoms. The half metallicity is found to be robust against volume changes and the two alloys kept a 100% of spin polarization at the Fermi level. In addition, an atom inside molecule AIM formalism and an electron localization function ELF were also adopted to study the bonding properties of these compounds, building a bridge between their electronic and bonding behavior. As they have a good crystallographic compatibility with the lattice of semiconductors used industrially and negative calculated cohesive energies with considerable absolute values these two alloys could be promising magnetic materials in the spintronics field.

Keywords: half-metallic ferromagnets, full Heusler alloys, magnetic properties, electronic properties

Procedia PDF Downloads 382
93 FPGA Implementation of Adaptive Clock Recovery for TDMoIP Systems

Authors: Semih Demir, Anil Celebi

Abstract:

Circuit switched networks widely used until the end of the 20th century have been transformed into packages switched networks. Time Division Multiplexing over Internet Protocol (TDMoIP) is a system that enables Time Division Multiplexing (TDM) traffic to be carried over packet switched networks (PSN). In TDMoIP systems, devices that send TDM data to the PSN and receive it from the network must operate with the same clock frequency. In this study, it was aimed to implement clock synchronization process in Field Programmable Gate Array (FPGA) chips using time information attached to the packages received from PSN. The designed hardware is verified using the datasets obtained for the different carrier types and comparing the results with the software model. Field tests are also performed by using the real time TDMoIP system.

Keywords: clock recovery on TDMoIP, FPGA, MATLAB reference model, clock synchronization

Procedia PDF Downloads 246
92 First Principles Study of a New Half-Metallic Ferrimagnets Mn2–Based Full Heusler Compounds: Mn2ZrSi and Mn2ZrGe

Authors: Ahmed Abada, Kadda Amara, Said Hiadsi, Bouhalouane Amrani

Abstract:

Half-metallic properties of new predicted Mn2-based full Heusler alloys Mn2ZrSi and Mn2ZrGe have been studied by first-principles full-potential linearized augmented plane wave plus local orbital (FP-LAPW+lo) method based on density functional theory (DFT). Our investigation is focused on the structural, elastic, electronic and magnetic properties of these compounds. The AlCu2Mn-type structure is found to be energetically more favorable than the CuHg2Ti-type structure for both compounds and are half-metallic ferrimagnets (HMFIs) with total magnetic moments of 2.000 µB per formula unit, well consistent with Slater-Pauling rule (Mtot = ( 24 – Ztot ) µB). Calculations show that both the alloys have an indirect band gaps, in the majority-spin channel, with values of 0.505 eV and 0.278 eV for Mn2ZrSi and Mn2ZrGe, respectively. It was found that Mn2ZrSi and Mn2ZrGe preserved their half-metallicity for lattice constants range of 5.85–6.38 Å and 6.05–6.38 Å, respectively, and kept a 100% of spin polarization at the Fermi level. Moreover, the calculated formation energies and elastic constants confirm that these compounds are stable chemically and mechanically, and the good crystallographic compatibility with the lattice of semiconductors used industrially makes them promising magnetic materials in spintronic applications.

Keywords: first-principles calculations, full Heusler structure, half-metallic ferrimagnets, elastic properties

Procedia PDF Downloads 345
91 Clustering Based and Centralized Routing Table Topology of Control Protocol in Mobile Wireless Sensor Networks

Authors: Mbida Mohamed, Ezzati Abdellah

Abstract:

A strong challenge in the wireless sensor networks (WSN) is to save the energy and have a long life time in the network without having a high rate of loss information. However, topology control (TC) protocols are designed in a way that the network is divided and having a standard system of exchange packets between nodes. In this article, we will propose a clustering based and centralized routing table protocol of TC (CBCRT) which delegates a leader node that will encapsulate a single routing table in every cluster nodes. Hence, if a node wants to send packets to the sink, it requests the information's routing table of the current cluster from the node leader in order to root the packet.

Keywords: mobile wireless sensor networks, routing, topology of control, protocols

Procedia PDF Downloads 243
90 Development of Mg-Containing Hydroxyapatite-Based Bioceramics From Phosphate Rock for Bone Applications

Authors: Sara Mercedes Barroso Pinzón, Álvaro Jesús Caicedo Castro, Antonio Javer Sánchez Herencia

Abstract:

In recent years there has been increased academic and industrial research into the development of orthopaedic implants with structural properties and functionality similar to mechanical strength, osseointegration, thermal stability and antibacterial capacity similar to bone structure. Hydroxyapatite has been considered for decades as an ideal biomaterial for bone regeneration due to its chemical and crystallographic similarity to the mineral structure bioapatites. However, the lack of trace elements in the hydroxyapatite structure confers very low mechanical and biological properties. Under this scenario, the objective of the research is the synthesis of hydroxyapatite with Mg from the francolite mineral present in phosphate rock from the central-eastern region of Colombia, taking advantage of the extraction of mineral species as natural precursors of Ca, P and Mg. The minerals present were studied, fluorapatite as the mineral of interest associated with magnesium carbonates and quartz. The chemical and mineralogical composition was determined by X-ray fluorescence (XRF) and X-ray diffraction (XRD), scanning electron microscopy (SEM) and energy dispersive X-ray spectroscopy (EDX); the optimum conditions were established using the acid leaching mechanism in the wet concentration process. From the products obtained and characterised by XRD, XRF, SEM, FTIR, RAMAN, HAp-Mg biocomposite scaffolds are fabricated and the influence of Mg on morphometric parameters, mechanical and biological properties in the formed materials is evaluated.

Keywords: phosphate rock, hydroxyapatite, magnesium, biomaterials

Procedia PDF Downloads 26
89 Investigation of the Self-Healing Sliding Wear Characteristics of Niti-Based PVD Coatings on Tool Steel

Authors: Soroush Momeni

Abstract:

Excellent damping capacity and superelasticity of the bulk NiTi shape memory alloy (SMA) makes it a suitable material of choice for tools in machining process as well as tribological systems. Although thin film of NiTi SMA has a same damping capacity as NiTi bulk alloys, it has a poor mechanical properties and undesirable tribological performance. This study aims at eliminating these application limitations for NiTi SMA thin films. In order to achieve this goal, NiTi thin films were magnetron sputtered as an interlayer between reactively sputtered hard TiCN coatings and hard work tool steel substrates. The microstructure, composition, crystallographic phases, mechanical and tribological properties of the deposited thin films were analyzed by using field emission scanning electron microscopy (FESEM), X-ray diffraction (XRD), nanoindentation, ball–on-disc, scratch test, and three dimensional (3D) optical microscopy. It was found that under a specific coating architecture, the superelasticity of NiTi inter-layer can be combined with high hardness and wear resistance of TiCN protective layers. The obtained results revealed that the thickness of NiTi interlayers is an important factor controlling mechanical and tribological performance of bi-layer composite coating systems.

Keywords: PVD coatings, sliding wear, hardness, tool steel

Procedia PDF Downloads 261
88 Key Technologies and Evolution Strategies for Computing Force Bearer Network

Authors: Zhaojunfeng

Abstract:

Driven by the national policy of "East Data and Western Calculation", the computing first network will attract a new wave of development. As the foundation of the development of the computing first network, the computing force bearer network has become the key direction of technology research and development in the industry. This article will analyze typical computing force application scenarios and bearing requirements and sort out the SLA indicators of computing force applications. On this basis, this article carries out research and discussion on the key technologies of computing force bearer network in a slice packet network, and finally, gives evolution policy for SPN computing force bearer network to support the development of SPN computing force bearer network technology and network deployment.

Keywords: component-computing force bearing, bearing requirements of computing force application, dual-SLA indicators for computing force applications, SRv6, evolution strategies

Procedia PDF Downloads 103
87 A POX Controller Module to Prepare a List of Flow Header Information Extracted from SDN Traffic

Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin

Abstract:

Software Defined Networking (SDN) is a paradigm designed to facilitate the way of controlling the network dynamically and with more agility. Network traffic is a set of flows, each of which contains a set of packets. In SDN, a matching process is performed on every packet coming to the network in the SDN switch. Only the headers of the new packets will be forwarded to the SDN controller. In terminology, the flow header fields are called tuples. Basically, these tuples are 5-tuple: the source and destination IP addresses, source and destination ports, and protocol number. This flow information is used to provide an overview of the network traffic. Our module is meant to extract this 5-tuple with the packets and flows numbers and show them as a list. Therefore, this list can be used as a first step in the way of detecting the DDoS attack. Thus, this module can be considered as the beginning stage of any flow-based DDoS detection method.

Keywords: matching, OpenFlow tables, POX controller, SDN, table-miss

Procedia PDF Downloads 172
86 Performance Evaluation of an Efficient Asynchronous Protocol for WDM Ring MANs

Authors: Baziana Peristera

Abstract:

The idea of the asynchronous transmission in wavelength division multiplexing (WDM) ring MANs is studied in this paper. Especially, we present an efficient access technique to coordinate the collisions-free transmission of the variable sizes of IP traffic in WDM ring core networks. Each node is equipped with a tunable transmitter and a tunable receiver. In this way, all the wavelengths are exploited for both transmission and reception. In order to evaluate the performance measures of average throughput, queuing delay and packet dropping probability at the buffers, a simulation model that assumes symmetric access rights among the nodes is developed based on Poisson statistics. Extensive numerical results show that the proposed protocol achieves apart from high bandwidth exploitation for a wide range of offered load, fairness of queuing delay and dropping events among the different packets size categories.

Keywords: asynchronous transmission, collision avoidance, wavelength division multiplexing, WDM

Procedia PDF Downloads 349