Search results for: fiber volume fraction
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32931

Search results for: fiber volume fraction

26151 Characterization of Silica Nanoparticles in Interaction with Escherichia coli Bacteria

Authors: Ibtissem Gammoudi, Ndeye Rokhaya Faye, Fabien Moroté, Daniel Moynet, Christine Grauby-Heywang, Touria Cohen-Bouhacina

Abstract:

The objective of the present investigation was to evaluate the morphology of Escherchia coli bacteria in interaction with SiO2 nanoparticles. This study was made by atomic force microscopy and quartz crystal microbalance using SiO2 nanoparticles with 10nm, 50nm and 100nm diameter and bacteria immobilized on polyelectrolyte multilayer films obtained by spin coating or by “layer by layer” (LbL) method.

Keywords: Atomic Force Microscopy, Escherichia coli, Quartz Crystal Microbalance, polyelectrolyte, silica nanoparticle.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2668
26150 CDM Controller Order and Disturbance Rejection Ability

Authors: Jo˜ao Paulo Coelho, Wojciech Giernacki, Jos´e Boaventura-Cunha

Abstract:

The coefficient diagram method is primarily an algebraic control design method whose objective is to easily obtain a good controller with minimum user effort. As a matter of fact, if a system model, in the form of linear differential equations, is known, the user only need to define a time-constant and the controller order. The later can be established regarding the expected disturbance type via a lookup table first published by Koksal and Hamamci in 2004. However an inaccuracy in this table was detected and pointed-out in the present work. Moreover the above mentioned table was expanded in order to enclose any k order type disturbance.

Keywords: Coefficient diagram method, control system design, disturbance rejection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2203
26149 Comparison Study on Characterization of Various Fly Ashes for Heavy Metal Adsorption

Authors: E. Moroydor Derun, N. Tugrul, N. Baran Acarali, A. S. Kipcak, S. Piskin

Abstract:

Fly ash is a waste material of coal firing thermal plants that is released from thermal power plants. It was defined as very fine particles that are drifted upward which are taken up by the flue gases. The emerging amount of fly ash in the world is approximately 600 million tons per year. In our country, it is expected that will be occurred 50 million tons of waste ash per year until 2020. The fly ashes can be evaluated by using as adsorbent material. The purpose of this study is to investigate the possibility of use of various fly ashes (Tuncbilek, Catalagzi, Orhaneli) like lowcost adsorbents for heavy metal adsorption. First of all, fly ashes were characterized. For this purpose; analyses such as XRD, XRF, SEM and FT-IR were performed.

Keywords: Adsorbent, fly ash, heavy metal, waste.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1837
26148 Morphological and Syntactic Meaning: An Interactive Crossword Puzzle Approach

Authors: Ibrahim Garba

Abstract:

This research involved the use of word distributions and morphological knowledge by speakers of Arabic learning English connected different allomorphs in order to realize how the morphology and syntax of English gives meaning through using interactive crossword puzzles (ICP). Fifteen chapters covered with a class of nine learners over an academic year of an intensive English program were reviewed using the ICP. Learners were questioned about how the use of this gaming element enhanced and motivated their learning of English. The findings were positive indicating a successful implementation of ICP both at creational and user levels. This indicated a positive role technology had when learning and teaching English through adopting an interactive gaming element for learning English.

Keywords: Distribution, gaming, interactive-crossword-puzzle, morphology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2369
26147 Investigation of Main Operating Parameters Affecting Gas Turbine Efficiency and Gas Releases

Authors: Farhat Hajer, Khir Tahar, Ammar Ben Brahim

Abstract:

This work presents a study on the influence of the main operating variables on the gas turbine cycle. A numerical simulation of a gas turbine cycle is performed for a real net power of 100 MW. A calculation code is developed using EES software. The operating variables are taken in conformity with the local environmental conditions adopted by the Tunisian Society of Electricity and Gas. Results show that the increase of ambient temperature leads to an increase of Tpz and NOx emissions rate and a decrease of cycle efficiency and UHC emissions. The CO emissions decrease with the raise of residence time, while NOx emissions rate increases and UHC emissions rate decreases. Furthermore, both of cycle efficiency and NOx emissions increase with the increase of the pressure ratio.

Keywords: CO, efficiency, gas turbine, NOx, UHC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1211
26146 Drowsiness Warning System Using Artificial Intelligence

Authors: Nidhi Sharma, V. K. Banga

Abstract:

Nowadays, driving support systems, such as car navigation systems, are getting common, and they support drivers in several aspects. It is important for driving support systems to detect status of driver's consciousness. Particularly, detecting driver's drowsiness could prevent drivers from collisions caused by drowsy driving. In this paper, we discuss the various artificial detection methods for detecting driver's drowsiness processing technique. This system is based on facial images analysis for warning the driver of drowsiness or in attention to prevent traffic accidents.

Keywords: Neuro-Fuzzy Model, Halstead Model, Walston-FelixModel, Bailey-Basili Model, Doty Model, GA Based Model, GeneticAlgorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3682
26145 Modeling and Simulation of Standalone Photovoltaic Charging Stations for Electric Vehicles

Authors: R. Mkahl, A. Nait-Sidi-Moh, M. Wack

Abstract:

Batteries of electric vehicles (BEV) are becoming more attractive with the advancement of new battery technologies and promotion of electric vehicles. BEV batteries are recharged on board vehicles using either the grid (G2V for Grid to Vehicle) or renewable energies in a stand-alone application (H2V for Home to Vehicle). This paper deals with the modeling, sizing and control of a photovoltaic stand-alone application that can charge the BEV at home. The modeling approach and developed mathematical models describing the system components are detailed. Simulation and experimental results are presented and commented.

Keywords: Electric vehicles, photovoltaic energy, lead-acid batteries, charging process, modeling, simulation, experimental tests.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4180
26144 The Transformative Impact of Telecommunication in Africa: Connecting Nations, Empowering Lives

Authors: I. M. Mungadi, M. S. Argungu

Abstract:

This study delves into the transformative impact of telecommunication in Africa, illuminating its role in connecting nations and empowering lives across the continent. Over recent decades, the rapid expansion of telecommunication infrastructure has become a powerful force, fostering socio-economic growth and development. Beyond the exchange of information, this digital revolution has influenced education, healthcare, commerce, governance, and social interaction. The abstract explores the multifaceted dimensions of telecommunication's influence on Africa, addressing both its positive transformations and the challenges it presents. By examining the dynamic interplay between technological advancements and societal changes, this research contributes to a nuanced understanding of how telecommunication is shaping a more interconnected, informed, and empowered Africa.

Keywords: Transformative, telecommunication, nations, empowering, connecting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 91
26143 Implicit Authorization Mechanism of Object-Oriented Database

Authors: Haibo Hu, Hong Xiang

Abstract:

Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.

Keywords: Object-oriented database(OODB), security protection, authorization mechanism, implicit authorization, authorization check.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1705
26142 Degradation Model of Optical Characteristics of Zno-Pigmented White Paint by Electron Radiation

Authors: Tian Hai, Yang Shengsheng, Jr., Wang Yi

Abstract:

Based on an analysis of the mechanism of degradation of optical characteristics of the ZnO-pigmented white paint by electron irradiation, a model of single molecular color centers is built. An equation that explains the relationship between the changes of variation of the ZnO-pigmented white paint-s spectrum absorptance and electron fluence is derived. The uncertain parameters in the equation can be calculated using the curve fitting by experimental data. The result indicates that the model can be applied to predict the degradation of optical characteristics of ZnO-pigmented white paint by electron radiation.

Keywords: ZnO-pigmented white pain, effects of electron radiation, optical characteristics degradation, prediction model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1510
26141 Fuzzy Inference Based Modelling of Perception Reaction Time of Drivers

Authors: U. Chattaraj, K. Dhusiya, M. Raviteja

Abstract:

Perception reaction time of drivers is an outcome of human thought process, which is vague and approximate in nature and also varies from driver to driver. So, in this study a fuzzy logic based model for prediction of the same has been presented, which seems suitable. The control factors, like, age, experience, intensity of driving of the driver, speed of the vehicle and distance of stimulus have been considered as premise variables in the model, in which the perception reaction time is the consequence variable. Results show that the model is able to explain the impacts of the control factors on perception reaction time properly.

Keywords: Driver, fuzzy logic, perception reaction time, premise variable.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 996
26140 Classification of Fuzzy Petri Nets, and Their Applications

Authors: M.H.Aziz, Erik L.J.Bohez, Manukid Parnichkun, Chanchal Saha

Abstract:

Petri Net (PN) has proven to be effective graphical, mathematical, simulation, and control tool for Discrete Event Systems (DES). But, with the growth in the complexity of modern industrial, and communication systems, PN found themselves inadequate to address the problems of uncertainty, and imprecision in data. This gave rise to amalgamation of Fuzzy logic with Petri nets and a new tool emerged with the name of Fuzzy Petri Nets (FPN). Although there had been a lot of research done on FPN and a number of their applications have been anticipated, but their basic types and structure are still ambiguous. Therefore, in this research, an effort is made to categorize FPN according to their structure and algorithms Further, literature review of the applications of FPN in the light of their classifications has been done.

Keywords: Discrete event systems, Fuzzy logic, Fuzzy Petri nets, and Petri nets.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1611
26139 Salient Points Reduction for Content-Based Image Retrieval

Authors: Yao-Hong Tsai

Abstract:

Salient points are frequently used to represent local properties of the image in content-based image retrieval. In this paper, we present a reduction algorithm that extracts the local most salient points such that they not only give a satisfying representation of an image, but also make the image retrieval process efficiently. This algorithm recursively reduces the continuous point set by their corresponding saliency values under a top-down approach. The resulting salient points are evaluated with an image retrieval system using Hausdoff distance. In this experiment, it shows that our method is robust and the extracted salient points provide better retrieval performance comparing with other point detectors.

Keywords: Barnard detector, Content-based image retrieval, Points reduction, Salient point.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1456
26138 Motion Planning and Control of Autonomous Robots in a Two-dimensional Plane

Authors: Avinesh Prasad, Bibhya Sharma, Jito Vanualailai

Abstract:

This paper proposes a solution to the motion planning and control problem of a point-mass robot which is required to move safely to a designated target in a priori known workspace cluttered with fixed elliptical obstacles of arbitrary position and sizes. A tailored and unique algorithm for target convergence and obstacle avoidance is proposed that will work for any number of fixed obstacles. The control laws proposed in this paper also ensures that the equilibrium point of the given system is asymptotically stable. Computer simulations with the proposed technique and applications to a planar (RP) manipulator will be presented.

Keywords: Point-mass Robot, Asymptotic stability, Motionplanning, Planar Robot Arm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1652
26137 Pay Per Click Attribution: Effects on Direct Search Traffic and Purchases

Authors: Toni Raurich, Joan Llonch-Andreu

Abstract:

This research focused on the relationship between Search Engine Marketing (SEM) and traditional advertising. The dominant assumption is that SEM does not help brand awareness and only does it in session as if it were the cost of manufacturing the product being sold. The study is methodologically developed using an experiment where the effects were determined to analyze the billboard effect. The research allowed the cross-linking of theoretical and empirical knowledge on digital marketing. This paper has validated that, this marketing generates retention as traditional advertising would by measuring brand awareness and its improvements. This changes the way performance and brand campaigns are distributed within marketing departments, effectively rebalancing budgets moving forward.

Keywords: Search engine marketing, click-through ratios, pay-per-click, marketing attribution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 384
26136 Assessing and Managing Intellectual Capital to Support Open Innovation Paradigm

Authors: Michele Grimaldi, Livio Cricelli, Francesco Rogo, Alessia Iannarelli

Abstract:

The objective of this paper is to support the application of Open Innovation practices in firms and organizations by the assessment and management of Intellectual Capital. Intellectual Capital constituents are analyzed in order to verify their capability of acting as key drivers of Open Innovation processes and, therefore, of creating value. A methodology is defined to settle a procedure which helps to select the most relevant Intellectual Capital value drivers and to provide Communities of Innovation with strategic and managerial guidelines in sustaining Open Innovation paradigm. An application of the methodology is developed within a specifically addressed project and its results are hereafter examined.

Keywords: Assessment, Community of Innovation, Intellectual Capital, Management, Open Innovation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1766
26135 Virtual Environment Design Guidelines for Elderly People in Early Detection of Dementia

Authors: Syadiah Nor Wan Shamsuddin, Valerie Lesk , Hassan Ugail

Abstract:

Early detection of dementia by testing the spatial memory can be applied using a virtual environment. This paper presents guidelines on how to design a virtual environment specifically for elderly in early detection of dementia. The specific design needs to be considered because the effectiveness of the technology relies on the ability of the end user to use it. The primary goal of these guidelines is to promote accessibility. Based on these guidelines, a virtual simulation was developed and evaluated. The results on usability of acceptance and satisfaction that are tested on young (control group) and elderly participants indicate that these guidelines are reliable and useful for use with elderly people.

Keywords: Virtual Environment, spatial memory, design, guidelines

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1810
26134 Design and Development of an MPH Program for Distance Education Delivery

Authors: Steven R. Hawks

Abstract:

The Master-s of Public Health (MPH) degree is growing in popularity among a number of higher education institutions throughout the world as a distance education graduate program. This paper offers an overview of program design and development strategies that promote successful distance delivery of MPH programs. Design and development challenges are discussed in terms of type of distance delivery, accreditation, student demand, faculty development, user needs, course content, and marketing strategies. The ongoing development of a distance education MPH program at Utah State University will be used to highlight and consider various aspects of this important but challenging process.

Keywords: Public health, course content, distance education, higher education, graduate students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1437
26133 Cosastudio: A Software Architecture Modeling Tool

Authors: Adel Smeda, Adel Alti, Mourad Oussalah, Abdallah Boukerram

Abstract:

A key aspect of the design of any software system is its architecture. An architecture description provides a formal model of the architecture in terms of components and connectors and how they are composed together. COSA (Component-Object based Software Structures), is based on object-oriented modeling and component-based modeling. The model improves the reusability by increasing extensibility, evolvability, and compositionality of the software systems. This paper presents the COSA modelling tool which help architects the possibility to verify the structural coherence of a given system and to validate its semantics with COSA approach.

Keywords: Software Architecture, Architecture Description Languages, UML, Components, Connectors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1664
26132 A Design for Application of Mobile Agent Technology to MicroService Architecture

Authors: Masayuki Higashino, Toshiya Kawato, Takao Kawamura

Abstract:

A monolithic service is based on the N-tier architecture in many cases. In order to divide a monolithic service into microservices, it is necessary to redefine a model as a new microservice by extracting and merging existing models across layers. Refactoring a monolithic service into microservices requires advanced technical capabilities, and it is a difficult way. This paper proposes a design and concept to ease the migration of a monolithic service to microservices using the mobile agent technology. Our proposed approach, mobile agents-based design and concept, enables to ease dividing and merging services.

Keywords: Mobile agent, microservice, web service, distributed system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1063
26131 Solving the Quadratic Assignment Problems by a Genetic Algorithm with a New Replacement Strategy

Authors: Yongzhong Wu, Ping Ji

Abstract:

This paper proposes a genetic algorithm based on a new replacement strategy to solve the quadratic assignment problems, which are NP-hard. The new replacement strategy aims to improve the performance of the genetic algorithm through well balancing the convergence of the searching process and the diversity of the population. In order to test the performance of the algorithm, the instances in QAPLIB, a quadratic assignment problem library, are tried and the results are compared with those reported in the literature. The performance of the genetic algorithm is promising. The significance is that this genetic algorithm is generic. It does not rely on problem-specific genetic operators, and may be easily applied to various types of combinatorial problems.

Keywords: Quadratic assignment problem, Genetic algorithm, Replacement strategy, QAPLIB.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2723
26130 Application of an in vitro Alveolus Model in Evaluating the Alveolar Response to Pressure- Induced Injury

Authors: Divya D. Nalayanda, William B. Fulton, Tza-Huei Wang, Fizan Abdullah

Abstract:

In an effort to understand the preliminary effects of aerodynamic stress on alveolar epithelial cells, we developed a multifluidic cell culture platform capable of supporting alveolar cultures at an air-liquid interface under constant air flow and exposure to varying pressure stimuli on the apical side while providing nourishment on the basolateral plane. Our current study involved utilizing the platform to study the effect of basement membrane coating and addition of dexamethasone on cellular response to pressure in A549 and H441 alveolar epithelial cells.

Keywords: Aerodynamic stress, Air-liquid interface, Alveolar, Dexamethasone.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1472
26129 Performance of Total Vector Error of an Estimated Phasor within Local Area Networks

Authors: Ahmed Abdolkhalig, Rastko Zivanovic

Abstract:

This paper evaluates the Total Vector Error of an estimated Phasor as define in IEEE C37.118 standard within different medium access in Local Area Networks (LAN). Three different LAN models (CSMA/CD, CSMA/AMP and Switched Ethernet) are evaluated. The Total Vector Error of the estimated Phasor has been evaluated for the effect of Nodes Number under the standardized network Band-width values defined in IEC 61850-9-2 communication standard (i.e. 0.1, 1 and 10 Gbps).

Keywords: Phasor, Local Area Network, Total Vector Error, IEEE C37.118, IEC 61850.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4129
26128 Application of Granular Computing Paradigm in Knowledge Induction

Authors: Iftikhar U. Sikder

Abstract:

This paper illustrates an application of granular computing approach, namely rough set theory in data mining. The paper outlines the formalism of granular computing and elucidates the mathematical underpinning of rough set theory, which has been widely used by the data mining and the machine learning community. A real-world application is illustrated, and the classification performance is compared with other contending machine learning algorithms. The predictive performance of the rough set rule induction model shows comparative success with respect to other contending algorithms.

Keywords: Concept approximation, granular computing, reducts, rough set theory, rule induction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 815
26127 WebGD: A CORBA-based Document Classification and Retrieval System on the Web

Authors: Fuyang Peng, Bo Deng, Chao Qi, Mou Zhan

Abstract:

This paper presents the design and implementation of the WebGD, a CORBA-based document classification and retrieval system on Internet. The WebGD makes use of such techniques as Web, CORBA, Java, NLP, fuzzy technique, knowledge-based processing and database technology. Unified classification and retrieval model, classifying and retrieving with one reasoning engine and flexible working mode configuration are some of its main features. The architecture of WebGD, the unified classification and retrieval model, the components of the WebGD server and the fuzzy inference engine are discussed in this paper in detail.

Keywords: Text Mining, document classification, knowledgeprocessing, fuzzy logic, Web, CORBA

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1816
26126 3-D Numerical Model for Wave-Induced Seabed Response around an Offshore Pipeline

Authors: Zuodong Liang, Dong-Sheng Jeng

Abstract:

Seabed instability around an offshore pipeline is one of key factors that need to be considered in the design of offshore infrastructures. Unlike previous investigations, a three-dimensional numerical model for the wave-induced soil response around an offshore pipeline is proposed in this paper. The numerical model was first validated with 2-D experimental data available in the literature. Then, a parametric study will be carried out to examine the effects of wave, seabed characteristics and confirmation of pipeline. Numerical examples demonstrate significant influence of wave obliquity on the wave-induced pore pressures and the resultant seabed liquefaction around the pipeline, which cannot be observed in 2-D numerical simulation.

Keywords: Pore pressure, 3D wave model, seabed liquefaction, pipeline.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1013
26125 Connectivity Characteristic of Transcription Factor

Authors: T. Mahalakshmi, Aswathi B. L., Achuthsankar S. Nair

Abstract:

Transcription factors are a group of proteins that helps for interpreting the genetic information in DNA. Protein-protein interactions play a major role in the execution of key biological functions of a cell. These interactions are represented in the form of a graph with nodes and edges. Studies have showed that some nodes have high degree of connectivity and such nodes, known as hub nodes, are the inevitable parts of the network. In the present paper a method is proposed to identify hub transcription factor proteins using sequence information. On a complete data set of transcription factor proteins available from the APID database, the proposed method showed an accuracy of 77%, sensitivity of 79% and specificity of 76%.

Keywords: Transcription Factor Proteins, Hub Proteins, Shannon Index, Transfer Free Energy to Surface (TFES).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1370
26124 Universal Method for Timetable Construction based on Evolutionary Approach

Authors: Maciej Norberciak

Abstract:

Timetabling problems are often hard and timeconsuming to solve. Most of the methods of solving them concern only one problem instance or class. This paper describes a universal method for solving large, highly constrained timetabling problems from different domains. The solution is based on evolutionary algorithm-s framework and operates on two levels – first-level evolutionary algorithm tries to find a solution basing on given set of operating parameters, second-level algorithm is used to establish those parameters. Tabu search is employed to speed up the solution finding process on first level. The method has been used to solve three different timetabling problems with promising results.

Keywords: Evolutionary algorithms, tabu search, timetabling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1827
26123 Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption

Authors: Eric Filiol

Abstract:

This paper presents a protocol aiming at proving that an encryption system contains structural weaknesses without disclosing any information on those weaknesses. A verifier can check in a polynomial time that a given property of the cipher system output has been effectively realized. This property has been chosen by the prover in such a way that it cannot been achieved by known attacks or exhaustive search but only if the prover indeed knows some undisclosed weaknesses that may effectively endanger the cryptosystem security. This protocol has been denoted zero-knowledge-like proof of cryptanalysis. In this paper, we apply this protocol to the Bluetooth core encryption algorithm E0, used in many mobile environments and thus we suggest that its security can seriously be put into question.

Keywords: Bluetooth encryption, Bluetooth security, Bluetoothprotocol, Stream cipher, Zero-knowledge, Cryptanalysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1548
26122 Single Port Overlay Cognitive Radio Using Reconfigurable Filtennas

Authors: V. Nagaraju, Tapas Bapu. B. R, Beryl J. Victor

Abstract:

In this paper cognitive radio is presented and the spectrum overlay cognitive radio antenna system is detailed. A UWB antenna with frequency reconfigurable characteristics is proposed. The reconfigurability is achieved when the filter is integrated to the feeding line of the single port overlay cognitive radio. When activated, the filter can transform the UWB frequency response into a reconfigurable narrowband one, which is suitable for the communication operation of the CR system. Here single port overlay cognitive radio antenna is designed and simulated using Ansoft High Frequency Structure Simulator (HFSS).

Keywords: Band-pass filter, Cognitive radio, filtenna, frequency reconfigurable, ultra-wideband antenna.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2061