Search results for: degradation scheme
1487 Synthesis and Study the Effect of HNTs on PVA/Chitosan Composite Material
Authors: Malek Ali
Abstract:
Composites materials of Poly (vinyl alcohol) (PVA)/Chitosan (CS) have been synthesized and characterized successfully. HNTs have been added to composites to enhance the mechanical and degradation properties by hydrogen bonding interactions, compatibility, and chemical crosslink between HNTs and PVA. PVA/CS/HNTs composites prepared with different concentration ratio. SEM micrographs of composites surface showed that more agglomeration with more chitosan ratio. Mechanical and degradation properties were characterized and the result indicates that Mechanical and degradation of 80%PVA/5%Chitosan/15%HNTs higher than the others PVA/CS/HNTs composites.
Keywords: PVA/Chitosan, Composites, PVA/CS/HNTs, HNTs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16781486 Weight Loss Degradation of Hybrid Blends LLDPE/Starch/PVA upon Exposure to UV Light and Soil Burial
Authors: M. Rahmah, Noor Zuhaira Abd Aziz, M. Mohd Muizz Fahimi, M. Farhan
Abstract:
Poly bag and mulch films for agricultural field caused pose environmental problem due to the non-degradable plastics wastes upon disposal. Thus, a degradable poly bag was designed with hybrid sago starch (SS) and polyvinyl alcohol (PVA). Two Different blended compositions of SS and PVA hybrid have been compounded. Then, the hybrids blended are mixed with linear line density polyethylene (LLDPE) resin to fabricate poly bag film through conventional film blowing process. Samples of LLDPE, SS and PVA hybrid film were exposed to UV light and soil burial. The weight losses were determined during degradation process. Hybrid film by degradation of starch was found to hydrolyze and hydroxyl groups decrease on esterification upon exposure to soil burial and uv radiation. It was found out that, the hybrid film for 60% of SS composition showed greatest degradation in soil and UV radiation.
Keywords: LLDPE, PVA, sago starch, degradation, soil burial, UV radiation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23501485 A Novel Pilot Scheme for Frequency Offset and Channel Estimation in 2x2 MIMO-OFDM
Authors: N. Promsuwanna, P. Uthansakul, M. Uthansakul
Abstract:
The Carrier Frequency Offset (CFO) due to timevarying fading channel is the main cause of the loss of orthogonality among OFDM subcarriers which is linked to inter-carrier interference (ICI). Hence, it is necessary to precisely estimate and compensate the CFO. Especially for mobile broadband communications, CFO and channel gain also have to be estimated and tracked to maintain the system performance. Thus, synchronization pilots are embedded in every OFDM symbol to track the variations. In this paper, we present the pilot scheme for both channel and CFO estimation where channel estimation process can be carried out with only one OFDM symbol. Additional, the proposed pilot scheme also provides better performance in CFO estimation comparing with the conventional orthogonal pilot scheme due to the increasing of signal-tointerference ratio.Keywords: MIMO, OFDM, carrier frequency offset, channel, estimation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19231484 Development of an Implicit Physical Influence Upwind Scheme for Cell-Centered Finite Volume Method
Authors: Shidvash Vakilipour, Masoud Mohammadi, Rouzbeh Riazi, Scott Ormiston, Kimia Amiri, Sahar Barati
Abstract:
An essential component of a finite volume method (FVM) is the advection scheme that estimates values on the cell faces based on the calculated values on the nodes or cell centers. The most widely used advection schemes are upwind schemes. These schemes have been developed in FVM on different kinds of structured and unstructured grids. In this research, the physical influence scheme (PIS) is developed for a cell-centered FVM that uses an implicit coupled solver. Results are compared with the exponential differencing scheme (EDS) and the skew upwind differencing scheme (SUDS). Accuracy of these schemes is evaluated for a lid-driven cavity flow at Re = 1000, 3200, and 5000 and a backward-facing step flow at Re = 800. Simulations show considerable differences between the results of EDS scheme with benchmarks, especially for the lid-driven cavity flow at high Reynolds numbers. These differences occur due to false diffusion. Comparing SUDS and PIS schemes shows relatively close results for the backward-facing step flow and different results in lid-driven cavity flow. The poor results of SUDS in the lid-driven cavity flow can be related to its lack of sensitivity to the pressure difference between cell face and upwind points, which is critical for the prediction of such vortex dominant flows.
Keywords: Cell-centered finite volume method, physical influence scheme, exponential differencing scheme, skew upwind differencing scheme, false diffusion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10841483 Photocatalytic Degradation of Produced Water Hydrocarbon of an Oil Field by Using Ag-Doped TiO2 Nanoparticles
Authors: Hamed Bazrafshan, Saeideh Dabirnia, Zahra Alipour Tesieh, Samaneh Alavi, Bahram Dabir
Abstract:
In this study, the removal of pollutants of a real produced water sample from an oil reservoir (a light oil reservoir), using a photocatalytic degradation process in a cylindrical glass reactor, was investigated. Using TiO2 and Ag-TiO2 in slurry form, the photocatalytic degradation was studied by measuring the Chemical Oxygen Demand (COD) parameter, qualitative analysis, and GC-MS. At first, optimization of the parameters on photocatalytic degradation of hydrocarbon pollutants in real produced water, using TiO2 nanoparticles as photocatalysts under UV light, was carried out applying response surface methodology. The results of the design of the experiment showed that the optimum conditions were at a catalyst concentration of 1.14 g/lit and pH of 2.67, and the percentage of COD removal was 72.65%.
Keywords: Photocatalyst, Ag-doped, TiO2, produced water, nanoparticles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5141482 Cooperative CDD Scheme Based on Hierarchical Modulation in OFDM System
Authors: Seung-Jun Yu, Yeong-Seop Ahn, Young-Min Ko, Hyoung-Kyu Song
Abstract:
In order to achieve high data rate and increase the spectral efficiency, multiple input multiple output (MIMO) system has been proposed. However, multiple antennas are limited by size and cost. Therefore, recently developed cooperative diversity scheme, which profits the transmit diversity only with the existing hardware by constituting a virtual antenna array, can be a solution. However, most of the introduced cooperative techniques have a common fault of decreased transmission rate because the destination should receive the decodable compositions of symbols from the source and the relay. In this paper, we propose a cooperative cyclic delay diversity (CDD) scheme that use hierarchical modulation. This scheme is free from the rate loss and allows seamless cooperative communication.Keywords: MIMO, Cooperative communication, CDD, Hierarchical modulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21961481 Catalytic Activity of Aluminum Impregnated Catalysts for the Degradation of Waste Polystyrene
Authors: J. Shah, M. Rasul Jan, Adnan
Abstract:
The aluminum impregnated catalysts of Al-alumina (Al-Al2O3), Al-montmorillonite (Al-Mmn) and Al-activated charcoal (Al-AC) of various percent loadings were prepared by wet impregnation method and characterized by SEM, XRD and N2 adsorption/desorption (BET). The catalytic properties were investigated in the degradation of waste polystyrene (WPS). The results of catalytic degradation of Al metal, 20% Al-Al2O3, 5% Al-Mmn and 20% Al-AC were compared with each other for optimum conditions. Among the catalyst used 20% Al-Al2O3 was found the most effective catalyst. The BET surface area of 20% Al-Al2O3 determined was 70.2 m2/g. The SEM data revealed the catalyst with porous structure throughout the frame work with small nanosized crystallites. The yield of liquid products with 20% Al-Al2O3 (91.53 ± 2.27 wt%) was the same as compared to Al metal (91.20 ± 0.35 wt%) but the selectivity of hydrocarbons and yield of styrene monomer (56.32 wt%) was higher with 20% Al-Al2O3 catalyst.
Keywords: Impregnation, catalytic degradation, waste polystyrene, styrene.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20341480 Hybrid Association Control Scheme and Load Balancing in Wireless LANs
Authors: Chutima Prommak, Airisa Jantaweetip
Abstract:
This paper presents a hybrid association control scheme that can maintain load balancing among access points in the wireless LANs and can satisfy the quality of service requirements of the multimedia traffic applications. The proposed model is mathematically described as a linear programming model. Simulation study and analysis were conducted in order to demonstrate the performance of the proposed hybrid load balancing and association control scheme. Simulation results shows that the proposed scheme outperforms the other schemes in term of the percentage of blocking and the quality of the data transfer rate providing to the multimedia and real-time applications.Keywords: Association control, Load balancing, Wireless LANs
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15241479 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting
Authors: Yanmin Zhao, Siu Ming Yiu
Abstract:
To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.
Keywords: Short integer solution problem, signatures, the symmetric-key setting, watermarking schemes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5601478 Pseudo-Homogeneous Kinetic of Dilute-Acid Hydrolysis of Rice Husk for Ethanol Production: Effect of Sugar Degradation
Authors: Megawati, Wahyudi B. Sediawan, Hary Sulistyo, Muslikhin Hidayat
Abstract:
Rice husk is a lignocellulosic source that can be converted to ethanol. Three hundreds grams of rice husk was mixed with 1 L of 0.18 N sulfuric acid solutions then was heated in an autoclave. The reaction was expected to be at constant temperature (isothermal), but before that temperature was achieved, reaction has occurred. The first liquid sample was taken at temperature of 140 0C and repeated every 5 minute interval. So the data obtained are in the regions of non-isothermal and isothermal. It was observed that the degradation has significant effects on the ethanol production. The kinetic constants can be expressed by Arrhenius equation with the frequency factors for hydrolysis and sugar degradation of 1.58 x 105 1/min and 2.29 x 108 L/mole/min, respectively, while the activation energies are 64,350 J/mole and 76,571 J/mole. The highest ethanol concentration from fermentation is 1.13% v/v, attained at 220 0C.Keywords: degradation, ethanol, hydrolysis, rice husk
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19741477 Pseudo-Homogeneous Kinetic of Dilute-Acid Hydrolysis of Rice Huskfor Ethanol Production: Effect of Sugar Degradation
Authors: Megawati, Wahyudi B. Sediawan, Hary Sulistyo, Muslikhin Hidayat
Abstract:
Rice husk is a lignocellulosic source that can be converted to ethanol. Three hundreds grams of rice husk was mixed with 1 L of 0.18 N sulfuric acid solutions then was heated in an autoclave. The reaction was expected to be at constant temperature (isothermal), but before that temperature was achieved, reaction has occurred. The first liquid sample was taken at temperature of 140 0C and repeated every 5 minute interval. So the data obtained are in the regions of non-isothermal and isothermal. It was observed that the degradation has significant effects on the ethanol production. The kinetic constants can be expressed by Arrhenius equation with the frequency factors for hydrolysis and sugar degradation of 1.58 x 105 min-1 and 2.29 x 108 L/mole-min, respectively, while the activation energies are 64,350 J/mole and 76,571 J/mole. The highest ethanol concentration from fermentation is 1.13% v/v, attained at 220 0C.Keywords: degradation, ethanol, hydrolysis, rice husk.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20331476 A New Proxy Signature Scheme As Secure As ElGamal Signature
Authors: Song Han, Elizabeth Chang, Jie Wang, Wanquan Liu
Abstract:
Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.Keywords: ElGamal signature, Proxy signature, Security, Hash function, Fair privacy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15961475 The Performance of Alternating Top-Bottom Strategy for Successive Over Relaxation Scheme on Two Dimensional Boundary Value Problem
Authors: M. K. Hasan, Y. H. Ng, J. Sulaiman
Abstract:
This paper present the implementation of a new ordering strategy on Successive Overrelaxation scheme on two dimensional boundary value problems. The strategy involve two directions alternatingly; from top and bottom of the solution domain. The method shows to significantly reduce the iteration number to converge. Four numerical experiments were carried out to examine the performance of the new strategy.
Keywords: Two dimensional boundary value problems, Successive Overrelaxation scheme, Alternating Top-Bottom strategy, fast convergence
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14901474 Recycling of Polymers in the Presence of Nanocatalysts: A Green Approach towards Sustainable Environment
Authors: Beena Sethi
Abstract:
This work involves the degradation of plastic waste in the presence of three different nanocatalysts. A thin film of LLDPE was formed with all three nanocatalysts separately in the solvent. Thermo Gravimetric Analysis (TGA) and Differential Scanning Calorimetric (DSC) analysis of polymers suggest that the presence of these catalysts lowers the degradation temperature and the change mechanism of degradation. Gas chromatographic analysis was carried out for two films. In gas chromatography (GC) analysis, it was found that degradation of pure polymer produces only 32% C3/C4 hydrocarbons and 67.6% C5/C9 hydrocarbons. In the presence of these catalysts, more than 80% of polymer by weight was converted into either liquid or gaseous hydrocarbons. Change in the mechanism of degradation of polymer was observed therefore more C3/C4 hydrocarbons along with valuable feedstock are produced. Adjustment of dose of nanocatalyst, use of nano-admixtures and recycling of catalyst can make this catalytic feedstock recycling method a good tool to get sustainable environment. The obtained products can be utilized as fuel or can be transformed into other useful products. In accordance with the principles of sustainable development, chemical recycling i.e. tertiary recycling of polymers along with the reuse (zero order recycling) of plastics can be the most appropriate and promising method in this direction. The tertiary recycling is attracting much attention from the viewpoint of the energy resource.
Keywords: Degradation, differential scanning calorimetry, feedstock recycling, gas chromatography, thermogravimetric analysis. DSC.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21541473 A Visual Cryptography and Statistics Based Method for Ownership Identification of Digital Images
Authors: Ching-Sheng Hsu, Young-Chang Hou
Abstract:
In this paper, a novel copyright protection scheme for digital images based on Visual Cryptography and Statistics is proposed. In our scheme, the theories and properties of sampling distribution of means and visual cryptography are employed to achieve the requirements of robustness and security. Our method does not need to alter the original image and can identify the ownership without resorting to the original image. Besides, our method allows multiple watermarks to be registered for a single host image without causing any damage to other hidden watermarks. Moreover, it is also possible for our scheme to cast a larger watermark into a smaller host image. Finally, experimental results will show the robustness of our scheme against several common attacks.
Keywords: Copyright protection, digital watermarking, samplingdistribution, visual cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18801472 MEGSOR Iterative Scheme for the Solution of 2D Elliptic PDE's
Authors: J. Sulaiman, M. Othman, M. K. Hasan
Abstract:
Recently, the findings on the MEG iterative scheme has demonstrated to accelerate the convergence rate in solving any system of linear equations generated by using approximation equations of boundary value problems. Based on the same scheme, the aim of this paper is to investigate the capability of a family of four-point block iterative methods with a weighted parameter, ω such as the 4 Point-EGSOR, 4 Point-EDGSOR, and 4 Point-MEGSOR in solving two-dimensional elliptic partial differential equations by using the second-order finite difference approximation. In fact, the formulation and implementation of three four-point block iterative methods are also presented. Finally, the experimental results show that the Four Point MEGSOR iterative scheme is superior as compared with the existing four point block schemes.
Keywords: MEG iteration, second-order finite difference, weighted parameter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17021471 Pilot Directional Protection Scheme Using Wireless Communication
Authors: Nitish Sharma, G. G. Karady
Abstract:
This paper presents a scheme for the protection of loop system from all type of faults using the direction of fault current. The presence of distributed generation in today’s system increases the complexity of fault detection as the power flow is bidirectional. Hence, protection scheme specific to this purpose needs to be developed. This paper shows a fast protection scheme using communication which can be fiber optic or wireless. In this paper, the possibility of wireless communication for protection is studied to exchange the information between the relays. The negative sequence and positive sequence directional elements are used to determine the direction of fault current. A PSCAD simulation is presented and validated using commercial SEL relays.Keywords: Smart grid protection, pilot protection, power system simulation, wireless communication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12361470 Ultrasonic Intensification of the Chemical Degradation of Methyl Violet: An Experimental Study
Authors: N. P. Dhanalakshmi, R. Nagarajan
Abstract:
The sonochemical decolorization and degradation of azo dye Methyl violet using Fenton-s reagent in the presence of a high-frequency acoustic field has been investigated. Dyeing and textile effluents are the major sources of azo dyes, and are most troublesome among industrial wastewaters, causing imbalance in the eco-system. The effect of various operating conditions (initial concentration of dye, liquid-phase temperature, ultrasonic power and frequency and process time) on sonochemical degradation was investigated. Conversion was found to increase with increase in initial concentration, temperature, power level and frequency. Both horntype and tank-type sonicators were used, at various power levels (250W, 400W and 500W) for frequencies ranging from 20 kHz - 1000 kHz. A 'Process Intensification' parameter PI, was defined to quantify the enhancement of the degradation reaction by ultrasound when compared to control (i.e., without ultrasound). The present work clearly demonstrates that a high-frequency ultrasonic bath can be used to achieve higher process throughput and energy efficiency at a larger scale of operation.
Keywords: Fenton oxidation, process intensification, sonochemical degradation of MV, ultrasonic frequency.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25461469 Detecting Defects in Textile Fabrics with Optimal Gabor Filters
Abstract:
This paper investigates the problem of automated defect detection for textile fabrics and proposes a new optimal filter design method to solve this problem. Gabor Wavelet Network (GWN) is chosen as the major technique to extract the texture features from textile fabrics. Based on the features extracted, an optimal Gabor filter can be designed. In view of this optimal filter, a new semi-supervised defect detection scheme is proposed, which consists of one real-valued Gabor filter and one smoothing filter. The performance of the scheme is evaluated by using an offline test database with 78 homogeneous textile images. The test results exhibit accurate defect detection with low false alarm, thus showing the effectiveness and robustness of the proposed scheme. To evaluate the detection scheme comprehensively, a prototyped detection system is developed to conduct a real time test. The experiment results obtained confirm the efficiency and effectiveness of the proposed detection scheme.Keywords: Defect detection, Filtering, Gabor function, Gaborwavelet networks, Textile fabrics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23541468 Stabilization of Nonnecessarily Inversely Stable First-Order Adaptive Systems under Saturated Input
Authors: M. De la Sen, O. Barambones
Abstract:
This paper presents an indirect adaptive stabilization scheme for first-order continuous-time systems under saturated input which is described by a sigmoidal function. The singularities are avoided through a modification scheme for the estimated plant parameter vector so that its associated Sylvester matrix is guaranteed to be non-singular and then the estimated plant model is controllable. The modification mechanism involves the use of a hysteresis switching function. An alternative hybrid scheme, whose estimated parameters are updated at sampling instants is also given to solve a similar adaptive stabilization problem. Such a scheme also uses hysteresis switching for modification of the parameter estimates so as to ensure the controllability of the estimated plant model.Keywords: Hybrid dynamic systems, discrete systems, saturated input, control, stabilization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14021467 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.
Keywords: E-Voting preparation stage, blind signature protocol, nonce based authentication scheme, Kerberos authentication protocol, pseudo voter identity scheme PVID.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16171466 A Virtual Grid Based Energy Efficient Data Gathering Scheme for Heterogeneous Sensor Networks
Authors: Siddhartha Chauhan, Nitin Kumar Kotania
Abstract:
Traditional Wireless Sensor Networks (WSNs) generally use static sinks to collect data from the sensor nodes via multiple forwarding. Therefore, network suffers with some problems like long message relay time, bottle neck problem which reduces the performance of the network.
Many approaches have been proposed to prevent this problem with the help of mobile sink to collect the data from the sensor nodes, but these approaches still suffer from the buffer overflow problem due to limited memory size of sensor nodes. This paper proposes an energy efficient scheme for data gathering which overcomes the buffer overflow problem. The proposed scheme creates virtual grid structure of heterogeneous nodes. Scheme has been designed for sensor nodes having variable sensing rate. Every node finds out its buffer overflow time and on the basis of this cluster heads are elected. A controlled traversing approach is used by the proposed scheme in order to transmit data to sink. The effectiveness of the proposed scheme is verified by simulation.
Keywords: Buffer overflow problem, Mobile sink, Virtual grid, Wireless sensor networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18251465 Performance Analysis of Cluster Based Dual Tired Network Model with INTK Security Scheme in a Wireless Sensor Network
Authors: D. Satish Kumar, S. Karthik
Abstract:
A dual tiered network model is designed to overcome the problem of energy alert and fault tolerance. This model minimizes the delay time and overcome failure of links. Performance analysis of the dual tiered network model is studied in this paper where the CA and LS schemes are compared with DEO optimal. We then evaluate the Integrated Network Topological Control and Key Management (INTK) Schemes, which was proposed to add security features of the wireless sensor networks. Clustering efficiency, level of protections, the time complexity is some of the parameters of INTK scheme that were analyzed. We then evaluate the Cluster based Energy Competent n-coverage scheme (CEC n-coverage scheme) to ensure area coverage for wireless sensor networks.
Keywords: CEC n-coverage scheme, Clustering efficiency, Dual tired network, Wireless sensor networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16701464 Distance Estimation for Radar Systems Using DS-UWB Signals
Authors: Youngpo Lee, Seokho Yoon
Abstract:
In this paper, we propose a distance estimation scheme for radar systems using direct sequence ultra wideband (DS-UWB) signals. The proposed distance estimation scheme averages out the noise by accumulating the correlator outputs of the radar, and thus, helps the radar to employ a short-length DS-UWB signal reducing the correlation processing time. Numerical results confirm that the proposed distance estimation scheme provides a better estimation performance and a reduced correlation processing time compared with those of the conventional DS-UWB radars.
Keywords: Radar, DS-UWB, distance estimation, correlation accumulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20201463 New Identity Management Scheme and its Formal Analysis
Authors: Jeonghoon Han, Hanjae Jeong, Dongho Won, Seungjoo Kim
Abstract:
As the Internet technology has developed rapidly, the number of identities (IDs) managed by each individual person has increased and various ID management technologies have been developed to assist users. However, most of these technologies are vulnerable to the existing hacking methods such as phishing attacks and key-logging. If the administrator-s password is exposed, an attacker can access the entire contents of the stolen user-s data files in other devices. To solve these problems, we propose here a new ID management scheme based on a Single Password Protocol. The paper presents the details of the new scheme as well as a formal analysis of the method using BAN Logic.Keywords: Anti-phishing, BAN Logic, ID management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15251462 Optimization of the Control Scheme for Human Extremity Exoskeleton
Authors: Yang Li, Xiaorong Guan, Cheng Xu
Abstract:
In order to design a suitable control scheme for human extremity exoskeleton, the interaction force control scheme with traditional PI controller was presented, and the simulation study of the electromechanical system of the human extremity exoskeleton was carried out by using a MATLAB/Simulink module. By analyzing the simulation calculation results, it was shown that the traditional PI controller is not very suitable for every movement speed of human body. So, at last the fuzzy self-adaptive PI controller was presented to solve this problem. Eventually, the superiority and feasibility of the fuzzy self-adaptive PI controller was proved by the simulation results and experimental results.
Keywords: Human extremity exoskeleton, interaction force control scheme, simulation study, fuzzy self-adaptive pi controller, man-machine coordinated walking, bear payload.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9971461 On the Analysis of Bandwidth Management for Hybrid Load Balancing Scheme in WLANs
Authors: Chutima Prommak, Airisa Jantaweetip
Abstract:
In wireless networks, bandwidth is scare resource and it is essential to utilize it effectively. This paper analyses effects of using different bandwidth management techniques on the network performances of the Wireless Local Area Networks (WLANs) that use hybrid load balancing scheme. In particular, we study three bandwidth management schemes, namely Complete Sharing (CS), Complete Partitioning (CP), and Partial Sharing (PS). Performances of these schemes are evaluated by simulation experiments in term of percentage of network association blocking. Our results show that the CS scheme can provide relatively low blocking percentage in various network traffic scenarios whereas the PS scheme can enhance quality of services of the multimedia traffic with rather small expenses on the blocking percentage of the best effort traffic.
Keywords: Bandwidth management, Load Balancing, WLANs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14621460 A Self-Consistent Scheme for Elastic-Plastic Asperity Contact
Authors: Xu Jianguo
Abstract:
In this paper, a generalized self-consistent scheme, or “three phase model", is used to set up a micro-mechanics model for rough surface contact with randomly distributed asperities. The dimensionless average real pressure p is obtained as function of the ratio of the real contact area to the apparent contact area, 0 A / A r . Both elastic and plastic materials are considered, and the influence of the plasticity of material on p is discussed. Both two-dimensional and three-dimensional rough surface contact problems are considered.
Keywords: Contact mechanics, plastic deformation, self-consistent scheme.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17551459 Numerical Study of a Class of Nonlinear Partial Differential Equations
Authors: Kholod M. Abu-Alnaja
Abstract:
In this work, we derive two numerical schemes for solving a class of nonlinear partial differential equations. The first method is of second order accuracy in space and time directions, the scheme is unconditionally stable using Von Neumann stability analysis, the scheme produced a nonlinear block system where Newton-s method is used to solve it. The second method is of fourth order accuracy in space and second order in time. The method is unconditionally stable and Newton's method is used to solve the nonlinear block system obtained. The exact single soliton solution and the conserved quantities are used to assess the accuracy and to show the robustness of the schemes. The interaction of two solitary waves for different parameters are also discussed.Keywords: Crank-Nicolson Scheme, Douglas Scheme, Partial Differential Equations
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14531458 A Robust Image Watermarking Scheme using Image Moment Normalization
Authors: Latha Parameswaran, K. Anbumani
Abstract:
Multimedia security is an incredibly significant area of concern. A number of papers on robust digital watermarking have been presented, but there are no standards that have been defined so far. Thus multimedia security is still a posing problem. The aim of this paper is to design a robust image-watermarking scheme, which can withstand a different set of attacks. The proposed scheme provides a robust solution integrating image moment normalization, content dependent watermark and discrete wavelet transformation. Moment normalization is useful to recover the watermark even in case of geometrical attacks. Content dependent watermarks are a powerful means of authentication as the data is watermarked with its own features. Discrete wavelet transforms have been used as they describe image features in a better manner. The proposed scheme finds its place in validating identification cards and financial instruments.Keywords: Watermarking, moments, wavelets, content-based, benchmarking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1545