April - 2013 (Volume-3 ~ Issue-4 ~ Part-2)

Paper Type

::

Research Paper

Title

::

Performance Evaluation of Block Type and Comb Type Channel Estimation for OFDM System under Various Modulation Techniques.

Country

::

India

Authors

::

Vivek Kanwar ||, Deepika Sharma ||, Himani Thakur

Page No.

::

01-07

::
10.9790/3021-03420107
aned   0.4/3021-03420107 aned
iosrjen   3021-0304-0207 iosrjen

With the rapid growth of digital communication in recent years, the need for high speed data transmission is increased. Moreover, future wireless systems are expected to support a wide range of services which includes video, data and voice. OFDM is a technique for achieving high data rates in mobile environment, due to its resistance to ISI, which is a common problems found in high speed data communication [1]. In OFDM, modulation may be differential or coherent. When using differential modulation there is no need for a channel estimate but its performance is inferior to the coherent system. Coherent modulation requires the channel estimation which gives better performance but with relatively more complex receiver structure. Pilot Symbol Assisted Modulation is used to achieve reliable channel estimates by transmitting pilots along with data symbols. In this paper, the channel estimation techniques for OFDM systems based on pilot arrangement are investigated. The channel estimation based on comb type pilot arrangement is studied through different algorithms for both estimating channel at pilot frequencies and interpolating the channel [4]. The estimation of channel at pilot frequencies is based on LS and LMS. In addition, the channel estimation based on block type pilot arrangement is performed by sending pilots at every sub-channel and using this estimation for a specific number of following symbols. I have compared the performances of all schemes by measuring bit error rate with 16QAM, QPSK, and BPSK as modulation schemes, and multipath Rayleigh fading.

 

Keywords: Binary Phase Shift Key (BPSK),Bit Error Rate (BER),Least square(LS), Minimum Mean square Error (MMSE), Least Mean Square (LMS) and Orthogonal Frequency Division Multiplexing (OFDM).

[1]. M. Hsieh and C. Wei, "Channel estimation for OFDM systems based on comb-type pilot arrangement in frequency selective fading channels" in IEEE Transactions on Consumer Electronics, vol. 44, no.1, February 2002
[2]. D. J. Young and C. Beaulieu, "The generation of correlated Rayleigh random variates by inverse discrete Fourier transform," IEEE Trans on Communications , Vol. 48, No. 7, July 2000.
[3]. Y.Li,"Pilot-Symbol-Aided Channel Estimation for OFDM in Wireless Systems", in IEEE Transactions on Vehicular Technology, vol. 49, no.4, July 2000.
[4]. S. Coleri, M. Ergen, A. Puri and A. Bahai, "Channel estimation techniques based on pilot arrangement in OFDM systems," IEEE Trans. On Broadcasting, Vol. 48, No. 3, September 2002.
[5]. Yong Soo Cho, Won young Yang, "MIMO-OFDM Wireless communication With Matlab".

 

Paper Type

::

Review Paper

Title

::

Threat–Attentive Alleviation for Manet Direction-Finding Assaults

Country

::

India

Authors

::

N.Venkata Siva Reddy ||,M.Venkata Ramana ||, N.Venkata Krishna ||, P.Obulamma

Page No.

::

08-11

::
10.9790/3021-03420811
aned   0.4/3021-03420811 aned
iosrjen   3021-0304-0211 iosrjen
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.
[1]. C. Mu, X. Li, H. Huang, and S. Tian, "Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory," Proc. 13th European Symp. Research in Computer Security (ESORICS '08), pp. 35-48, 2008.
[2]. H. Deng, W. Li, and D. Agrawal, "Routing Security in Wireless Ad Hoc Networks," IEEE Comm. Magazine, vol. 40, no. 10, pp. 70- 75, Oct. 2002.
[3]. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, "A Survey of Routing Attacks in Mobile Ad Hoc Networks," IEEE Wireless Comm. Magazine, vol. 14, no. 5, pp. 85- 91, Oct. 2007.
[4]. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 255-265, 2000.
[5]. Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security and Privacy Magazine, vol. 2, no. 3, pp. 28- 39, May/June 2004.

 

Paper Type

::

Research Paper

Title

::

Performance Evaluation of Solar Assisted Heat Pump Water Heating System

Country

::

India

Authors

::

Kokila. R.N ||, Rajakumar.S

Page No.

::

12-17

::
10.9790/3021-03421217
aned   0.4/3021-03421217 aned
iosrjen   3021-0304-0217 iosrjen

The application of solar thermal energy in water heating system has received more attention in recent years. The solar water heaters is used both in domestic and industrial use. The variation of solar intensity and atmospheric condition is key issue in determining the performance of solar water heater. The conventional thermosyphon solar water heaters fail to provide hot water supply round the clock in low temperature regions. The use heat pump with solar water heating system provides better water management. The COP of heat pump increases with increase in solar intensity and is energy efficient compared to conventional solar water heaters with electric or gas boosters as auxiliary heat source. The main objective of this paper is to compare the performance of heat pump assisted solar water heater to conventional solar water heating system for low ambient temperature application. The theoretical analysis of solar water heater with heat pump integration is presented which shows that the collector efficiency and output water temperature can be increased compared to conventional solar water heaters under same solar intensity and ambient condition.

 

Keywords: Solar energy, Heat pump, CO2 refrigerant, Water heater I. DIRECT EXPANSION SOLAR ASSISTED HEAT

[1] Kuang, Y.H., et al.," Study on direct expansion solar assisted heat pump water heater" Int. J. Energ. Res., vol. 27, pp. 531-548, 2003
[2] Onder Ozgener and Arif Hepbasli "A review on the energy and exergy analysis of solar assisted heat pump systems" Renew. Sust. Energ. Rev., vol. 11, pp. 482-496, 2007
[3] Li,Y.W., et al., "Experimental performance analysis and optimization of direct expansion solar assisted heat pump water heater" Energy, vol. 32, pp. 1361-1374, 2007

[4] Seok Ho Yoon, et al.," Characteristics of evaporative heat transfer and pressure drop of carbon dioxide and correlation development" Int. J. Refrig., vol. 27, pp. 111-119, 2004
[5] Srinivas.S.Pitla, et al., "New correlation to predict the heat transfer coefficient during in-tube cooling of turbulent supercritical CO2" Int. J. Refrig. , vol. 25, pp. 887-895, 2002

 

Paper Type

::

Research Paper

Title

::

Synthesis, characterization and biological activities of transition metal chelates of 2-aminothiazole-derived Mannich bases

Country

::

India

Authors

::

P.SARAVANA BHAVA ||, P.THARMARAJ ||, V.MUTHURAJ || , M.UMADEVI

Page No.

::

18-27

::
10.9790/3021-03421827
aned   0.4/3021-03421827 aned
iosrjen   3021-0304-0227 iosrjen

Transition metal complexes of 2-aminothiazole-derived Mannich base ligand of the type ML2 [where M = Cu(II), Co(II), Ni(II) and Zn(II)] L = N-((1H-benzo[d][1,2,3]triazol-1-yl)methyl)thiazol-2-amine] have been synthesized. The structural features have been arrived from their elemental analysis, magnetic susceptibility, molar conductance, IR, UV-Vis, NMR, Mass and EPR spectral studies. Conductivity measurements reveal that all the complexes are non-electrolytic in nature. Spectroscopic and other analytical data of the complexes suggest octahedral geometry for Cu(II), Co(II), Ni(II) and Zn(II) complexes of N-((1H-benzo[d][1,2,3]triazol-1-yl)methyl)thiazol-2-amine metal(II) complexes. The redox behaviour of the copper(II) complexes have been studied by cyclic voltammetry. The free ligands and their metal complexes have been screened for their in-vitro biological activities against the bacteria Salmonella typhi, Pseudomonas aeruginosa, Escherichia coli and Bacillus subtilis and antifungal activities against the fungi Aspergillus niger, Aspergillus flavus and Rhizoctonia bataicola by well diffusion method. The zone of inhibition value indicates that the most of the metal complexes are found to possess increased activities than the free ligands. The binding properties of metal complexes with DNA were investigated by viscosity measurement. Detailed analysis reveals that the metal complexes intercalate into the DNA base stack as intercalators. The DNA cleavage ability of all the complexes were also examined on calf thymus (CT-DNA) plasmids using gel electrophoresis experiment in presence of H2O2 and the result implies that all the metal complexes cleave the CT-DNA in presence of H2O2.

 

Keywords: Mannich base, 2-aminothiazole, Benzotriazole, Biological activities, DNA cleavage.*Corresponding author

[1]. J. G. Reedijk, R. Wilkinson, J. Gillard, Cleverty, Journal of Chemical Crystallography 29, 1999, 299-308.
[2]. C. R. Reginaldo, N. R. Francisca, E. T. Henrique, J Braz Chem Soc, 12, 2001, 234.
[3]. J. Wang, Y. Ming, Y. Yang, F. Miao, Chinese Science Bulletin, 47, 2002, 890.
[4]. M. H. O'Leory, Contemporary Organic Chemistry; University of Wis-consin, (McGraw-Hill book company, New York, 1976)
[5]. Y. S. Cheng, J. L. Zhao, K. C. Jian, Y. Q. Yan, Y .Yuan, Inorg Chem Comm, 10(8), 2007, 888-890.

 

Paper Type

::

Research Paper

Title

::

Solar-cell based powering of a node for traffic monitoring

Country

::

Slovakia

Authors

::

Ondrej Karpis

Page No.

::

28-32

::
10.9790/3021-03422832
aned   0.4/3021-03422832 aned
iosrjen   3021-0304-0232 iosrjen

This paper discusses the possibility of using solar cell for supplying energy to a node designated to monitor the traffic. Analysis of the energy requirements of each part of the node is crucial for proper design of the power supply. As energy storage is used an ultracapacitor. The paper contains measurements of energy provided by solar cell under realistic conditions. The results indicate the possibility of using a solar cell to power the node for most of the year.

 

Keywords: power supply, solar cell, traffic monitoring, ultracapacitor, wireless sensor network

[1]. A. Herms, E. Nett, S. Schemmer, Real-time mesh networks for industrial applications, Proceedings of 17th International Federation of Automatic Control World Congress (IFAC'08), Seoul, Korea, 2008, 9314-9319.
[2]. M. Maroty et al., Shooter Localization in Urban Terrain, Computer, v.37, n.4, 2004, 60-61.
[3]. J. Papan, M. Jurecka, J. Puchyova, WSN for forest monitoring to prevent illegal logging, Proceedings of FedCSIS 2012, Wroclaw, Poland, 2012, 809-812.
[4]. O. Karpis, Sensor for Vehicles Classification, Proceedings of FedCSIS 2012, Wroclaw, Poland, 2012, 785-789.
[5]. M. Kochlan, P. Sevcik, Supercapacitor power unit for an event-driven wireless sensor node, Proceedings of FedCSIS 2012, Wroclaw, Poland, 2012, 791-796.

 

Paper Type

::

Research Paper

Title

::

Diverse Firewall Policies with Change-Impact Analysis

Country

::

India

Authors

::

Swapnil Hasabe ||, Gaurav Naik ||, Shrikant Nile ||, Mukesh Rochlani

Page No.

::

33-36

::
10.9790/3021-03423336
aned   0.4/3021-03423336 aned
iosrjen   3021-0304-0236 iosrjen

Nowadays, we are suffering from unintended security holes by unauthorized actions in enterprises as well as malicious attacks are very dangerous to the business services. For ensuring the security of private networks in most businesses and enterprises, firewalls are mostly deployed in security mechanism. The quality of policy configured in firewall decides how much it would be effective for securing the private networks. As we know, designing firewall policies are often error-prone due to the complexity of firewall configurations as well as the lack of knowledge of administrator. So, we have major task to discover the functional discrepancies between firewall policies and to resolve them to design diverse firewall policy which would be in most corrected form. We followed three phases in our project those are construction phase, comparison phase and resolution phase. Firewall policies often changes as networks evolve and new malicious attacks arrive. The methods for discovering functional discrepancies between two firewall policies are applied to perform firewall policy Change-Impact analysis as well.

 

Keywords: Change-impact analysis, Design diversity, Firewall policy, Firewall Decision Diagram (FDD), Functional discrepancy, malicious attack, Network security, Policy configuration.

[1]. Alex X. Liu, Member, IEEE, Mohamed G. Gouda, Member, IEEE "Diverse Firewall Design",2008
[2]. Alex X. Liu, Department of Computer Science and Engineering, Michigan State University, East Lansing, MI 48824-1266, U. S. A., "Change-Impact Analysis of Firewall Policies", 2012
[3]. A. Avizienis, "The Methodology of N-Version Programming," Software Fault Tolerance, Chapter 2, M.R. Lyu, ed. Wiley, pp. 23-46,1995.
[4]. Y. Naveh, Y. Richter, Y. Altshuler, D. L. Gresh, D. P. Connors, Workforce optimization: Identification and assignment of professional workers using constraint programming, IBM J. RES. & DEV. VOL. 51 NO. 3/4 MAY/JULY 2007
[5]. Ada Yetunde Barlatt, Models and Algorithms for Workforce Allocation and Utilization, (Industrial and Operations Engineering) in The University of Michigan, 2009

 

Paper Type

::

Research Paper

Title

::

Performance Evaluation of a SCM Optical Transmission System

Country

::

Bangladesh

Authors

::

Md. Shamsul Arefin ||, Nusrat Tazin ||, Munsury Rahman ||,Tajrian Mollick

Page No.

::

37-53

::
10.9790/3021-03423753
aned   0.4/3021-03423753 aned
iosrjen   3021-0304-0253 iosrjen

This paper focuses on the impact of Optical Beat Interference (OBI) on the performance of subcarrier multiplexed optical transmission system for the application on radio link via optical fiber. Performance results are evaluated for QPSK modulation of Microwave subcarriers with digital NRZ coded random data patterns. A suitable bandwidth of 890 – 950 MHz is selected for subcarriers and channel bandwidth of 200 KHz and carrier separation of 250 KHz are considered. By measuring the Optical Bit Interference (OBI) performance limitations of the subcarrier multiplexing optical transmission system is investigated. The OBI for 10 channels for input power 1 dB is -40 dB whereas for 110 channels the OBI is -20 dB. The SIR is also investigated to evaluate the performance. The achievable SIR for NRZ–QPSK subcarrier multiplexed transmission system is about 5 dB corresponding to 110 channels whereas the corresponding SIR is only 28 dB for 10 channels for input power 1 dB. The SIR also degrades as the input power is increased. Investigation of BER shows that for 10 channels the BER is 10-2 whereas for 110 channels BER is around 10-2. This performance also degrades as the input power is increased to 20 dB.

 

Keywords: BER, OBI, SCM, SNR, SMF, SIR, WDM.

[1]. Arief M., Idrus & S.M. Alifah, The SCM/WDM system model for radio over fiber communication link, RF and Microwave Conference, IEEE International , pp 344-347, 2-4 December 2008.
[2]. Ira Jacobs, Timothy T. Pratt, John K. Shaw, Rogers H. Stolen & Anbo Wang , Modeling, analysis and design of subcarrier multiplexing on multimode fiber, Faculty of the Virginia Polytechnic Instituted and State University , March 2003.
[3]. Shijun Xiao & Andrew M. Weiner, Four-User ~3-GHz-Spaced Subcarrier Multiplexing (SCM) Using Optical Direct-Detection via Hyperfine WDM, IEEE Photonics Technology Letters, Vol. 17, No. 10, October 2005.
[4]. Cheng Juang, Shaw Tzuu Huang, Chin Yueh Liu,Wei ChungWang, Tsung Min Hwang, Jonq Juang, and WenWei Lin, Subcarrier Multiplexing by Chaotic Multitone Modulation, IEEE Journal of Quantum Electronics, Vol. 39, No. 10, October 2003.
[5]. M.T. Al-Qdah, H.A. Abdul-Rashid, K. Dimyati, B.M. Ali and M. Khazani, Effect of Optical Beat Interference in

 

Paper Type

::

Research Paper

Title

::

Strength of Binary Blended Cement Composites Containing Plantain Leaf Ash

Country

::

Nigeria

Authors

::

L. O. Ettu ||, J. C. Ezeh ||, U. C. Anya ||, J. I. Arimanwa ||, K. C. Nwachukwu

Page No.

::

54-59

::
10.9790/3021-03425459
aned   0.4/3021-03425459 aned
iosrjen   3021-0304-0259 iosrjen

The strength characteristics of binary blended cement composites made with Ordinary Portland Cement (OPC) and Plantain Leaf Ash (PLA) were investigated in this work. 105 concrete cubes and 105 sandcrete cubes of 150mm x 150mm x 150mm were produced at percentage OPC replacement with PLA of 5%, 10%, 15%, 20%, and 25% and crushed to obtain their compressive strengths at 3, 7, 14, 21, 28, 50, and 90 days of curing. The 3-21 day compressive strength values of OPC-PLA binary blended cement concrete were found to be much lower than the control values; the 28-50 day strengths were comparable to the control values; while the 90 day strengths were higher than the control values especially at 5-10% replacements of OPC with PLA, ranging from 24.40N/mm2 for 10% replacement of OPC to 25.80N/mm2 for 5% replacement of OPC compared with the control value of 23.60N/mm2. This same trend was observed for OPC-PLA binary blended cement sandcrete. The variation in density was not significant. Mathematical models were developed for predicting compressive strengths of OPC-PLA binary blended cement composites using polynomial regression analysis. The model values of compressive strengths obtained from the various model equations were found to be either exactly the same as those of the equivalent laboratory values or very close to them, with differences ranging from 0 to 0.6N/mm2. Thus, OPC-PLA binary blended cement composites could be good for civil engineering works and the developed model equations can be used to estimate their strengths for various curing ages and percentage OPC replacement with PLA.

 

KeyWords: Blended cement, binary, composites, compressive strength, concrete, curing method, mix ratio, pozzolan, sandcrete.

[1]. Adesanya, D. A. (1996). Evaluation of blended cement mortar, concrete and stabilized earth made from OPC and Corn Cob Ash. Construction and Building Materials, 10(6): 451-456.
[2]. Adesanya, D. A. (2000). The characteristics of lateritic bricks and blocks stabilized with corn cob fillers. The Professional Builder, June/July: 47-55.
[3]. Bakar, B. H. A., Putrajaya, R. C., & Abdulaziz, H. (2010). Malaysian Saw dust ash – Improving the Durability and Corrosion Resistance of Concrete: Pre-review. Concrete Research Letters, 1 (1): 6-13, March 2010.
[4]. Chandrasekhar, S., Pramada, S. K. G., & Raghavan, P. N. (2003). Review Processing, Properties And Applications of Reactive Silica From Rice Husk-An Overview. Journal Of Materials Science, 38: 3159-3168.
[5]. Cordeiro, G. C., Filho, R. D. T., & Fairbairn, E. D. R. (2009). Use of ultrafine saw dust ash with high-carbon content as pozzolan in high performance concrete. Materials and Structures, 42: 983–992. DOI 10.1617/s11527-008-9437-z.