-
Input-Output Logic based Fault-Tolerant Design Technique for SRAM-based FPGAs
Authors:
Aditya Srinivas Timmaraju,
Aniket Anand Deshmukh,
Mohammed Amir Khan,
Zafar Ali Khan
Abstract:
Effects of radiation on electronic circuits used in extra-terrestrial applications and radiation prone environments need to be corrected. Since FPGAs offer flexibility, the effects of radiation on them need to be studied and robust methods of fault tolerance need to be devised. In this paper a new fault-tolerant design strategy has been presented. This strategy exploits the relation between change…
▽ More
Effects of radiation on electronic circuits used in extra-terrestrial applications and radiation prone environments need to be corrected. Since FPGAs offer flexibility, the effects of radiation on them need to be studied and robust methods of fault tolerance need to be devised. In this paper a new fault-tolerant design strategy has been presented. This strategy exploits the relation between changes in inputs and the expected change in output. Essentially, it predicts whether or not a change in the output is expected and thereby calculates the error. As a result this strategy reduces hardware and time redundancy required by existing strategies like Duplication with Comparison (DWC) and Triple Modular Redundancy (TMR). The design arising from this strategy has been simulated and its robustness to fault-injection has been verified. Simulations for a 16 bit multiplier show that the new design strategy performs better than the state-of-the-art on critical factors such as hardware redundancy, time redundancy and power consumption.
△ Less
Submitted 4 November, 2013; v1 submitted 4 November, 2013;
originally announced November 2013.
-
Single photon reflection and transmission in optomechanical system
Authors:
M. A. Khan,
S. C. Hou,
K. Farooq,
X. X. Yi
Abstract:
Cavity Optomechanical system is speedily approaching the regime where the radiation pressure of a single photon displaces the moving mirror. In this paper, we consider a cavity optomechanical system where the cavity field is driven by an external field. In the limit of weak mirror-cavity couplings, we calculate analytically the reflection and transmission rates for cavity field and discuss the eff…
▽ More
Cavity Optomechanical system is speedily approaching the regime where the radiation pressure of a single photon displaces the moving mirror. In this paper, we consider a cavity optomechanical system where the cavity field is driven by an external field. In the limit of weak mirror-cavity couplings, we calculate analytically the reflection and transmission rates for cavity field and discuss the effects of mirror-cavity coupling on the reflection and transmission.
△ Less
Submitted 22 April, 2013;
originally announced April 2013.
-
Guidelines to the Problem of Location Management and Database Architecture for the Next Generation Mobile Networks
Authors:
Md. Mamun Ali Sarker,
Md. Ashraf Hossain Khan,
M. M. A. Hashem
Abstract:
In near future, anticipated large number of mobile users may introduce very large centralized databases and increase end-to-end delays in location registration and call delivery on HLR-VLR database and will become infeasible. After observing several problems we propose some guidelines. Multitree distributed database, high throughput index structure, memory oriented database organization are used.…
▽ More
In near future, anticipated large number of mobile users may introduce very large centralized databases and increase end-to-end delays in location registration and call delivery on HLR-VLR database and will become infeasible. After observing several problems we propose some guidelines. Multitree distributed database, high throughput index structure, memory oriented database organization are used. Location management guidelines for moving user in overlap** network, neighbor discovery protocol (NDP), and global roaming rule are adopted. Analytic model and examples are presented to evaluate the efficiency of proposed guidelines.
△ Less
Submitted 10 April, 2013;
originally announced April 2013.
-
Analyzing Delay in Wireless Multi-hop Heterogeneous Body Area Networks
Authors:
N. Javaid,
M. Yaqoob,
M. Y. Khan,
M. A. Khan,
A. Javaid,
Z. A. Khan
Abstract:
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely send…
▽ More
With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g, Electro Cardiogram (ECG), Electro Encephalogram (EEG), ElectronyStagmography (ENG) etc. Due to life threatening situations, timely sending of data is essential. For data to reach health care center, there must be a proper way of sending data through reliable connection and with minimum delay. In this paper transmission delay of different paths, through which data is sent from sensor to health care center over heterogeneous multi-hop wireless channel is analyzed. Data of medical related diseases is sent through three different paths. In all three paths, data from sensors first reaches ZigBee, which is the common link in all three paths. Wireless Local Area Network (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunication System (UMTS) are connected with ZigBee. Each network (WLAN, WiMAX, UMTS) is setup according to environmental conditions, suitability of device and availability of structure for that device. Data from these networks is sent to IP-Cloud, which is further connected to health care center. Delay of data reaching each device is calculated and represented graphically. Main aim of this paper is to calculate delay of each link in each path over multi-hop wireless channel.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
Analyzing Medium Access Techniques in Wireless Body Area Networks
Authors:
N. Javaid,
I. Israr,
M. A. Khan,
A. Javaid,
S. H. Bouk,
Z. A. Khan
Abstract:
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are…
▽ More
This paper presents comparison of Access Techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA (S-ALOHA). Performance metrics used for comparison are Throughput (T), Delay (D) and Offered Load (G). The main goal for comparison is to show which technique gives highest Throughput and lowest Delay with increase in Load. Energy efficiency is major issue in WBAN that is why there is need to know which technique performs best for energy conservation and also gives minimum delay. Simulations are performed for different scenarios and results are compared for all techniques. We suggest TDMA as best technique to be used in MAC protocol for WBANs due to its high throughput and minimum delay with increase in load. MATLAB is the tool that is used for simulation.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
On Sink Mobility Trajectory in Clustering Routing Protocols in WSNs
Authors:
N. Javaid,
Q. Ain,
M. A. Khan,
A. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clusterin…
▽ More
Energy efficient routing protocols are consistently cited as efficient solutions for Wireless Sensor Networks (WSNs) routing. The area of WSNs is one of the emerging and fast growing fields which brought low cost, low power and multi-functional sensor nodes. In this paper, we examine some protocols related to homogeneous and heterogeneous networks. To evaluate the efficiency of different clustering schemes, we compare five clustering routing protocols; Low Energy Adaptive Clustering Hierarchy (LEACH), Threshold Sensitive Energy Efficient Sensor Network (TEEN), Distributed Energy Efficient Clustering (DEEC) and two variants of TEEN which are Clustering and Multi-Hop Protocol in Threshold Sensitive Energy Efficient Sensor Network (CAMPTEEN) and Hierarchical Threshold Sensitive Energy Efficient Sensor Network (H-TEEN). The contribution of this paper is to introduce sink mobility to increase the network life time of hierarchal routing protocols. Two scenarios are discussed to compare the performances of routing protocols; in first scenario static sink is implanted and in later one mobile sink is used. We perform analytical simulations in MATLAB by using different performance metrics such as, number of alive nodes, number of dead nodes and throughput.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
Quantum Cryptography Using Various Reversible Quantum Logic Gates in WSNs
Authors:
S. Ahmed,
N. Javaid,
S. H. Bouk,
A. Javaid,
M. A. Khan,
Z. A. Khan
Abstract:
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that alloca…
▽ More
As sensor nodes are deployed anywhere in a wireless sensor network, hence their communication can be easily monitored. In these networks, message protection and node identification are very issues. Hence, security of large scale such networks requires efficient key distribution and management mechanisms. Quantum cryptography and particularly quantum key distribution is such a technique that allocates secure keys only for short distances. While not completely secure, it offers huge advantages over traditional methods by the use of entanglement swap** and quantum teleportation. Reversible logic gates like CNOT, Toffoli, Fredkin etc. are of basic importance in Quantum Computing. In our research, we adopted a EPR-pair allocation scheme in terms of these quantum gates to overcome the susceptibility caused by malicious nodes. As the qubits stored in a sensor node can be used only once and cannot be duplicated, hence risk of information leakage reduced even if the node are compromised.
△ Less
Submitted 3 April, 2013;
originally announced April 2013.
-
HEER: Hybrid Energy Efficient Reactive Protocol for Wireless Sensor Networks
Authors:
N. Javaid,
S. N. Mohammad,
K. Latif,
U. Qasim,
Z. A. Khan,
M. A. Khan
Abstract:
Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed data to base station. Energy conservation is an important issue for sensor nodes as they have limited power.Many routing protocols have been proposed earlier for energy efficiency of both homogeneous and heterogeneous environments. We can prolong our stability and network lifetime by reducing our energy consumption. In t…
▽ More
Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed data to base station. Energy conservation is an important issue for sensor nodes as they have limited power.Many routing protocols have been proposed earlier for energy efficiency of both homogeneous and heterogeneous environments. We can prolong our stability and network lifetime by reducing our energy consumption. In this research paper, we propose a protocol designed for the characteristics of a reactive homogeneous WSNs, HEER (Hybrid Energy Efficient Reactive) protocol. In HEER, Cluster Head(CH) selection is based on the ratio of residual energy of node and average energy of network. Moreover, to conserve more energy, we introduce Hard Threshold (HT) and Soft Threshold (ST). Finally, simulations show that our protocol has not only prolonged the network lifetime but also significantly increased stability period.
△ Less
Submitted 2 April, 2013;
originally announced April 2013.
-
Towards LP Modeling for Maximizing Throughput and Minimizing Routing Delay in Proactive Protocols in Wireless Multi-hop Networks
Authors:
N. Javaid,
Z. A. Khan,
U. Qasim,
M. A. Khan,
K. Latif,
A. Javaid
Abstract:
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically exa…
▽ More
Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP_models) for WMhNs. In WMhNs, different routing protocols are used to facilitate users demand(s). To practically examine constraints of respective LP_models over different routing techniques, we select three proactive routing protocols; Destination Sequence Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). These protocols are simulated in two important scenarios regarding to user demands; mobilities and different network flows. To evaluate the performance, we further relate the protocols strategy effects on respective constraints in selected network scenarios.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks
Authors:
N. Javaid,
U. Qasim,
Z. A. Khan,
M. A. Khan,
K. Latif,
A. Javaid
Abstract:
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analy…
▽ More
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analytical simulations of LP_models in MATLAB that quick route repair reduces routing latency and optimizations of retransmission attempts results efficient energy utilization. To provide quick repair, we enhance AODV and DSR. To practically examine the efficiency of enhanced protocols in different scenarios of WMhNs, we conduct simulations using NS- 2. From simulation results, enhanced DSR and AODV achieve efficient output by optimizing routing latencies and routing load in terms of retransmission attempts.
△ Less
Submitted 31 March, 2013;
originally announced April 2013.
-
Improving Network Efficiency by Removing Energy Holes in WSNs
Authors:
M. B. Rasheedl,
N. Javaid,
A. Javaid,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to…
▽ More
Cluster based Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holedare created due to quickly drain the energy of a few nodes due to non-uniform distribution in the network. Normally, energy holes make the data routing failure when nodes transmit data back to the base station. We proposedEnergy-efficient HOleRemoving Mechanism (E-HORM) technique to remove energy holes. In this technique, we use sleep and awake mechanism for sensor nodes to save energy. This approach finds the maximum distance node to calculate the maximum energy for data transmission. We considered it as a threshold energy Eth. Every node first checks its energy level for data transmission. If the energy level is less than Eth, it cannot transmit data. We also explain mathematically the energy consumption and average energy saving of sensor nodes in each round. Extensive simulations showed that when use this approach for WSNs significantly helps to extend the network lifetime and stability period.
△ Less
Submitted 24 March, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks
Authors:
S. Faisal,
N. Javaid,
A. Javaid,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station whil…
▽ More
Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Various routing Protocols are designed for transmission in WSNs. In this paper, we proposed a hybrid routing protocol: Zonal-Stable Election Protocol (Z-SEP) for heterogeneous WSNs. In this protocol, some nodes transmit data directly to base station while some use clustering technique to send data to base station as in SEP. We implemented Z-SEP and compared it with traditional Low Energy adaptive clustering hierarchy (LEACH) and SEP. Simulation results showed that Z-SEP enhanced the stability period and throughput than existing protocols like LEACH and SEP.
△ Less
Submitted 24 March, 2013; v1 submitted 21 March, 2013;
originally announced March 2013.
-
EAPESS: An Adaptive Transmission Scheme in Wireless Sensor Networks
Authors:
Z. Abbas,
N. Javaid,
A. Javaid,
Z. A. Khan,
M. A. Khan,
U. Qasim
Abstract:
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critica…
▽ More
Reduced energy consumption in sensor nodes is one of the major challenges in Wireless Sensor Networks (WSNs) deployment. In this regard, Error Control Coding (ECC) is one of techniques used for energy optimization in WSNs. Similarly, critical distance is another term being used for energy efficiency, when used with ECC provides better results of energy saving. In this paper three different critical distance values are used against different coding gains for sake of energy saving. If distance lies below critical distance values then particular encoders are selected with respect to their particular coding gains. Coding gains are used for critical distances estimation of all encoders. This adaptive encoder and transmit power selection scheme with respect to their coding gain results in a significant energy saving in WSNs environment. Simulations provide better results of energy saving achieved by using this adaptive scheme.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Hybrid DEEC: Towards Efficient Energy Utilization in Wireless Sensor Networks
Authors:
M. Y. Khan,
N. Javaid,
M. A. Khan,
A. Javaid,
Z. A. Khan,
U. Qasim
Abstract:
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy…
▽ More
The clustering algorithm are considered as a kind of key technique used to reduce energy consumption. It can help in increasing the stability period and network life time. Routing protocol for efficient energy utilization should be designed for heterogeneous Wireless Sensor Networks (WSNs). We purpose Hybrid-DEEC (H-DEEC), a chain and cluster based (hybrid) distributed scheme for efficient energy utilization in WSNs. In H-DEEC,elected Cluster Heads (CHs) communicate the Base Station (BS) through beta elected nodes, by using multi-hop**. We logically divide the network into two parts, on the basis of the residual energy of nodes. The normal nodes with high initial and residual energy will behighlyprobable to be CHs than the nodes with lesser energy. To overcome the deficiencies of H-DEEC, we propose Multi-Edged Hybrid-DEEC (MH-DEEC). In MH-DEEC the criteria of chain construction is modified. Finally, the comparison in simulation results with other heterogeneous protocols show that, MH-DEEC and H-DEEC achieves longer stability time and network life time due to efficient energy utilization.
△ Less
Submitted 19 March, 2013;
originally announced March 2013.
-
Energy Efficient MAC Protocols in Wireless Body Area Sensor Networks -A Survey
Authors:
N. Javaid,
S. Hayat,
M. Shakir,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
In this paper, we first presented an analytically discussion about energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). For this purpose, different energy efficient MAC protocols with their respective energy optimization techniques; Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA), are elaborated. We als…
▽ More
In this paper, we first presented an analytically discussion about energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). For this purpose, different energy efficient MAC protocols with their respective energy optimization techniques; Low Power Listening (LPL), Scheduled Contention and Time Division Multiple Access (TDMA), are elaborated. We also analytically compared path loss models for In-body, On-body and Off-body communications in WBASNs. These three path loss scenarios are simulated in MATLAB and results shown that path loss is more in In-body communication because of less energy level to take care of tissues and organs located inside human body. Secondly, power model for WBASNs of Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) and beacon mode is also presented. MATLAB simulations results shown that power of CSMA/CA mode is less as compared to beacon mode. Finally, we suggested that hybrid mode is more useful to achieve optimization in power consumption, which consequently results in high energy efficiency.
△ Less
Submitted 8 March, 2013;
originally announced March 2013.
-
Ubiquitous HealthCare in Wireless Body Area Networks - A Survey
Authors:
N. Javaid,
N. A. Khan,
M. Shakir,
M. A. Khan,
S. H. Bouk,
Z. A. Khan
Abstract:
Advances in wireless communication, system on chip and low power sensor nodes allowed realization of Wireless Body Area Network (WBAN). WBAN comprised of tiny sensors, which collect information of patient's vital signs and provide a real time feedback. In addition, WBAN also supports many applications including Ubiquitous HealthCare (UHC), entertainment, gaming, military, etc. UHC is required by e…
▽ More
Advances in wireless communication, system on chip and low power sensor nodes allowed realization of Wireless Body Area Network (WBAN). WBAN comprised of tiny sensors, which collect information of patient's vital signs and provide a real time feedback. In addition, WBAN also supports many applications including Ubiquitous HealthCare (UHC), entertainment, gaming, military, etc. UHC is required by elderly people to facilitate them with instant monitoring anywhere they move around. In this paper, different standards used in WBAN were also discussed briefly. Path loss in WBAN and its impact on communication was presented with the help of simulations, which were performed for different models of In-Body communication and different factors (such as, attenuation, frequency, distance etc) influencing path loss in On-Body communications.
△ Less
Submitted 8 March, 2013;
originally announced March 2013.
-
Characterizations of LA-semigroups by new types of fuzzy ideals
Authors:
Muhammad aslam,
Saleem Abdullah,
Muhammad Atique Khan
Abstract:
In this article, we give some characterization results offuzzy left(right) ideals, fuzzy generalized bi-ideals and -fuzzy bi-ideals of an LA-semigroup. We also give some characterizations of LA-semigroups by the properties of fuzzy ideals.
In this article, we give some characterization results offuzzy left(right) ideals, fuzzy generalized bi-ideals and -fuzzy bi-ideals of an LA-semigroup. We also give some characterizations of LA-semigroups by the properties of fuzzy ideals.
△ Less
Submitted 8 January, 2013;
originally announced January 2013.
-
On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using 802.11 and 802.11p
Authors:
S. Sagar,
N. Javaid,
J. Saqib,
Z. A. Khan,
U. Qasim,
M. A. Khan
Abstract:
Mobile Ad-hoc NETworks (MANETs) comprise on wireless mobile nodes that are communicating with each other without any infrastructure. Vehicular Ad-hoc NETwork (VANET) is a special type of MANETs in which vehicles with high mobility need to communicate with each other. In this paper, we present a novel framework for link availability of paths for static as well as dynamic networks. Moreover, we eval…
▽ More
Mobile Ad-hoc NETworks (MANETs) comprise on wireless mobile nodes that are communicating with each other without any infrastructure. Vehicular Ad-hoc NETwork (VANET) is a special type of MANETs in which vehicles with high mobility need to communicate with each other. In this paper, we present a novel framework for link availability of paths for static as well as dynamic networks. Moreover, we evaluate our frame work for routing protocols performance with different number of nodes in MANETs and in VANETs. We select three routing protocols namely Ad-hoc On-demand Distance Vector (AODV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). Furthermore, we have also modified default parameters of selected protocols to check their efficiencies. Performance of these protocols is analyzed using three performance metrics; Packet Delivery Ratio (PDR), Normalized Routing Overhead (NRO) and End-to-End Delay (E2ED) against varying scalabilities of nodes. We perform these simulations with NS-2 using TwoRayGround propagation model. The SUMO simulator is used to generate a random mobility pattern for VANETs. From the extensive simulations, we observe that AODV outperforms among all three protocols.
△ Less
Submitted 18 December, 2012;
originally announced December 2012.
-
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Authors:
Md. Ali Hossain,
Ahsan-Ul-Ambia,
Md. Aktaruzzaman,
Md. Ahaduzzaman Khan
Abstract:
Radon Transformation is generally used to construct optical image (like CT image) from the projection data in biomedical imaging. In this paper, the concept of Radon Transformation is implemented to reconstruct Electrical Impedance Topographic Image (conductivity or resistivity distribution) of a circular subject. A parallel resistance model of a subject is proposed for Electrical Impedance Topogr…
▽ More
Radon Transformation is generally used to construct optical image (like CT image) from the projection data in biomedical imaging. In this paper, the concept of Radon Transformation is implemented to reconstruct Electrical Impedance Topographic Image (conductivity or resistivity distribution) of a circular subject. A parallel resistance model of a subject is proposed for Electrical Impedance Topography(EIT) or Magnetic Induction Tomography(MIT). A circular subject with embedded circular objects is segmented into equal width slices from different angles. For each angle, Conductance and Conductivity of each slice is calculated and stored in an array. A back projection method is used to generate a two-dimensional image from one-dimensional projections. As a back projection method, Inverse Radon Transformation is applied on the calculated conductance and conductivity to reconstruct two dimensional images. These images are compared to the target image. In the time of image reconstruction, different filters are used and these images are compared with each other and target image.
△ Less
Submitted 16 October, 2012;
originally announced November 2012.
-
A new generalization of fuzzy ideals in LA-semigroups
Authors:
S. Abdullah,
M. Atique Khan,
M. Aslam
Abstract:
In this article, the concept of generalized fuzzy ideals in LA-semigroups. We introduced different types of generalized fuzzy ideals like bi-ideals, interior ideals and quasi ideals in LA-semigroups
In this article, the concept of generalized fuzzy ideals in LA-semigroups. We introduced different types of generalized fuzzy ideals like bi-ideals, interior ideals and quasi ideals in LA-semigroups
△ Less
Submitted 20 October, 2012;
originally announced October 2012.
-
Transmission Delay of Multi-hop Heterogeneous Networks for Medical Applications
Authors:
M. M. Yaqoob,
I. Israr,
N. Javaid,
M. A. Khan,
U. Qasim,
Z. A. Khan
Abstract:
Nowadays, with increase in ageing population, Health care market keeps growing. There is a need for monitoring of Health issues. Body Area Network consists of wireless sensors attached on or inside human body for monitoring vital Health related problems e.g, Electro Cardiogram (ECG), ElectroEncephalogram (EEG), ElectronyStagmography(ENG) etc. Data is recorded by sensors and is sent towards Health…
▽ More
Nowadays, with increase in ageing population, Health care market keeps growing. There is a need for monitoring of Health issues. Body Area Network consists of wireless sensors attached on or inside human body for monitoring vital Health related problems e.g, Electro Cardiogram (ECG), ElectroEncephalogram (EEG), ElectronyStagmography(ENG) etc. Data is recorded by sensors and is sent towards Health care center. Due to life threatening situations, timely sending of data is essential. For data to reach Health care center, there must be a proper way of sending data through reliable connection and with minimum delay. In this paper transmission delay of different paths, through which data is sent from sensor to Health care center over heterogeneous multi-hop wireless channel is analyzed. Data of medical related diseases is sent through three different paths. In all three paths, data from sensors first reaches ZigBee, which is the common link in all three paths. After ZigBee there are three available networks, through which data is sent. Wireless Local Area Network (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), Universal Mobile Telecommunication System (UMTS) are connected with ZigBee. Each network (WLAN, WiMAX, UMTS) is setup according to environmental conditions, suitability of device and availability of structure for that device. Data from these networks is sent to IP-Cloud, which is further connected to Health care center. Main aim of this paper is to calculate delay of each link in each path over multihop wireless channel.
△ Less
Submitted 12 August, 2012;
originally announced August 2012.
-
Simulation Analysis of IEEE 802.15.4 Non-beacon Mode at Varying Data Rates
Authors:
Z. Abbas,
N. Javaid,
M. A. Khan,
S. Ahmed,
U. Qasim,
Z. A. Khan
Abstract:
IEEE 802.15.4 standard is designed for low power and low data rate applications with high reliability. It operates in beacon enable and non-beacon enable modes. In this work, we analyze delay, throughput, load, and end-to-end delay of nonbeacon enable mode. Analysis of these parameters are performed at varying data rates. Evaluation of non beacon enabled mode is done in a 10 node network. We limit…
▽ More
IEEE 802.15.4 standard is designed for low power and low data rate applications with high reliability. It operates in beacon enable and non-beacon enable modes. In this work, we analyze delay, throughput, load, and end-to-end delay of nonbeacon enable mode. Analysis of these parameters are performed at varying data rates. Evaluation of non beacon enabled mode is done in a 10 node network. We limit our analysis to non beacon or unslotted version because, it performs better than other. Protocol performance is examined by changing different Medium Access Control (MAC) parameters. We consider a full size MAC packet with payload size of 114 bytes. In this paper we show that maximum throughput and lowest delay is achieved at highest data rate.
△ Less
Submitted 12 August, 2012;
originally announced August 2012.
-
Slant submanifolds of lorentzian almost contact manifolds
Authors:
Khushwant Singh,
Siraj Uddin,
Satvinder Singh Bhatia,
M. A. Khan
Abstract:
In this paper we study slant submanifolds of Lorentzian almost contact manifolds. We have taken the submanifold as a space like and then defined the slant angle on a submanifold and thus we extended the results of A. Lotta (Slant submanifolds in contact geometry [8]) and M. A. Khan et. al. (Slant submanifolds of Lorentzian Paracontact manifolds [7]) in this new setting.
In this paper we study slant submanifolds of Lorentzian almost contact manifolds. We have taken the submanifold as a space like and then defined the slant angle on a submanifold and thus we extended the results of A. Lotta (Slant submanifolds in contact geometry [8]) and M. A. Khan et. al. (Slant submanifolds of Lorentzian Paracontact manifolds [7]) in this new setting.
△ Less
Submitted 27 April, 2012;
originally announced April 2012.
-
Optimal Lyapunov-based quantum control for quantum systems
Authors:
S. C. Hou,
M. A. Khan,
Daoyi Dong,
Ian R. Petersen,
X. X. Yi
Abstract:
Quantum Lyapunov control was developed in order to transform a quantum system from arbitrary initial states to a target state. The idea is to find control fields that steer the Lyapunov function to zero as $t\rightarrow \infty$, meanwhile the quantum system is driven to the target state. In order to shorten the time required to reach the target state, we propose two designs to optimize Lyapunov co…
▽ More
Quantum Lyapunov control was developed in order to transform a quantum system from arbitrary initial states to a target state. The idea is to find control fields that steer the Lyapunov function to zero as $t\rightarrow \infty$, meanwhile the quantum system is driven to the target state. In order to shorten the time required to reach the target state, we propose two designs to optimize Lyapunov control in this paper. The first design makes the Lyapunov function decrease as fast as possible with a constraint on the total power of control fields, and the second design has the same purpose but with a constraint on each control field. Examples of a three-level system demonstrate that the evolution time for Lyapunov control can be significantly shortened, especially when high control fidelity is required. Besides, this optimal Lyapunov-based quantum control is robust against uncertainties in the free Hamiltonian and decoherence in the system compared to conventional Lyapunov control.
△ Less
Submitted 15 September, 2012; v1 submitted 23 March, 2012;
originally announced March 2012.
-
An Automated Algorithm for Approximation of Temporal Video Data Using Linear B'EZIER Fitting
Authors:
Murtaza Ali Khan
Abstract:
This paper presents an efficient method for approximation of temporal video data using linear Bezier fitting. For a given sequence of frames, the proposed method estimates the intensity variations of each pixel in temporal dimension using linear Bezier fitting in Euclidean space. Fitting of each segment ensures upper bound of specified mean squared error. Break and fit criteria is employed to mini…
▽ More
This paper presents an efficient method for approximation of temporal video data using linear Bezier fitting. For a given sequence of frames, the proposed method estimates the intensity variations of each pixel in temporal dimension using linear Bezier fitting in Euclidean space. Fitting of each segment ensures upper bound of specified mean squared error. Break and fit criteria is employed to minimize the number of segments required to fit the data. The proposed method is well suitable for lossy compression of temporal video data and automates the fitting process of each pixel. Experimental results show that the proposed method yields good results both in terms of objective and subjective quality measurement parameters without causing any blocking artifacts.
△ Less
Submitted 31 May, 2010;
originally announced May 2010.
-
A Discourse-based Approach in Text-based Machine Translation
Authors:
Sana Ullah,
M. A. Khan,
Kyung Sup Kwak
Abstract:
This paper presents a theoretical research based approach to ellipsis resolution in machine translation. The formula of discourse is applied in order to resolve ellipses. The validity of the discourse formula is analyzed by applying it to the real world text, i.e., newspaper fragments. The source text is converted into mono-sentential discourses where complex discourses require further dissection…
▽ More
This paper presents a theoretical research based approach to ellipsis resolution in machine translation. The formula of discourse is applied in order to resolve ellipses. The validity of the discourse formula is analyzed by applying it to the real world text, i.e., newspaper fragments. The source text is converted into mono-sentential discourses where complex discourses require further dissection either directly into primitive discourses or first into compound discourses and later into primitive ones. The procedure of dissection needs further improvement, i.e., discovering as many primitive discourse forms as possible. An attempt has been made to investigate new primitive discourses or patterns from the given text.
△ Less
Submitted 28 July, 2010; v1 submitted 8 November, 2009;
originally announced November 2009.
-
Stanley's conjecture for critical ideals
Authors:
Azeem Haider,
Sardar Mohib Ali Khan
Abstract:
Let S=K[x_1,x_2,...,x_n] be a polynomial ring in n variables over a field K. Stanley's conjecture holds for the modules I and S/I, when I is a critical monomial ideal. We calculate the Stanley depth of S/I when I is a canonical critical monomial ideal. For non critical monomial ideals we show the existence of a Stanley ideal with the same depth and Hilbert function.
Let S=K[x_1,x_2,...,x_n] be a polynomial ring in n variables over a field K. Stanley's conjecture holds for the modules I and S/I, when I is a critical monomial ideal. We calculate the Stanley depth of S/I when I is a canonical critical monomial ideal. For non critical monomial ideals we show the existence of a Stanley ideal with the same depth and Hilbert function.
△ Less
Submitted 7 May, 2009;
originally announced May 2009.
-
New lower bounds for the number of blocks in balanced incomplete block designs
Authors:
Muhammad Ali Khan
Abstract:
Bose proved the inequality $b\geq v+r-1$ for resolvable balanced incomplete block designs (RBIBDs) and Kageyama improved it for RBIBDs which are not affine resolvable. In this note we prove a new lower bound on the number of blocks $b$ that holds for all BIBDs. We further prove that for a significantly large number of BIBDs our bound is tighter than the bounds given by the inequalities of Bose and…
▽ More
Bose proved the inequality $b\geq v+r-1$ for resolvable balanced incomplete block designs (RBIBDs) and Kageyama improved it for RBIBDs which are not affine resolvable. In this note we prove a new lower bound on the number of blocks $b$ that holds for all BIBDs. We further prove that for a significantly large number of BIBDs our bound is tighter than the bounds given by the inequalities of Bose and Kageyama.
△ Less
Submitted 31 May, 2015; v1 submitted 12 September, 2008;
originally announced September 2008.
-
Thermodynamic Properties of electrically modulated monolayer Graphene
Authors:
R. Nasir,
M. A. Khan,
M. Tahir,
K. Sabeeh
Abstract:
Theoretical investigation of thermodynamic properties of electrically modulated monolayer graphene in the presence of a perpendicular magnetic field B is presented.This work is aimed at determining the modulation induced effects on the thermodynamic properties of electrically modulated graphene.The results obtained are compared with those of the conventional 2DEG. The one-dimensional periodic po…
▽ More
Theoretical investigation of thermodynamic properties of electrically modulated monolayer graphene in the presence of a perpendicular magnetic field B is presented.This work is aimed at determining the modulation induced effects on the thermodynamic properties of electrically modulated graphene.The results obtained are compared with those of the conventional 2DEG. The one-dimensional periodic potential due to electric modulation lifts the degeneracy of the Landau Levels and converts them into bands whose width oscillates as a function of B. We find Weiss type oscillations for small values of B and dHvA type oscillations at larger values values of $B$. We find that the modulation induced effects on the thermodynamic properties are enhanced and less damped with temperature in graphene compared with conventional 2DEG system.
△ Less
Submitted 21 April, 2008; v1 submitted 10 April, 2008;
originally announced April 2008.
-
Kinematic simulation of multi point turbulent dispersion
Authors:
M. A. I. Khan,
A. Pumir,
J. C. Vassilicos
Abstract:
As three particles are advected by a turbulent flow, they separate from each other and develop non trivial geometries, which effectively reflect the structure of the turbulence. We investigate here the geometry, in a statistical sense, of three Lagrangian particles advected, in 2-dimensions, by Kinematic Simulation (KS). KS is a Lagrangian model of turbulent diffusion that makes no use of any de…
▽ More
As three particles are advected by a turbulent flow, they separate from each other and develop non trivial geometries, which effectively reflect the structure of the turbulence. We investigate here the geometry, in a statistical sense, of three Lagrangian particles advected, in 2-dimensions, by Kinematic Simulation (KS). KS is a Lagrangian model of turbulent diffusion that makes no use of any delta correlation in time at any level. With this approach, situations with a very large range of inertial scales and varying persistence of spatial flow structure can be studied.
We first show numerically that the model flow reproduces recent experimental results at low Reynolds numbers. The statistical properties of the shape distribution at much higher Reynolds number is then considered. Even at the highest available inertial range, of scale, corresponding to a ratio between large and small scales of $L/η\approx 17,000$, we find that the radius of gyration of the three points does not precisely follow Richardson's prediction. The shapes of the triangles have a high probability to be elongated. The corresponding shape distribution is not found to be perfectly self similar, even for our highest ratio of inertial scales. We also discuss how the parameters of the synthetic flow, such as the exponent of the spectrum and the effect of the swee** affect our results. Our results suggest that a non trivial distribution of shapes will be observed at high Reynolds numbers, although it may not be exactly self similar. Special attention is given to the effects of persistence of spatial flow structure.
△ Less
Submitted 13 February, 2003;
originally announced February 2003.
-
The Scalings of Scalar Structure Functions in a Velocity Field with Coherent Vortical Structures
Authors:
Md. A. I. Khan,
J. C. Vassilicos
Abstract:
In planar turbulence modelled as an isotropic and homogeneous collection of 2-D non-interacting compact vortices, the structure functions S_p(r) of a statistically stationary passive scalar field have the following scaling behaviour in the limit where the Péclet number Pe -> \infty S_p(r) ~ constant+\ln({\frac{r}{LPe^{-1/3}}}) for LPe^{-1/3} << L, S_p(r) ~ ({\frac{r}{LPe^{-1/3}}})^{6(1-D)} for L…
▽ More
In planar turbulence modelled as an isotropic and homogeneous collection of 2-D non-interacting compact vortices, the structure functions S_p(r) of a statistically stationary passive scalar field have the following scaling behaviour in the limit where the Péclet number Pe -> \infty S_p(r) ~ constant+\ln({\frac{r}{LPe^{-1/3}}}) for LPe^{-1/3} << L, S_p(r) ~ ({\frac{r}{LPe^{-1/3}}})^{6(1-D)} for LPe^{-1/2} << LPe^{-1/3}, where L is a large scale and D is the fractal co-dimension of the spiral scalar structures generated by the vortices (1/2 <= D < 2/3). Note that LPe^{-1/2} is the scalar Taylor microscale which stems naturally from our analytical treatment of the advection-diffusion equation. The essential ingredients of our theory are the locality of inter-scale transfer and Lundgren's time average assumption. A phenomenological theory explicitly based only on these two ingredients reproduces our results and a generalisation of this phenomenology to spatially smooth chaotic flows yields (k\ln k)^{-1} generalised power spectra for the advected scalar fields.
△ Less
Submitted 21 September, 2001; v1 submitted 10 March, 2000;
originally announced March 2000.