Volume 3, Issue 4, April 2012
Selective Particle Swarm Optimization
Tamer M. Khalil and Alexander V. Gorpinich
Electrical Engineering Department, Pryazovskyi State Technical University, Mariupol, Ukraine
Abstract– Using Particle Swarm Optimization (PSO) for solving nonlinear optimization problems has gained increasing attention in recent years. The method of Particle Swarm Optimization was introduced in 1995, then it adapted to search in binary space in 1997. Engineering optimization tasks often require optimization methods capable of select the values of the state variables from a set of available values (standard values). This work proposes a simple modification to the binary PSO to search in a selected space (selective PSO). The proposed method applied to a capacitor placement problem to select the optimal capacitor sizes from a set of available sizes.
Keywords— Selective Particle Swarm Optimization and Capacitor Sizing
Download full paper PDF format (Page: 1-4)
An Overview of Game Theory and its Applications in Communication Networks
I. A. Shah, S. Jan, I. Khan and S. Qamar
University of Engineering and Technology, Mardan Campus, Khyber Pakhtunkhwa, Pakistan
King Abdulaziz University, Jeddah, Saudi Arabia
Abstract– Due to its capability to solve the situations of conflict and competition, Game Theory has been used as a mathematical tool in economics, politics, biology and human psychology. Nash Equilibrium, being the solution of a non-cooperative game, gives a stable state in a sense that no agent/player have any positive incentive to deviate from its current adopted strategy, when all others players of the game stick to their current moves. The Pareto Efficiency is the solution of a game where the utility gained by a player by deviating from the current strategy causes at least one other player worst off. In Communication Networks, the cooperation to follow a certain protocol cannot be taken as for granted, keeping in view the selfish nature of now a day’s network entities. To cope with the selfish and competitive behavior of the network entities, Game Theory provides a feasible solution for resource utilization and service provisioning. This paper presents the detailed overview of the Game Theory concepts and its applications in the Communication Networks, both from cooperative and non-cooperative perspectives.
Keywords— Game Theory, Nash Equilibrium, Cooperative Games, Non-Cooperative Games and Communication Networks
Download full paper PDF format (Page: 5-11)
Social Networking (Facebook): Wastage of Time or an Important Web Resource
Atif Hassan and Dr. Rizwana Bashir
Defence Authority College of Business (DACB), Karachi, Pakistan
Bahria University, Karachi, Pakistan
Abstract– The basic aim of choosing this topic was to check Facebook’s importance as a social website amongst youth and to see whether it has turned out to us more than just a social networking website with uses like business online, advertisement etc. And also to see the how common is the use of Facebook as a hobby, a pass time and for playing online games. The important issue was; Is Facebook a bad habit? Is it a waste of time?
Keywords— Social Networking, Facebook, Web and Resource
Download full paper PDF format (Page: 12-15)
Comparison between Symmetrical and Asymmetrical Single Phase Seven Level Cascade H-Bridge Multilevel Inverter with PWM Topology
Jannu Ramu, S.J.V. Prakash, K. Satya Srinivasu, R.N.D. Pattabhi Ram, M. Vishnu Prasad and Md. Mazhar Hussain
Department of EEE, Sri Vasavi Institute of Engineering and Technology, Nandamuru, AP, India
Abstract– In this paper, a different configuration based on different DC bus voltage for a cascade H-Bridge multilevel inverter has been presented. Two different symmetrical and asymmetrical arrangements of a seven-level cascade H-Bridge inverters have been compared, in order to find an optimum arrangement with lower switching losses and optimized output voltage quality. The optimized asymmetrical arrangement has been compared with a conventional seven-level inverter. The comparison results show that an asymmetrical configuration can obtain more voltage levels in output voltage with same number of component compared with the conventional seven-level inverter and this will lead to the reduction of harmonic content of output voltage. A predictive current control technique has been carried out to verify the viability of new configuration. The advantages of this control method are simplicity and applicability for n-level multilevel inverters, without a significant change in the control circuit.
Keywords—Asymmetric Multilevel Inverter, Unipolar ISPWM, THD and Switching Loss
Download full paper PDF format (Page: 16-20)
Mobile Infrastructure Investigation for Protected Mobile Payments
Kamal Ahmad, Qazi Ahmad Faraz, Noor Zaman, Shafiullah, Zaheer Aslam and Rashid Zubair
Gandhara University of Sciences, Peshawar, Pakistan
Abstract– Payments through mobiles are a new expedient scheme for customers to carry out transactions, and are envisaged to augment as the amount/number of mobile phone user’s boosts. Devices, like cellular phones and Personal Digital Assistants, to erect or make payments are progressively more common, predominantly in Europe and Asia. (MP) Mobile payment can be described as any sort of payment transaction that engrosses a mobile device. There is spacious assortment of options available to execute mobile payments just because of the accessibility or availability of network technologies. The main objective of this paper to investigate the mobile infrastructure just for the sake of secure mobile payments.
Keywords— Mobile Payment, Security, Technology and Protection
Download full paper PDF format (Page: 21-23)
Performance Analysis of Cooperative Networks with Inter-Relay Communication over Nakagami-m and Rician Fading Channels
U. R. Tanoli, R. Abbasi, Q. J. Utmani, I. Khan and S. Jan
University of Engineering and Technology, Mardan Campus, Khyber Pakhtunkhwa, Pakistan
Abstract– Time Division Multiple Access (TDMA) based transmission protocols have been proposed previously by various research communities, however, the analysis of these protocols are not considered for both Nakagami-m and Rician fading channels with inter-relay communication. We present a detailed and profound analysis of TDMA based protocols for cooperative networks with inter-relay communication over both Nakagami-m and Rician fading channels considering path loss effect. The Gain of the network over various locations of the relays is also presented. Bit error rate (BER) and Cooperation Gain are the parameters used to analyze the network.
Keywords—TDMA, Cooperative Networks, Rician Fading, Nakagami-m and Network Protocols
Download full paper PDF format (Page: 24-29)
Systematic Design of a Horse Surgical Table
Mohsen shakeri
Ferdowsi University of Mashhad, Mashhad, Iran
Abstract– Surgery on a large animal like a horse, which is very heavy (500-800 Kg) and cannot be placed easily on an ordinary table, requires the specially designed surgical table. In this study, the systematic design of a horse surgical table is described. The long term objective of the project is to resolve challenges in performing operation on heavy weight animal like a horse. The distinguishing feature of the described design procedure is the use of a structured design approach, which forces the designer to systematically review and compare alternative solution options, thus preventing the selection of solutions based on prejudice or belief. The result of the design is a horse surgical table with a main frame, the lifting mechanism, hydraulic system, the height-adjustable platform and the auxiliary surface boards for resting the horse’s legs, back, neck and head.
Keywords—Systematic Design, Surgical Table, Horse and Hydraulic System
Download full paper PDF format (Page: 30-33)
Reusable Open Source Software Component’s Life Cycle Management
Muhammad Farhan, Adeel Ahmed, Muhammad Ramzan, Syed Raza Bashir, Muhammad Munwar Iqbal and Amjad Farooq
Department of Computer Science and Engineering, University of Engineering and Technology, Lahore, Pakistan
Abstract– Software reusability is significant technique for improving quality, well-timed and cost-effective software development. Optimal usage of reusability ensures benefits in terms of human efforts, budget and time for good quality software development. Reusability of source code in terms of components also gives advantages to moderate the risk related with software development and its success. Because of unavoidable return, reusability has developed as the most established practice for the software development. However techniques and methods for reusability controlling are not properly managed. So necessity to formalize and straight procedure of reusability for getting its genuine paybacks in terms of efforts, time and cost savings are not much given attention so this paper presents the good and proper way to handle and manage the reusable components so that properly components can be used and record which are good in terms of compatibility so that other issues can be resolved as well. Structured and formal method is obligatory in reusability practices due to reusability classification, extraction, observation and deployment approaches are not well organized.
Keywords— Open Source Software, Reusable Components, Life Cycle Management and Software Engineering Trends
Download full paper PDF format (Page: 34-37)
Analysis and Overview of Enterprise Resource Planning (ERP)
Dr. Saleh Mohammed Al-Saleem, Junaid Qayyum, Dr. Djamal Ziani, Abdul Mansoor and Fazal Amin
College of Computer and Information Systems Sciences, king Saud University, Saudia Arabia
Iqra National University, Peshawar, Pakistan
Abstract– What is the best definition for ERP? If we look around so everyone accepts/agrees that ERP stands for “Enterprise Resource Planning”, but actual definition is something else it varies. An ERP System is a specific application that integrates the data of all departments from an organization and often can even include customer or vendor data. Majority ERP consist of Service, Customer Relation Management (CRM), Supply Chain, Human Resource, Manufacturing and Finance. Whereas the ERP definition can change between Organizations, but the goal is always to integrate all of the pieces of multifarious organization. This paper is an overview/analysis of enterprise resource planning.
Keywords—Analysis, ERP, CRM, Application and Results
Download full paper PDF format (Page: 38-44)
Data Maintenance Using Reservation Routine in Allocated Domains
Afshin Shaabany and Fatemeh Jamshidi
Department of Electrical Engineering, Marvdasht Branch, Islamic Azad University, Marvdasht, Iran
Abstract– In This paper the results of suggested algorithm for reservation routine are investigated. Swift reply time and preciseness are significant factors in the prosperity of any database. In large databases especially in allocated database, reservation reply time plays a significant role as convenient access to data and it is the fundamental necessity of prosperity commerce application. A data storing uses compound realize observe to without waste procedure a given set of reservation. The procedure of coming into existence of all observes is not possible because of the space restriction and maintenance cost restriction. Realize observe choice is one of the decisive determination in designing a data storing for optimal efficiency. Choosing an appropriate set of observe that diminish the total cost collaborated with the realize observe is the key component in data storing. Realize observe are found practical for fast reservation routine. In allocated domains where database is allocated over the nodes on which reservation should get executed and plays a significant role. This paper also suggests node choice method for fast realizes observe choice in allocated domains. It is found that the suggested method performs well as contrasted to other realizes observe choice plans.
Keywords—Data Storing, Reservation Cost, Storage Cost and Observe Maintenance
Download full paper PDF format (Page: 45-49)
A Survey of Security Weakness of Session Initiation Protocol (SIP)
Ihsan Ilahi Jan, Prof. Adeel, Shahzad Rizwan, Waseem Khan, Junaid Khan, Qazi Ahmad Faraz, Fayyaz Gul, Rashid Zubair, Abdul-Sattar, Usman and Shahzad Hameed
Gandhara University of Sciences, Peshawar, Pakistan
Abstract– SIP stands for session initiation protocol and it is a signaling protocol bring into play for scheming communication session. For example for video calls and voice calls on internet protocol and because of the open/unlock organization the Internet and the exercise of open/unlock standards such as Session Initiation Protocol embody the stipulation of services similar to file relocation, incidence information, instant messaging are unprotected to recognized Internet thumps and assaults and at the comparable position commencing fresh safety measures troubles found on such standards cannot been fit into place in with nearby security/defense methods…..
Keywords—Survey, Security, SIP and Issues
Download full paper PDF format (Page: 50-53)
Relay Based Cooperative Spectrum Sensing in Cognitive Radio Networks over Nakagami Fading Channels
Nagina Zarin, Imran Khan and Sadaqat Jan
University of Engineering and Technology, Mardan Campus, Khyber Pakhtunkhwa, Pakistan
Abstract– In this paper, we address the issue of cooperative spectrum sensing in cognitive radio networks. Here relay stations are introduced in cognitive radio network. In the proposed research, the detection performance of energy detector used for cognitive radio network is evaluated for single relay and multiple relays regimes. The analysis focuses on Nakagami-m fading channels, independent and identically distributed. Probability of detection and probability of false alarm is evaluated/ simulated with and without incorporating the direct path between primary use and cognitive centre.
Keywords— Cognitive Radio Network, Amplify-and-Forward, Relays and Fading Channels
Download full paper PDF format (Page: 54-58)
Security Overview of Mobile Internet Protocol
Zeeshan Hayat, Waqas Ahmad, Farid-ud-Din and Iqtidar Shah
Gandhara University of Sciences, Peshawer, Pakistan
Abstract– The objective of this research paper is to endow with squat information to Mobile IP with impact/importance on the security aspects associated to it. A little scrutiny on Mobile IP introduction is provided, and the remainder of the paper is dedicated to IP authentication header, security tunneling, and Network Security model in campus intranets, sort of attacks and deployment of Mobile IP with security protection.
Keywords— Overview, Security, Protocol and Analysis
Download full paper PDF format (Page: 59-63)