Volume 5, Issue 6, June 2014
Modeling and Performance Analysis of RoF System for Home Area Network with Different Line Coding Schemes Using Optisystem
Shuvodip Das and Ebad Zahir
EEE, AIUB, Bangladesh
Faculty, AIUB, Bangladesh
Home Area Network (HAN) is deployed and operated within the close vicinity of a home to enable communication and interoperability among digital devices. With the advancement of technology, consumers’ aspiration is to have a stable and high throughput broadband access with lower latency for applications like online gaming, Video on Demand (VoD), video conferencing, Voice over Internet Protocol (VoIP), HD data exchange. Key expectations from broadband accessibility are wireless access and higher data rate. All most all of the wired and wireless HAN access technologies are suffering from problems like immobility, inflexibility, complexity of installation, higher loss and relatively lower data rate. In these circumstances, Radio over Fiber (RoF) offers potential solution for increasing capacity, mobility and reducing cost. This paper proposed and simulated a simple, competent and cost effective RoF system using interferometer. Simulation results from Optisystem 12 have been included to show the comparative performance evaluation of parameters like maximum Q-factor, minimum BER, eye height and threshold with respect to bit rate and fiber length for different line coding schemes. Simulation results show that the proposed system exhibits desired performance with Gaussian line coding scheme. This paper also suggested optimal tradeoff between bit rate and fiber length for the particular system.
— Home Area Network, Radio Over Fiber, Line Coding and Optisystem
Download full paper PDF format (Page: 1-8)
Examining the Relationship between Work Life Balance, Job Stress and Job Satisfaction Among University Teachers (A Case of University of Gujrat)
Komal Saeed and Yasir Aftab Farooqi
National College of Business Administration & Economics (NCBA&E), Pakistan
Department of Management Sciences, University of Gujrat, Pakistan
The main purpose behind conducting the study is to investigates the relationship between work life balance, job stress and job satisfaction among university teaches. The study has been undertaken among teachers of university with reference to city of Gujrat. A sample comprises of 171 teachers has been chosen from Hafiz Hayat Campus of University of Gujrat. Random Sampling method has been used as sampling technique for the study. Questionnaire is the tool used for collecting data for the research. Data has been analyzed through Statistical Package for Social Sciences (SPSS). Descriptive Statistics, Correlation and Regression analysis has been applied to draw the results of the study. The findings of the study indicate that there is insignificant relationship between job stress and job satisfaction which prove H10 hypothesis whereas work life balance share a moderate positive relationship with job satisfaction which are in accordance to hypothesis H2A. Results of the study is helpful for educational institutions as well as teachers to get batter understating about relationship exist between job stress, work life balance and job satisfaction thus contributing toward their performance improvement.
— Job Stress, Job Satisfaction and Work Life Balance
Download full paper PDF format (Page: 9-15)
Using Equations of Energy for Frequencies of Vibration of Two Different Shells
Mohammad Reza Isvandzibaei
Department of Mechanical Engineering, Andimeshk Branch, Islamic Azad University, Andimeshk, Iran
Vibration of two different shells made of a functionally gradient material composed of stainless steel and nickel is presented. The aim this work is to study the natural frequency (Hz) and the effects clamped boundary conditions on the two different shells. The study is carried out using third order theory. The analysis is carried out using kinetic and potential energies. The governing equations of motion of functionally graded cylindrical shells are derived based on two different materials. Results are presented on the natural frequency and clamped boundary conditions.
— Clamped, Kinetic and Potential
Download full paper PDF format (Page: 16-18)
Possible Solutions of Different Security Issues and Challenges in Mobile Ad-Hoc Networks (MANETs)
Anum Aftab and Ayma Aftab
Department of Computer Science and Engineering, UET Lahore, Pakistan
University of the Punjab Lahore, Pakistan
Today, the rising concern for flexible infrastructure services is a call for advanced researches in the emergence of ‘Mobile Ad hoc Network’. It is a key technology that supports various ultramodern applications. Security is the important issue in every network. The security of MANET is important challenge due to its unmonitored deployment nature and its inherent resources limitation. Mobile Ad hoc Network is used in very sensitive fields such as rescue operations, home and enterprise network, education, military and airports. Therefore the addressing of security issues of network is most challenging task. Because of restricted possessions of mobile stations, the MANET security is more difficult to implement as compared to other traditional networks. Today huge research is going on in the field of security. Various techniques are now deployed to resolve the security issues. This paper provides a survey of security issues in this dynamic field such as denial of service attack, active and passive attacks, spoofing, eavesdropping, black hole attack, worm hole attack and rushing attack etc. This paper also presents a comprehensive survey of possible latest solutions available e.g., AODV (Ad hoc on demand distance vector), HMTI, Intrusion detection system, Fellowship etc.
— Issues of MANETs, Recent Solutions of MANETs, Challenges in Mobile Adhoc Networks, Security Issues and Requirement of MANETs
Download full paper PDF format (Page: 19-23)
Deep Learning from Big Relational Data
Natasha Nigar, Sadia Tabasum and Amjad Farooq
Computer Science and Engineering Department, University of Engineering and Technology, Lahore, Pakistan
The growth of the Web has provided us with a vast resource of textual data that is linked both explicitly via hyperlinks as well as implicitly via semantic relations. By exploiting this rich relational structure of the Web, We can merge pieces of information extracted from isolated documents. So far, the research in statistical relational learning has been limited to exploiting only a handful of relation types in the Web such as hyperlinks or specific semantic relation types between named entities. However, recent progress in deep learning methods in the machine learning community such as deep neural networks has shown that by integrating different types of features in a hierarchical structure it is possible to improve the performance in a wide range of machine learning tasks such as sentiment classification or image recognition. In this research, we plan to integrate both implicit and explicit relations that exist in the Web to improve the accuracy in information extraction using deep learning methods. To achieve this goal we must overcome several research challenges such as extracting and representing features related to relations from texts, efficiently pre-training large deep networks, and using distant supervision to obtain large amounts of labeled instances for post-training, We plan to evaluate the performance of the proposed deep learning methods for relation extraction by applying the proposed method in a real-world relational search engine.
— Relational Data, Deep Learning, Isolated Documents and Research Challenges
Download full paper PDF format (Page: 24-30)
Measuring the Efficiency and Usability of Session Password based Authentication Systems
Annum Tasneem, Huma Tauseef, Saima Farhan and Muhammad Abuzar Fahiem
Department of Computer Science, Lahore College for Women University, Lahore, Pakistan
Key factor that can determine the success and failure of a software system is known as the usability attribute. The aim of this research is to highlight the factors that can help in understanding usability for such authentication systems where privacy and security play an important role. For that purpose a comprehensive literature survey has been conducted to evaluate the usability factors included in various well-known usability models. After analyzing the results 10 factors were chosen to form the proposed usability model UMA14 (Usability Model of Authentication 2014).The novelty of the proposed model lies in the fact that it contains the usability criteria for measuring usability factors. Defining the usability criteria helps one understand the usability factors in detail so that there is no ambiguity while comprehending them. Two authentication schemes based on session passwords are developed and the proposed usability model is testing using GNU PSPP.
— Authentication Systems, Usability Factors, Usability Models and Session Passwords
Download full paper PDF format (Page: 31-45)