The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With wireless communications increasingly becoming popular and convergent, service providers have to continuously upgrade their networks in order to support the increasing demand for bandwidth. However, given that wireless communication systems operate on radiofrequency waves, the health effects of electromagnetic (EM) emission from these systems are increasingly becoming a concern due to the ubiquity...
Communication has always been a fundamental need of human beings and human society. The technical problem of communication over long distances seemed to be solved by public availability of fixed line telephony. But obviously, the enormous personal traffic requests, the networking with large peer groups in private and business life and the close interworking of our globalized economies have taken the...
The exponential increase of user data often requires planning and design of a data communication system and the operation and management of such a system. The latter issues are discussed in the next several chapters and this chapter mainly deals with planning and design of a wireless network. Network design and planning consists of three steps: network topology design, network synthesis and network...
Changing topology and missing infrastructure makes conventional routing schemes useless. To overcome the communication problem, routing protocols ranging from contact-oblivious to contact-based have been tried for intermittently connected networks. These schemes vary highly in complexity and performance however they share the issue of non-scalability.
Carbon Nano-Tube Field Effect Transistors (CNFETs) offer promising solutions beyond conventional CMOS FETs. CNFETs have higher current drive capability, ballistic transport, lesser power delay product and higher thermal stability. The delay evaluation in CNFETs may not be trivial due to additional CNFET specific parameters, such as number of tubes, pitch (spacing between the tubes) and the diameter...
Nanofluids are prepared for use in high voltage engineering as insulating and heat transfer fluids, containing a small amount of nanoparticles. The term “nanofluid” was presented by Choi et al. at Argonne National Laboratory. Recently, nanofluids are being considered as next generation insulating and heat transfer liquids in due to their improved characteristics. Transformer oil-based nanofluids are...
Two types of colloidal dielectric fluids with 20% concentration of nanoparticles are manufactured by dispersing SiO2 nanoparticle with transformer oil by different preparation methods in order to improve the dielectric properties of mineral oil. The AC breakdown voltage of pure oil and prepared nanofluids were measured according to IEC standard methods at 20ppm. The AC breakdown voltages of two nanofluids...
Pakistan is facing worst energy crises of its time. The total available hydro power capacity is around 6500MW out of overall capacity of around 22500MW; potential contributors of hydro power capacity are three projects Tarbela, Mangla and Ghazi Barotha. The output of the hydro plants is subject to availability of water (optimum level) in the dams, which can fall to as low as 2,500MW with substantial...
The energy sector has been actively looking into cyber risk assessment at a global level, as it has a ripple effect; risk taken at one step in supply chain has an impact on all the other nodes. Cyber-attacks not only hinder functional operations in an organization but also waves damaging effects to the reputation and confidence among shareholders resulting in financial losses. Organizations that are...
Software Architecture (SA) plays a critical role in developing and evolving cloud-based applications. We present a Reference Architecture (RA) for designing Cloud-based Tools as a service work SPACE (TSPACE) - a platform for provisioning chain of tools following the Software as a Service (SaaS) model. The TSPACE RA has been designed by leveraging well-known design principles and patterns and has been...
In this paper, we investigate the optimal inter-frequency small cell discovery (ISCD) periodicity for small cells deployed on carrier frequency other than that of the serving macro cell. We consider that the small cells and user terminals (UTs) positions are modelled according to a homogeneous Poisson Point Process (PPP). We utilize polynomial curve fitting to approximate the percentage of time the...
In this article, we present a Cloud empowered Cognitive Inter-Cell Interference Coordination (C2-ICIC) scheme for small cellular networks. The scheme leverages a recently proposed cloud radio access network (C-RAN) architecture for enabling intratier coordination and relaxes the need for inter-tier coordination by adopting the phantom cell architecture. Employing tools from stochastic geometry, we...
A test setup and measurement methodology is presented for characterization of direct THz detectors to be used in imaging application. An active imaging setup is employed whereby the detector is illuminated by a dedicated continuous wave THz source and detector response is measured using a lock-in amplifier. The THz detector is accompanied by an on-chip antenna for the reception of THz waves and its...
Conceptual design is an important skill in Software Engineering. Teaching conceptual design that can deliver a useful product is challenging, particularly when access to real users is limited. This study explores the effects of the use of Holistic Personas (i.e. a persona enriched with personality traits) on students' performance in creating conceptual designs. Our results indicate that the students...
An Ultrasonography (USG) feature extraction and classification system has been developed for detecting and analyzing organ structure in fetal body. This study aims to detect and measure features of fetus from scanned image of fetal head (biparietal diameter) and femur length. We propose Haar-like feature is used to extract feature from cropping image object, meanwhile AdaBoost classifier is used for...
PESOS has established itself as a forum that brings together software engineering researchers and practitioners working in the areas of service-oriented systems to discuss research challenges, new developments and applications, as well as methods, techniques, experiences, and tools to support engineering, evolution and adaptation of service-oriented systems. The technical advances and growing adoption...
A multiuser system where signals are simultaneously transmitted within the same bandwidth helps in achieving higher capacity. However, such a system is quite vulnerable to co-channel interference, due to presence of multiple users in the system. Signal detection becomes highly challenging when number of transmit antennas exceeds the number of receive antennas,thereby creating an over-loaded wireless...
Cloud computing is an emerging trend for online computing and resource management. OpenStack is one of the most widely used open source platform for establishing public and private clouds. Besides its implementation issues much of the importance is being given on its performance optimization. This paper focuses on such a study to improve performance of an OpenStack Cloud and its further optimization...
Establishing trust in cloud system is a complex and challenging problem. In cloud computing trust establishment has to be both identity and properties based due to its dynamic nature, complexity of infrastructure, automated services, application interdependencies, and diversity of stakeholders. Trust in cloud depends mainly upon two factors. One is the operational trust which deals with the operations...
Software testing has ever remained a challenge particularly when testing is done with intention in enhancing the reliability. Conventional testing is increasing the testing in an unpredictable way by reducing the number of faults. There is a need to enhance the reliability by assigning probabilistic priorities to testing mechanism, which is done through software operational profile. This study adopts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.