Volume-7 Issue-1


Version
Download 15
Total Views 203
Stock
File Size 4.00 KB
File Type unknown
Create Date August 27, 2017
Last Updated October 16, 2017
Download

 Download Abstract Book

S. No

Volume-7 Issue-1, September 2017, ISSN:  2278-3075 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.

Page No.

1.

Authors:

Asibor, Raphael E., Asibor Victor O.

Paper Title:

Analytical Study of Transient Magneto- Hydrodynamic Electroosomotic Flow and Heat Transfer Analysis in a Horizontal Channel

Abstract: The research work focuses on transient magneto-hydrodynamic electro-osmotic flow and heat transfer analysis in a horizontal microchannel based on the linearized Helmholtz-Smoluchowski approximation and the Navier-Stokes equation. A numerical study of electroosmotic flow through horizontal channels is developed. The governing partial differential equations are transformed into a set of nonlinear coupled ordinary differential equations and solved by perturbation techniques. The effects of various physical parameters on the dimensionless velocity, temperature and concentration profiles are presented graphically, analysed and discussed in detail. The influences of fluid characteristics such as the skin friction coefficient, Nusselt and Sherwood numbers are discussed. Findings indicate that the governing flow parameters have significant influences on flow, heat and mass transfer characteristics.

Keywords:
Analytical study, electro-osmotic flow, Magneto-hydrodynamic, Microfluidics, Transient.

References:

1.       Burgreen, D. and Nakache, F. R. (1964). Electrokinetic flow in ultrafine capillary slits. Journal of Physical Chemistry, 68: 1084-1091.
2.       Chakraborty, S. (2007). Electro-osmotically driven capillary transport of typical non-Newtonian biofluids in rectangular microchannels. Analytica Chimica Acta, 605: 175-184.
3.       Chakraborty, S. (2005). Dynamics of capillary flow of blood into a microfluidic channel. Lab on a Chip - Miniaturisation for Chemistry and Biology, 5: 421-430.Chamkha
4.       Chamkha, A. J. (2004). “UsteadyUnsteady MHD convective heat and mass transfer past a semi infinite vertical permeable moving plate with heat absorption”, Int. J. Engg. Sci., 42:, pp. 217-230. DOI: 10.1016/s0020-7225(03)00285-4.
5.       DDas, S., and Chakraborty, S (2006). Analytical solutions for velocity, temperature and concentration distribution in electro-osmotic microchannel flows of a non-Newtonian bio-fluid. Analytica Chimica Acta, 559: 15-24.
6.       Debye, P. and Hückel, E. (1923). The theory of electrolytes. I. Lowering of freezing point and related phenomena. Physikalische Zeitschrift, 24: 185–206.
7.       Dhinakaran, S.,, Afonso, A. M.  Alves, Alves, M. A. and , Pinho, F. T. (2010). Steady viscoelastic  fluid flow between parallel plates under electro-osmotic forces: Journal of Colloid and Interface Science, 344: 513–520.
8.       Huang, W., Bhullar, R. S. and Yuan-cheng, F. (2001). The surface-tension-driven flow of blood from a droplet into a capillary tube. Journal of Biomechanical Engineering, 123: 446-454.
9.       Ibrahim, S. Y. and Makinde, O. D. (2011). Chemically Reacting Magneto-hydrodynamics (MHD) Boundary Layer Flow of Heat and Mass Transfer past a Low-Heat-Resistant Sheet Moving Vertically Downwards. Scientific Research and Essays, 6(22): 4762-4775.10.    Ibrahim, S. Y. and Makinde, O. D.  (2010). Chemically Reacting MHD Boundary Layer flow of Heat and Mass Transfer over a Moving Vertical Plate with Suction. Scientific Research and Essays. 5(19): 2875-2882.
11.    Makinde, O. D. and Chinyoka, T.  (2010). MHD transient flows and heat transfer of dusty fluid in a channel with variable physical properties and Navier slip condition, Computers and Mathematics with Applications, 60:  660 – 669.
12.    Okedoye, A. M. and Asibor, R. E. (2014). Effects of Variable Viscosity on magneto-hydrodynamic flow near a stagnation point in the presence of heat generation/absorption. J of NAMP, 27: 171 - 178
13.    Okoro, F. M. and Asibor, R. E. (2016). Unsteady magneto-hydrodynamic electro-osmotic fluid flow and heat transfer analysis in a horizontal channel.  Journal of the Nigerian Association of Mathematical Physics, 38: 99 – 108
14.    PProbstein, R. F. (2003). Physicochemical Hydrodynamics: An Introduction, Second edition, Wiley Interscience, Hoboken, New Jersey, USA.
15.    RReuss, F. F. (1809)., Sur un nouvel effet de l’´electricit´e glavanique M´emoires de la Societ´e Imperiale des Naturalistes de Moscou, 2: pp. 327– 337.
16.    RRice, C. L. and Whitehead, R. (1965)., Electrokinetic flow in a narrow cylindrical capillary. Journal of Physical Chemistry, 69: 4017–402.
17.    Smoluchowski (1903). Contribution a la theorie de l'endosmose electrique et de quelques phenomenes correlatifs. Bulletin International de l'Academie des Sciences de Cracovie, 182-200.
18.    Smoluchowski, V.  M. (1921). Handbuch der Elektrizitat under Magnetismus II, 2: 366-428.
19.    Söderman O, Jönsson B (1996) Electro-osmosis: Velocity profiles in different geometries with Tanner, R.I. (2000). Engineering Rheology. Oxford University Press, New York.
20.    Whitesides, G. M. (2006). The origins and the future of microfluidics. Nature, 442: 368-373.
21.    Zimmerman, W., , Rees, J. and , Craven, T. (2006). Rheometry of non-Newtonian electrokinetic  flow in a microchannel T-junction. Microfluidics and Nanofluidics, 2: 481-492.

1-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Nguyen Ngoc Van

Paper Title:

Optimal Relay Selection for Cooperative Cellular Networks

Abstract:  User cooperation for wireless networks can provide spatial diversity and combat the impact of fading effect of wireless channels in a network wherein each node possesses only a single antenna. In cooperation communication, relay selection is an important issue. In this paper we propose a relay selection scheme with fairness in the context of cooperative cellular networks with a single base station and many subscribers in each cell, wherein each subscriber has the ability to relay information for each other. The proposed scheme maximizes the total capacity while achieving approximate rate proportionality. The complexity of the algorithm is much lower versus an iterative algorithm. Simulation results show that the proposed scheme outperform the existing scheme in terms of system capacity and outage probability while achieving proportionality fairness among user data rates.

Keywords:
 Cooperation; cooperative cellular networks; relay selection.


References:

1.       Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity–Part I: System description,” IEEE Trans. Commun., vol. 51, no. 11, pp. 1927–1938, November 2003.
2.       T. E. Hunter and A. Nosratinia, “Diversity through coded cooperation,”  IEEE Trans. Wireless Commun., vol. 5, no. 2, pp. 283-289, February 2006.
3.       T. E. Hunter and A. Nosratinia,, “Outage analysis of coded cooperation,” IEEE Trans. Inform.Theory, vol. 52, no. 2, pp. 375–391, February 2006.
4.       Hsiao Feng Lu, “Optimal Distributed Codes for Feedback-Aidced Cooperative Relay Networks”, IEEE Transaction on information Theory, Vol62, No 7, P4198-4211, July 2016.
5.       J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, pp. 3062 – 3080, December 2004.
6.       J. N. Laneman and G. W. Wornell, “Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks,” IEEE Transactions on Information Theory, vol. 49, pp. 2415 – 2425, October 2003.
7.       Bletsas, A. Khisti, D. Reed, and A. Lippman, “A simple cooperative diversity method based on network path selection,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 3, pp. 659–672, March 2006.
8.       Zhang Huan, Hongjiang Lei, Imran Shafique Ansari, Gaofeng Pan, Khalia A Qaraqe, “ Security performance analysis of DF Cooperative relay networks over Nakagami-m fading channels”, KSII Transactions on Internet and Information systems, Vol 11, No 5, P.2416-2432, 2017.
9.       Y. Zhao, R. Adve, and T. Lim, “Improving amplify-and-forward relay networks: optimal power allocation versus selection,” IEEE Transactions on Wireless Communications, vol. 6, no. 8, pp. 3114–3123, August 2007.
10.    Chin Liang Wang, Jyun Yu Chen, Power allocation and relay selection for AF Cooperative relay systems with imperfect channel”, IEEE Transactions on Vehicular Technology, Vol 65, No 9. P.7809-7813, Sep 2016.
11.    E. Beres and R. Adve, “Selection cooperation in multi-source cooperative networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 1, pp. 118–127, January 2008.
12.    R. Hu, S. Sfar, G. Charlton, and A. Reznik, “Protocols and system capacity of relay-enhanced hsdpa systems,” in Proceedings of the 2008 Annual Conference on Information Sciences and Systems (CISS), March 2008.
13.    Nosratinia and T. E. Hunter, “Grouping and partner selection in cooperative wireless networks,” IEEE J. Sel. Areas Commun., vol. 25, pp. 369-378, February 2007.
14.    T. C-Y. Ng, and W. Yu, “Joint optimization of relay strategies and resource allocations in cooperative cellular networks,” IEEE J. Sel. Areas Commun., vol. 25, pp. 328-339,
February 2007.
15.    C. Wong, Z. Shen, B. L. Evans, and J. G. Andrews, “A low complexity algorithm for proportional resource allocation in OFDMA systems,” in Proceedings of the IEEE Workshop on Signal Processing Systems Design and Implementation, pp. 1–6, Austin, Tex, USA, October 2004.
16.    Nguyen Ngoc Van, Fuqiang Liu, Ping Wang and Jiang Wang, “Reuse Partitioning in Cellular Network with Two-Hop Fixed MIMO-OFDMA Relay Nodes”, Proceedings of The 7th International Conference on Wireless Communication, Networking and Mobile Computing (Wicom2011), pp.268-272, September 23-25, 2011. Wuhan, China.17.    Nguyen Ngoc Van, Fuqiang Liu, and Ping Wang, “Radio Frequency Allocation in Cellular Network with Two-Hop Fixed MIMO-Orthogonal Frequency Division Multiplex Access Relay Stations”, Sensor Letters, Vol. 10, 1690–1697, 2012.
18.    Ping Wang, Lei Ding, Huifang Pang, Fuqiang Liu, Nguyen Ngoc Van, “Zero Forcing Beamforming based Coordinated Scheduling Algorithm for Downlink CoordinatedMulti-Point Transmission System”, IEICE TRANSACTIONS on Communications Vol.EB98-B, No.2, Feb,2015, pp.352-359.
19.    Lina Fan, Jinkuan Wang, Jing Gao, Lammei Lu, “Optimal power allocation for cooperative relay system”, ICIC Express Letters, Vol 10, No 2, p.391-396. Feb.2016.
20.    Yinshan Liu, Xiaofeng Zhong, Jing Wang, “Optimal relay selection strategies in heterogeneous cooperative relay networks”, 2016 23th International Conference on Telecommunications (ICT). Proceedings 2016.
21.    Z. Lin and E. Erkip, “Relay search algorithms for coded cooperative systems,” in Proceedings of Global Telecommunications Conference, 2005. GLOBECOM. '05. IEEE vol.3, pp. 6-10, December 2005.

10-14

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

 Phan Thi Ha, Ha Hai Nam, Đo Xuan Cho

Paper Title:

 Exploiting the Syntax-Annotated Corpus for Analysing Vietnamese Syntax

Abstract: This paper presents an algorithm for automatic extraction of the PCFG (probability context free grammar) from Viettreebank and an algorithm for constructing the Vietnamese parser based on the PCFG for Vietnamese sentence analysis. The parsing algorithm for each sentence is developed from the jurafsky and martin algorithm [5]. Applied to the Vietnamese language, an input sentence is labeled by an available part-of-speech(POS) tagging tool, while for Jurafsky and Martin , the input sentences is unlabeled POS of which words are separated by white space.

Keywords: CFG, PCFG, CYK, PCYK, Treebank, Probability Context Free Grammar, parser

REFERENCES

  1. Nguyễn Phương Thái và các cộng sự, Báo cáo kết quả sản phẩm SP 7.3- Kho ngữ liệu tiếng Việt có chú giải, Quyển 1, 2009, KC01/01, Dự án VLSP,2009.14
  2. Nguyễn Quốc Thể, Lê Thanh Hương, Phân tích cú pháp tiếng Việt sử dụng văn phạm phi ngữ cảnh từ vựng hóa kết hợp xác suất, FAIR conference, Nha Trang, Việt Nam, 2007.
  3. Uỷ ban khoa học xã hội Việt Nam, Ngữ pháp tiếng Việt, NXB Khoa học Xã hội, Hànội, 1993.
  4. Chomsky, N. Three models for the description of language. IRI Transactions on Information Theory, 2(3), 113-124. 1956.
  5. Jurafsky, J. H Martin, Introduction to natural
  6. language processing, computational linguistics and speech recognition, Prentice Hall, Second Edition, 2009.
  7. Nguyen P.T., Xuan L. V., Nguyen T. M. H., Nguyen V. H., Le H. P., Building a largesyntactically-annotated corpus of Vietnamese. In Proceedings of the 3rd Linguistic AnnotationWorkshop,ACL-IJCNLP, Singapore. 2009.
  8. Phuong Le-Hong, Azim Roussanaly, Thi Minh Huyen Nguyen, Mathias Rossignol, An empirical study of maximum entropy approach for part-of-speech tagging of Vietnamese texts, TALN 2010, Montréal, 19–23 juillet 2010.
  9. http://staff.science.uva.nl/~rvalenti/projects/lsp/PCFGReport.pdf.126

15-18

http://blueeyesintelligence.org/2checkout_download.html

4.

Authors:

 Uriri Omena, Asibor Raphael, Izebizuwa Rose  

Paper Title:

 Social Engineering Threats and Pertinent Safekeeping Techniques

Abstract: The Information and Communication Technology (ICT) security in a socio-technical world was explored and focus made in particular on the susceptibility to social engineering attacks, Social engineering is the most commonly used tactic across all levels of adversaries to gain unauthorized access into a network. While many organizations attempt to implement a policy and technical capabilities to mitigate against this threat, network intrusions through social engineering attacks are often still highly successful. A proven way to assess an organization’s risk to these threats is to test the effectiveness of existing technical and organizational protections, starting with the security awareness of personnel. Most social engineering takes place via email, text message and phone. However, tactics can include simply walking in the front door behind someone possessing a valid badge, or dropping portable USB drives in the parking lot and waiting for an unsuspecting employee to plug them into their work computer. Whatever form social engineering takes, businesses and organizations are largely unprepared for how to effectively counter these attempts across their workforces. Getting employees’ attention and commitment to vigilance can be difficult without proving how easy those employees can be exploited. This paper explores this social engineering attack; analyze counter measures against the attack and makes recommendations on how it can be mitigated.

Keywords: Social engineering, threats, security procedures, intrusion and attacks.

REFERENCES

  1. Defense, T. U., Awareness, S., & Company, Y. (n.d.). InfoSec Reading Room The Ultimate Defense of Depth : Security Awareness In tu ll r ights.
  2. Ghari, W. (2012). Cyber Threats In Social Networking Websites. International Journal of Distributed and Parallel Systems, 3(1), 119–126. http://doi.org/10.5121/ijdps.2012.3109
  3. Greitzer, F. L., Strozer, J. R., Cohen, S., Moore, A. P., Mundie, D., & Cowley, J. (2014). Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. 2014 IEEE Security and Privacy Workshops, 236–250. http://doi.org/10.1109/SPW.2014.39
  4. Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. The Art of Human Hacking, 408. http://doi.org/10.1093/cid/cir583
  5. Model, A. (2013). Social Engineering in Social Networking Sites : bhttp://doi.org/10.1109/SCC.2014.108
  6. Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. Available at: http://www.ieeesecurity. org/TC/SPW2014/papers/5103a236.P

19-24

http://blueeyesintelligence.org/2checkout_download.html