|Title: Closed-Loop Derivation and Evaluation of Joint Carrier Synchronization and Channel Equalization Algorithm for OFDM Systems|
|Author(s): Chih-Feng Wu, Muh-Tian Shiue|
|Pages: 1-6||Paper ID:160602-7474-IJECS-IJENS||Published: April, 2016|
Abstract: This paper emphasizes how to establish the signal flow graph (SFG) of joint carrier synchronization and channel equalization algorithm for OFDM baseband inner receiver using the multirate digital phase-locked loop (DPLL) and the fictitious sampler techniques. Therefore, the closed-loop transfer function (TF) can be easily derived and further applied to examine the stability and the performance of OFDM baseband receiver.
|Keywords: Orthogonal frequency division multiplexing (OFDM), carrier frequency offset (CFO), digital phase-locked loop (DPLL).|
|Full Text (.pdf) | 697 KB|
|Title: Anatomy of Routing and Routing Loops with the IP Backbone|
|Author(s): Meshal Alnasheet, Abdulrahman Al-kandari|
|Pages: 7-12||Paper ID:161402-8383-IJECS-IJENS||Published: April, 2016|
Abstract: This paper discussed what is routing, how it works, and how routing function protocols. What will be discussed are the types of protocols and their main characteristics. Then the conflicts of the routing state and how it occurs will be examined, given that such conflicts cause problems for routing loops. Some of protocols that solve this issue will also be elucidate. The discussion in this paper covers only routing, routing protocols, and routing loops within an IP backbone. Also, this paper discussed the causes routing loops in the IP backbone and how can be minimized.
|Keywords: Routing, Routing Protocol, Distance vector Protocols, Link state Protocols, Routing Loops.|
|Full Text (.pdf) | 304 KB|
|Title: Experimental and Numerical Comparison between Fixed and Double Axial Photovoltaic Tracking System|
|Author(s): A. S. Abdelmonem, H. A. Refaey, R. I. Afify, and O. E. Abdellatif|
|Pages: 13-18||Paper ID:161002-8989-IJECS-IJENS||Published: April, 2016|
Abstract: The electrical performance of any photovoltaic solar cell is described by its current – voltage characteristic curve. Therefore, to improve the photovoltaic performance, a tracking of the sun is used. Thus, the present study represents a comparison between numerical model and experimental results of a fixed and double axial photovoltaic tracking system. The numerical simulations have been carried out correspond to the experimental setup. Therefore, the same dimensions, as well as operating conditions, apply to it, by using both Matlab and Comsol Multiphysics program version 4.2. Besides that, an experimental work is presented depending on the results conjured from the theoretical experience used in COMSOL Multiphysics. The paper reported the electrical performance (I-V characteristics curves, output power and electrical efficiency) of the photovoltaic cell with fixed and double axial tracking. The numerical results revealed that, for fixed PV system the efficiency of the PV modules is increased for both fixed and double axial tracking by about 12.5% and 14 % respectively. In addition, the double axial Sun tracking system module causing an increase in tracking module daily output power up to 23 % compared to that for a fixed module.
|Keywords: Component: Photovoltaic systems; Tracking systems; COMSOL Multiphysics; MATLAB ; Solid work.|
|Full Text (.pdf) | 813 KB|
|Title: An Empirical Study of Pentesting IOS 9 Applications|
|Author(s): Sinan Ameen Noman, Haitham Ameen Noman|
|Pages: 19-24||Paper ID:165202-9494-IJECS-IJENS||Published: April, 2016|
Abstract: The mobile has been changed since Apple has released their first iPhone in 2007. Mobile applications have become more powerful than ever, this evolution has created a sufficient range of attacks that can be used on apps and grab a credential data from users who starts making activities on their mobile devices while on the go instead of using it on their own computers. This paper sheds the light on pentesting tools and techniques that can be conducted on iOS applications on a physical iDevice running iOS 9 rather than an emulator.
|Keywords: Pentesting Tools, Pentesting Techniques, iOS 9.|
|Full Text (.pdf) | 781 KB|
|Title: Automated FPGA Power Characterization Methodology|
|Author(s): Dalia A. El-Dib, Yousra Alkabani, Magdy El-Moursy, and Heba A. Shawkey|
|Pages: 25-32||Paper ID:165702-8484-IJECS-IJENS||Published: April, 2016|
Abstract: Power characterization methodology for Field Programmable Gate Arrays (FPGAs) is described. The methodology includes putting an FPGA through a pre-determined set of measurements upon which a few calculations are needed to reach real leakage power and average dynamic power consumption of all FPGA units. Look Up Tables (LUTs), wires, and Flip Flops (FFs) are included in the presented methodology. The characterized power can be used to estimate the total power consumption of any design based on its total FPGA usage at a very early stage of the design. Since the characterized power is determined using direct measurements, these are claimed to represent a more accurate measure than those obtained by currently available simulation tools which give power values up to ten times higher than actual measured ones.
|Full Text (.pdf) | 722 KB|