Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information
Journal Article

Handover latency is the primary cause of packet loss resulting in performance degradation of standard Mobile IPv6. Mobile IPv6 with fast Handover enables a Mobile Node (MN) to quickly detect at the IP layer that it has moved to a new subnet by receiving link-related information from the link-layer; furthermore it gathers anticipative information about the new Access Point (AP) and the associated subnet prefix when the MN is still connected to the previous Corresponding Node (CN).

This paper proposes an enhancement to Fast Mobile IPv6 handover (FMIPv6), based on link layer information, we also present performance evaluations in terms of the packet loss and handover latency using evaluation models.

Mohammed Alnaas, (06-2010), Elsevier: Elsevier, 6 (83), 1644-1650

Static Recrystallization in Nb/Ti low Carbon Micro alloyed Steel
Conference paper

Activation energy for static recrystallization estimated in this work of 281kJ/mol is in excellent agreement with previously reported data (both experimental and mdeled) and indicates that difusion of Nb in austenite is most probably the rate controlling process

Abdunnaser H. Fadel, (05-2010), Serbia: Association of Metallurgical Engineers of Serbia (AMES), 13-18

Network Security for QoS Routing Metrics
Conference paper

Abstract— Data security is an essential requirement, especially when sending information over a network. Network security has three goals called confidentiality, integrity and availability (or Access). Encryption is the most common technique used to achieve this goal. However, the computer society has not yet agreed on a standard method to measure data security. The ultimate goal of this study is to define security metrics based on different aspects of network security, and then demonstrate how these metrics could be used in Quality of Service (QoS) routing to find the most secure path connecting two distant nodes (source and destination) across an internetwork. Three security metrics are proposed in this document, these metrics have been derived from three important issues of network security, namely: authentication, encryption and traffic filtration techniques (firewalls and intrusion detection systems). The metrics follow different composition rules in that the first is binary, the second is either concave or additive and the last is multiplicative. Routing algorithms that make use of such metrics have been implemented in the C# programming language to test the viability of the proposed solution. Computational effort and blocking probability are the most commonly used performance measures were used to assess the behavior and the performance of these routing algorithms. Results obtained show that the algorithms were able to find feasible paths between communicating parties and helped in making reasonable savings in the computational effort needed to find an acceptable path. Consequently, higher blocking probabilities were encountered, which is thus the price to be paid for the savings.  

Ibrahem Ali Mohammed Almerhag, Abduelbaset Mustafa Alia Goweder, (05-2010), The International Islamic University, Kuala Lumpur, Malaysia: Proceedings of ICCCE 2010, 151-157

Using Routing Optimization in next generation network to achieve high QoS",
Conference paper

This paper deals with the routing optimization in IPV6 networks. It's the key processes of traffic engineering and network planning. Routing optimization provides a means to balance the traffic load in the network with the goal to improve the quality of service. The main objective of our routing optimization procedures is the minimization of the end-to-end delay, which is the total time of an individual packet to transfer from source to destination node. By optimized one of router's functions, this function is the packet classification. This work is done modify the packet classification operation in the router architecture by making it based on two tuples (source address and flow label) instead of the regular five tuples to classify the coming packets. Finally, to test and compare the performance of our algorithm, we used the network simulator NS-2,version 2.29. The simulation results indicate that the proposed algorithm indeed helps to minimize the end-to-end delay as a result of router optimization.

Abobaker Mohamed Abobaker Elhouni, (05-2010), Montreal, QC, Canada: IEEE, 70-75

Influence of Reheating Temperature and Vanadium Content on Transformation Behavior and Mechanical Properties of Medium Carbon Forging Steels
Journal Article

The influence of vanadium and nitrogen on microstructure and mechanical properties of medium-carbon

steels has been studied by means of metallography and mechanical testing. Vanadium addition to the low

nitrogen steel suppresses the formation of ferrite–pearlite following the low reheating temperatures and microstructure

consists of bainitic sheaves. Increasing nitrogen at the same vanadium level promotes the acicular

ferrite formation. For high reheating temperatures, dominantly acicular ferrite structure in both the low

nitrogen and the high nitrogen vanadium steels is obtained. The results suggest that vanadium in solid solution

promotes the formation of bainite. The effect of nitrogen is related to the precipitation of VN particles in

austenite with high potency for intragranular nucleation of acicular ferrite and to the precipitation of V(C, N)

particles in ferrite with high potency for precipitation strengthening. Addition of both vanadium and nitrogen

considerably increases the strength level, while CVN20 impact energy increases on changing the microstructure

from bainitic ferrite to the fine ferrite–pearlite and acicular ferrite.

Abdulnaser Hamza Ahmed Fadel, (04-2010), Japan: ISIJ International, 4 (50), 601-606

موقف ابن باديس من الطرق الصوقية الضالة في الجزائر
مقال في مجلة علمية

كان موقف ابن باديس من الطرق الصوفية الضالة هو التحذير من خطرهم وكشف أخطائهم وما في أعمالهم من شرك وخرافة وبُعد عن صحيح الدين، وكان يحذر من ذلك بقوله: احذر كل دجال يتاجر بالرقى والطلاسم ويتخذ آيات القرآن هزواً.

زريمق مولود زريمق ابوطلاق، (04-2010)، مجلة البحث العلمي في الآداب: جامعة عين شمس، 11 (3)، 359-381

Simply Connectivty of Immediate Bsins of Newton’s Function.
Journal Article

In this paper we want to show that each immediate basin of fixed points of Newton’s

function for a real polynomial is simply connected.

Keywords: Newton’s function, Immediate basin, Simply connected.

omar Ismail omar elhasadi, (03-2010), الاكاديمية الليبية جنزور: Libyan Academy, 8 (4), 28-32

Synthesis and Crystal Structure of Bis-[Co (L)(NCS)(MeOH)] Where (LH= 4-(Salicylaldimine) antipyrine)
Journal Article

The title complex was isolated as red solid material from the reaction of Co(SCN)2 with 4(Salicylaldimine) antipyrine in ethanol. The molecular structure has been determined by elemental analysis, FT IR, UV-Vis and X-ray diffraction. The crystallographic data are: monoclinic

P21/n, a = 9.8335(3) A, b = 18.8593(6) A, c = 11.2921(4) A, = 90', =  = 90', V = 2041.46(12) Å3 and Z 2, R =0.045. The dicobalt (Il) complex is centrosymmetric dimer in which the Co(ll) ions are six coordinate being bonded to three coordinating donor sites from the corresponding tridentate Schiff base ligand and the fourth one is relatively bonded by phenolic oxygen, the fifth and sixth donor sites comes from isothiocyanate and methanol.

A. Eldewik, El-Mehdawja R. M, KreddanC K. M, El-Hamrunr S. H, Hend ben HussienC, Hitchcokd P. B, Shabasha A. A, (03-2010), Jordan Journal of Chemistry Mol: JJC, 5 (12), 157-164

Design and fabrication of an automatic window cleaning robot
Journal Article

The rapid growth of advanced robots has given researchers unprecedented opportunities to explore and discover new fields of research where robots can be used to assist humans in their daily life. There are many applications that use robots and automation in different aspects of life such as industry, medical, domestic machines and etc. In this paper, the work has been devoted for the use of robotics and robots in cleaning process. The window cleaning robot is one of the robots that have emerged in recent decay. This robot can be used in homes, offices and large buildings. The main target is to design a robot that can clean glass windows efficiently and rapidly even in dangerous and hazardous places. The robot will be controlled using the Programmable Logic Controller PLC. The motion will generated by three servo motors.

O. Jomah, (02-2010), Stevens Point Wisconsin United States: World Scientific and Engineering Academy and Society (WSEAS), 10 (1), 208-212

Influence of V and N on Transformation Behavior and Mechanical Properties of Medium Carbon Forging Steels
Journal Article

The influence of vanadium and nitrogen on microstructure and mechanical properties of

medium-carbon steels has been studied by means of metallography and mechanical testing.

Vanadium addition to the low nitrogen steel suppresses the formation of ferrite-pearlite following

the low reheating temperatures and microstructure consists of bainitic sheaves. Increasing nitrogen

at the same vanadium level promotes the acicular ferrite formation. For high reheating temperatures,

dominantly acicular ferrite structure in both the low nitrogen and the high nitrogen vanadium steels

is obtained. The results suggest that vanadium in solid solution promotes the formation of bainite,

whereas the effect of nitrogen is related to the precipitation of VN particles in austenite with high

potency for intragranular nucleation of acicular ferrite and to the precipitation of V(C,N) particles in

ferrite with high potency for precipitation strengthening. Addition of both vanadium and nitrogen

considerably increases the strength level, while CVN20 impact energy increases on changing the

microstructure from bainitic ferrite to the fine ferrite-pearlite and acicular ferrite.

Abdulnaser Hamza Ahmed Fadel, (01-2010), Switzerland: Materials Science Forum, 1 (638), 3459-3464