By-Emitter Emulation of the Degradation of a Calibrated 975 nm Tapered Laser Bar Using a Laser Diode Simulation/Emulation Tool
Christian Kwaku Amuzuvi,
Seth Ofori
Issue:
Volume 1, Issue 3, August 2013
Pages:
55-60
Received:
15 July 2013
Published:
20 August 2013
Abstract: In this paper, Barlase has been taken a step further by emulating the degradation processes in high power semiconductor laser bars to further deepen the understanding of the behaviour of laser bars. In publications elsewhere where Barlase was used, investigations were done using hypothetical laser bars to emulate various degradation processes commonly found in the operations of lasers. In this paper however, the emulation of a real laser bar is being investigated to compare experimental results to the emulated results to establish a correlation between them. The results established show a close matching between the experimental and the emulated results but the levels of change were not similar. The reason for this can be attributed to the thermal properties used in Barlase and that the consideration of a global thermal solver will be necessary to improve upon the mismatch between the experimental and emulated results.
Abstract: In this paper, Barlase has been taken a step further by emulating the degradation processes in high power semiconductor laser bars to further deepen the understanding of the behaviour of laser bars. In publications elsewhere where Barlase was used, investigations were done using hypothetical laser bars to emulate various degradation processes commo...
Show More
Handling MANET Routing Attacks Using Risk Aware Mitigation Mechanism with Distributed Node Control
A. Jaganraj,
A. Yogaraj,
N. Vignesh,
R. V. Anuroop
Issue:
Volume 1, Issue 3, August 2013
Pages:
61-67
Received:
20 July 2013
Published:
20 August 2013
Abstract: Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical attacks, existing solutions typically attempt to isolate malicious nodes based on binary or naıve fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure, and naıve fuzzy responses could lead to uncertainty in countering routing attacks in MANET. In this paper, we propose a risk-aware response mechanism to systematically cope with the identified routing attacks. Our risk-aware approach is based on an extended Dempster-Shafer mathematical theory of evidence introducing a notion of importance factors. In addition, our experiments demonstrate the effectiveness of our approach with the consideration of several performance metrics.
Abstract: Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusion response techniques to mitigate such critical at...
Show More