Tamer R. Omar, Van-Tao Chau, Marco Antonio Gallardo, Daniel R. Lopez, Alex Xavier Pazmino
The objective of this paper is to design and implement a lawnmower robot that can be used to mow grass from lawns and playgrounds remotely, online, or autonomously. The robot follows a rectangle zigzag trajectory through the lawn without any human interference. A set of concurrently running behaviors are defined to perform mowing operation. Sonar ranging is used to detect and avoid obstacles continuously throughout the route. The micro-controller connects to an ethernet board and uploads the robot's functions to a web server. Through the web server, users can monitor a 3D model of the moving rover and data from the lawnmower sensors. In addition, the robot's behaviors and connections are uploaded to IoT analytics platform to aid the performance evaluation and feature development.
{"title":"Autonomous Rover for Groundwork Lawn Mowing","authors":"Tamer R. Omar, Van-Tao Chau, Marco Antonio Gallardo, Daniel R. Lopez, Alex Xavier Pazmino","doi":"10.4018/ijitn.309704","DOIUrl":"https://doi.org/10.4018/ijitn.309704","url":null,"abstract":"The objective of this paper is to design and implement a lawnmower robot that can be used to mow grass from lawns and playgrounds remotely, online, or autonomously. The robot follows a rectangle zigzag trajectory through the lawn without any human interference. A set of concurrently running behaviors are defined to perform mowing operation. Sonar ranging is used to detect and avoid obstacles continuously throughout the route. The micro-controller connects to an ethernet board and uploads the robot's functions to a web server. Through the web server, users can monitor a 3D model of the moving rover and data from the lawnmower sensors. In addition, the robot's behaviors and connections are uploaded to IoT analytics platform to aid the performance evaluation and feature development.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48974263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The 5G physical layer has evolved rapidly. With transmissions at 28, 38, and 72 GHz, millimeter (MM) wave communications are at the core of it. Such links provide improved data rates to an increased number of users availing around 20 GHz of free spectrum. Directional arrays in multiple-input multiple-output (MIMO) setups facilitate beamsteered transmissions. Maximal ratio combining (MRC) receivers aid MM wave signaling and link metrics are analyzed in terms of antenna correlations. The system model is evaluated assuming a short range, non-line-of-sight (NLOS) MM wave user under independently correlated, Rayleigh conditions. This paper showcases analytical closed form expressions for received signal, output signal- to-noise ratio (SNR), line-of-sight (LOS), probability density function (PDF), and NLOS average capacity of the proposed MM wave link. The derivations exhibit capacity alterations with transceiver correlations. MM wave correlation matrices have unique dependency on steering vectors or corresponding transmission angles. This does not apply to millimeter wave.
{"title":"Minimally Equicorrelated MIMO Modelling for NLOS MM Wave Performance Improvement","authors":"Sabyasachi Bhattacharyya, G. Aruna","doi":"10.4018/ijitn.309695","DOIUrl":"https://doi.org/10.4018/ijitn.309695","url":null,"abstract":"The 5G physical layer has evolved rapidly. With transmissions at 28, 38, and 72 GHz, millimeter (MM) wave communications are at the core of it. Such links provide improved data rates to an increased number of users availing around 20 GHz of free spectrum. Directional arrays in multiple-input multiple-output (MIMO) setups facilitate beamsteered transmissions. Maximal ratio combining (MRC) receivers aid MM wave signaling and link metrics are analyzed in terms of antenna correlations. The system model is evaluated assuming a short range, non-line-of-sight (NLOS) MM wave user under independently correlated, Rayleigh conditions. This paper showcases analytical closed form expressions for received signal, output signal- to-noise ratio (SNR), line-of-sight (LOS), probability density function (PDF), and NLOS average capacity of the proposed MM wave link. The derivations exhibit capacity alterations with transceiver correlations. MM wave correlation matrices have unique dependency on steering vectors or corresponding transmission angles. This does not apply to millimeter wave.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47652853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Nuha, Endro Ariyanto, Priyagung Yogitama, Ryan Wicaksono
Multipath transmission control protocol (MPTCP) has been proposed for devices with multiple network interfaces. This idea seems to be impossible for user implementation at the beginning of its proposal. However, the emergence of smartphones with multiple network access allows this idea to be implemented. This paper provides both theoretical and empirical throughput analysis of MPTCP under long term evolution (LTE) and Wi-Fi networks. First, a new modified congestion control is presented as an enhancement of standard TCP Reno using logarithmic function. Second, the existing MPTCP approaches like linked increase algorithm (LIA) and balanced LIA (BALIA) are discussed briefly. Finally, the experimental results under long term evolution (LTE) and Wi-Fi under software defined wireless networking (SDWN) are given along with the analysis. The experimental result shows that the proposed congestion control achieves higher average congestion window size. The BALIA MPTCP is shown to have higher throughput than that of the LIA MPTCP.
{"title":"Modified Multipath Transmission Control Protocol Using Logarithmic Increase Under Long-Term Evolution and Wi-Fi Networks","authors":"H. Nuha, Endro Ariyanto, Priyagung Yogitama, Ryan Wicaksono","doi":"10.4018/ijitn.311828","DOIUrl":"https://doi.org/10.4018/ijitn.311828","url":null,"abstract":"Multipath transmission control protocol (MPTCP) has been proposed for devices with multiple network interfaces. This idea seems to be impossible for user implementation at the beginning of its proposal. However, the emergence of smartphones with multiple network access allows this idea to be implemented. This paper provides both theoretical and empirical throughput analysis of MPTCP under long term evolution (LTE) and Wi-Fi networks. First, a new modified congestion control is presented as an enhancement of standard TCP Reno using logarithmic function. Second, the existing MPTCP approaches like linked increase algorithm (LIA) and balanced LIA (BALIA) are discussed briefly. Finally, the experimental results under long term evolution (LTE) and Wi-Fi under software defined wireless networking (SDWN) are given along with the analysis. The experimental result shows that the proposed congestion control achieves higher average congestion window size. The BALIA MPTCP is shown to have higher throughput than that of the LIA MPTCP.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41550530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper argues that the process adopted to design 5G was not fully successful, with few of the design goals being met, and with more limited deployment and lower consumer enthusiasm than previous generations. This was because of undue influence from manufacturers and politicians and insufficient input from mobile operators and users. Hence, it is appropriate to question whether a different approach should be adopted to deliver 6G. The question is timely; within a year or two the approach towards 6G and its key targets will become increasingly hard to change.
{"title":"Designing a 6G System That Users Want","authors":"W. Webb","doi":"10.4018/ijitn.309702","DOIUrl":"https://doi.org/10.4018/ijitn.309702","url":null,"abstract":"This paper argues that the process adopted to design 5G was not fully successful, with few of the design goals being met, and with more limited deployment and lower consumer enthusiasm than previous generations. This was because of undue influence from manufacturers and politicians and insufficient input from mobile operators and users. Hence, it is appropriate to question whether a different approach should be adopted to deliver 6G. The question is timely; within a year or two the approach towards 6G and its key targets will become increasingly hard to change.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49520136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes an algorithm to change the concept of rendezvous points (RPs), which have been commonly used in mobile sink routing problem of wireless sensor networks (WSNs) to rendezvous areas (RAs) and to generate RAs by using geographic information system (GIS) tools. With the traditional RPs, a mobile sink must have visited the points, and possible deviations from the points would cause the mobile sink difficulty finding exact locations to collect data. However, with suggested RAs, the mobile sink is capable of receiving data from sensor nodes in an RA by visiting any points within the RA. It also reduces the traveling distance of the mobile sink, thereby prolonging its lifetime. With appropriate extensions with GIS tools, the algorithm can generate 3D RAs, which can be simulated in more realistic environments.
{"title":"Introduction of a Method Using GIS to Generate Rendezvous Areas for Mobile Sinks in WSNs","authors":"Adrien Chardon Fabian, Min Kyung An","doi":"10.4018/ijitn.309705","DOIUrl":"https://doi.org/10.4018/ijitn.309705","url":null,"abstract":"This paper proposes an algorithm to change the concept of rendezvous points (RPs), which have been commonly used in mobile sink routing problem of wireless sensor networks (WSNs) to rendezvous areas (RAs) and to generate RAs by using geographic information system (GIS) tools. With the traditional RPs, a mobile sink must have visited the points, and possible deviations from the points would cause the mobile sink difficulty finding exact locations to collect data. However, with suggested RAs, the mobile sink is capable of receiving data from sensor nodes in an RA by visiting any points within the RA. It also reduces the traveling distance of the mobile sink, thereby prolonging its lifetime. With appropriate extensions with GIS tools, the algorithm can generate 3D RAs, which can be simulated in more realistic environments.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70460091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-30DOI: 10.21608/ijt.2021.266289
Ahmed H. Eltengy, H. Zied
: In recent years, there has been a significant increase in the use of location-based solutions. As a result, data encryption has become increasingly important in order to ensure privacy and confidentiality, especially in all domains, military and civil alike. This paper presents an application that will be used in both military and civilian situations, encrypting data on the location and movements of military personnel or civilian prospec-tors within a specific area using transmitting and receiving circuits controlled by a micro-controller programmed with the proposed encryption algorithm. The application will be used in both military and civilian settings. Depending on the task at hand or the nature of the immediate surroundings, the proposed application has been introduced, installed, and used in a variety of ways. The proposed technology has been tested in a variety of situa-tions and has produced excellent results in all of them. The suggested application is confi-dential, authenticated, and simple to use, according to the results of frequency, speed, and security testing; this has been demonstrated by the results of these tests.
{"title":"Using CryptoBin Encryption Algorithm in Military Applications","authors":"Ahmed H. Eltengy, H. Zied","doi":"10.21608/ijt.2021.266289","DOIUrl":"https://doi.org/10.21608/ijt.2021.266289","url":null,"abstract":": In recent years, there has been a significant increase in the use of location-based solutions. As a result, data encryption has become increasingly important in order to ensure privacy and confidentiality, especially in all domains, military and civil alike. This paper presents an application that will be used in both military and civilian situations, encrypting data on the location and movements of military personnel or civilian prospec-tors within a specific area using transmitting and receiving circuits controlled by a micro-controller programmed with the proposed encryption algorithm. The application will be used in both military and civilian settings. Depending on the task at hand or the nature of the immediate surroundings, the proposed application has been introduced, installed, and used in a variety of ways. The proposed technology has been tested in a variety of situa-tions and has produced excellent results in all of them. The suggested application is confi-dential, authenticated, and simple to use, according to the results of frequency, speed, and security testing; this has been demonstrated by the results of these tests.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76977004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-29DOI: 10.21608/ijt.2021.266225
E. Hagras, A. Zein El-Din
: In this paper, a new cascaded multi modular chaotic logistic map (CMM-CLM) is proposed. The bifurcation diagram for the proposed CMM-CLM is very complex and it has strong chaos properties. The strong chaos leads to a very high Lyapunov exponent values. Based on the proposed CMM-CLM, a new robust physical layer security for the interleaved NOMA based on the multilayers concept (ML-I-NOMA) with the iterative de-coder has been introduced. The analysis of the proposed ML-I-NOMA cryptosystem is studied in the both encrypted and non-encrypted image transmission. The main contribu-tion of this paper is to prove that, the different layer effect has a slight performance change compared with the bandwidth consumption. Finally, the simulation results clarified that, the proposed MLI-NOMA achieves 50% and 75% bandwidth efficiency at 2 and 4 layers with an excellent visual quality metric in the correct detection. In addition, the security analysis reveals that, the proposed ML-I-NOMA cryptosystem has large key space and good key sensitivity, and its entropy approaches to the idea value. Hence, the proposed ML-I-NOMA cryptosystem based on the CMM-CLM can strongly resist traditional cipher attacks.
{"title":"Physical Layer Security Based on Cascaded Multi-Modular Chaotic Logistic Map for ML-I-NOMA Image Transmission","authors":"E. Hagras, A. Zein El-Din","doi":"10.21608/ijt.2021.266225","DOIUrl":"https://doi.org/10.21608/ijt.2021.266225","url":null,"abstract":": In this paper, a new cascaded multi modular chaotic logistic map (CMM-CLM) is proposed. The bifurcation diagram for the proposed CMM-CLM is very complex and it has strong chaos properties. The strong chaos leads to a very high Lyapunov exponent values. Based on the proposed CMM-CLM, a new robust physical layer security for the interleaved NOMA based on the multilayers concept (ML-I-NOMA) with the iterative de-coder has been introduced. The analysis of the proposed ML-I-NOMA cryptosystem is studied in the both encrypted and non-encrypted image transmission. The main contribu-tion of this paper is to prove that, the different layer effect has a slight performance change compared with the bandwidth consumption. Finally, the simulation results clarified that, the proposed MLI-NOMA achieves 50% and 75% bandwidth efficiency at 2 and 4 layers with an excellent visual quality metric in the correct detection. In addition, the security analysis reveals that, the proposed ML-I-NOMA cryptosystem has large key space and good key sensitivity, and its entropy approaches to the idea value. Hence, the proposed ML-I-NOMA cryptosystem based on the CMM-CLM can strongly resist traditional cipher attacks.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78276132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-26DOI: 10.21608/ijt.2021.266282
H. Fiyad, Wael A. Mokhtar, Ehab Ali
: This paper presents a novel current control technique to control a separately excited DC motor in order to emulate the Wind Energy Conversion System (WECS) experimentally. This system is utilized to simulate the dynamic behaviors of WECS accu-rately in extension to a wide range of operating conditions. The suggested system is carried out in the laboratory using a set of separately excited DC motor, permeant magnet synchronous generator, Half-controlled rectifier bridge, firing circuit of the DC motor half-controlled rectifier bridge, current sensor, voltage sensor, speed sensor and a controller. Nonlinear model of WECS is derived and studied in addition to the operation of WECS at maximum mechanical power. DC motor current, voltage and speed are sensed using a set of predesigned sensors in order to feedback the system and record results. Experimental test results of the suggested wind energy conversion system are listed in static and dynamic cases to investigate the effectiveness for applying the suggested control technique to the developed system.
{"title":"DC Motor Emulation of Wind Energy Conversion System","authors":"H. Fiyad, Wael A. Mokhtar, Ehab Ali","doi":"10.21608/ijt.2021.266282","DOIUrl":"https://doi.org/10.21608/ijt.2021.266282","url":null,"abstract":": This paper presents a novel current control technique to control a separately excited DC motor in order to emulate the Wind Energy Conversion System (WECS) experimentally. This system is utilized to simulate the dynamic behaviors of WECS accu-rately in extension to a wide range of operating conditions. The suggested system is carried out in the laboratory using a set of separately excited DC motor, permeant magnet synchronous generator, Half-controlled rectifier bridge, firing circuit of the DC motor half-controlled rectifier bridge, current sensor, voltage sensor, speed sensor and a controller. Nonlinear model of WECS is derived and studied in addition to the operation of WECS at maximum mechanical power. DC motor current, voltage and speed are sensed using a set of predesigned sensors in order to feedback the system and record results. Experimental test results of the suggested wind energy conversion system are listed in static and dynamic cases to investigate the effectiveness for applying the suggested control technique to the developed system.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87926337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-22DOI: 10.21608/ijt.2021.266277
A. Miligy, Asem Hussein, Hassn Nadir, M. Rizk
: This paper introduces an investigation and implementation of integrated SIW system using Rogger RT/duriod 5880 substrate of ε r = 2.2 , tan δ = 0.0009 and thickness 0.79 mmsimulated using HFSS. The proposed system is an integration of three main microwave devices: SIW divider/combiner taking a shape of wraparound rhombic with two isolated output ports, SIW phase shifter and two arrays of SIW hexagonal diamond of lamda shape slots fractal antenna. The divider operates efficiently in five wide bands [(9.7-11.36)/ (11.84-12.35)] GHz and [(13.5-14.05)/ (14.55-15.46)/ (15.62-16.7)] GHz for X and KU-Band applications respectively. The divider feeds two arrays of SIW fractal array antenna of hexagonal shape; one of them has a phase shifted input using SIW phase shifter. The proposed system is based on SIW technology to meet the requirement of multiple frequency bands for x-band missile guidance, KU-band satellite altimetry and wireless communication system applications. The measurement results have been obtained in laboratory using (R&S ZVB 20 vector network analyzer 10 MHz: 20 GHz) with agreement between about 11 resonance operating frequencies of the radiating antenna for both simulated and measured results. For one watt incident power the obtained antenna parameters were found to be 𝑆 11 = −43 𝑑𝐵 , U=0.72 W/Str., accepted power=0.99 W, radiated power=0.98 W, absolute directivity, D =9.7, absolute gain, G =7.1 and radiation efficiency = 98% at f = 13.7 GHz as the most agreement frequency point between simulation and implementation results.
{"title":"Investigation and Implementation of Integrated SIW System for Hexagonal Diamond of Lamda Shape Slots Fractal Array Antenna for X and KU-Band Applications","authors":"A. Miligy, Asem Hussein, Hassn Nadir, M. Rizk","doi":"10.21608/ijt.2021.266277","DOIUrl":"https://doi.org/10.21608/ijt.2021.266277","url":null,"abstract":": This paper introduces an investigation and implementation of integrated SIW system using Rogger RT/duriod 5880 substrate of ε r = 2.2 , tan δ = 0.0009 and thickness 0.79 mmsimulated using HFSS. The proposed system is an integration of three main microwave devices: SIW divider/combiner taking a shape of wraparound rhombic with two isolated output ports, SIW phase shifter and two arrays of SIW hexagonal diamond of lamda shape slots fractal antenna. The divider operates efficiently in five wide bands [(9.7-11.36)/ (11.84-12.35)] GHz and [(13.5-14.05)/ (14.55-15.46)/ (15.62-16.7)] GHz for X and KU-Band applications respectively. The divider feeds two arrays of SIW fractal array antenna of hexagonal shape; one of them has a phase shifted input using SIW phase shifter. The proposed system is based on SIW technology to meet the requirement of multiple frequency bands for x-band missile guidance, KU-band satellite altimetry and wireless communication system applications. The measurement results have been obtained in laboratory using (R&S ZVB 20 vector network analyzer 10 MHz: 20 GHz) with agreement between about 11 resonance operating frequencies of the radiating antenna for both simulated and measured results. For one watt incident power the obtained antenna parameters were found to be 𝑆 11 = −43 𝑑𝐵 , U=0.72 W/Str., accepted power=0.99 W, radiated power=0.98 W, absolute directivity, D =9.7, absolute gain, G =7.1 and radiation efficiency = 98% at f = 13.7 GHz as the most agreement frequency point between simulation and implementation results.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76134596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-19DOI: 10.21608/ijt.2021.266284
Abdalrahman Adel, A. Almslmany, Mohamed Mabrouk, Mohamed El hadad, Mohamed Alamir, M. Alshershby
: In the past two decades, the important role of high-energy lasers (HEL) has emerged in various civilian and military fields. Therefore, foundations and theories of high-power laser radiation have been developed to serve these applications, including the high-power laser aerosol test chamber. This room simulates different weather conditions in a clear and misty atmosphere. In applications that operate at long range, for example, high-energy laser weapons are used to secure an important area against guided bombs. Changes in climatic conditions are an important and influencing factor in the method of high-energy laser radiation, so atmospheric conditions such as industrial weather had to be simulated in the test room. In this paper the interaction between laser beam and different metals such as stainless steel and aluminum was measured with accurate values of heat capacity (HC) at 1.4 JC and melting point (MP) by temperature 600C and 1000C respec-tively reached in the presence of different types of aerosols with real experiments in order to simulate weather conditions in the far field. These experiments were conducted in a High Energy Laser Chamber Test (HELCT) that was previously designed and imple-mented by the authors.
{"title":"Design and Implementation of High-Power Fiber Laser Cham-ber Test Under Different Aerosols Conditions","authors":"Abdalrahman Adel, A. Almslmany, Mohamed Mabrouk, Mohamed El hadad, Mohamed Alamir, M. Alshershby","doi":"10.21608/ijt.2021.266284","DOIUrl":"https://doi.org/10.21608/ijt.2021.266284","url":null,"abstract":": In the past two decades, the important role of high-energy lasers (HEL) has emerged in various civilian and military fields. Therefore, foundations and theories of high-power laser radiation have been developed to serve these applications, including the high-power laser aerosol test chamber. This room simulates different weather conditions in a clear and misty atmosphere. In applications that operate at long range, for example, high-energy laser weapons are used to secure an important area against guided bombs. Changes in climatic conditions are an important and influencing factor in the method of high-energy laser radiation, so atmospheric conditions such as industrial weather had to be simulated in the test room. In this paper the interaction between laser beam and different metals such as stainless steel and aluminum was measured with accurate values of heat capacity (HC) at 1.4 JC and melting point (MP) by temperature 600C and 1000C respec-tively reached in the presence of different types of aerosols with real experiments in order to simulate weather conditions in the far field. These experiments were conducted in a High Energy Laser Chamber Test (HELCT) that was previously designed and imple-mented by the authors.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73102318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}