Search results for: network lifespan
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4770

Search results for: network lifespan

4770 Performance Analysis of Deterministic Stable Election Protocol Using Fuzzy Logic in Wireless Sensor Network

Authors: Sumanpreet Kaur, Harjit Pal Singh, Vikas Khullar

Abstract:

In Wireless Sensor Network (WSN), the sensor containing motes (nodes) incorporate batteries that can lament at some extent. To upgrade the energy utilization, clustering is one of the prototypical approaches for split sensor motes into a number of clusters where one mote (also called as node) proceeds as a Cluster Head (CH). CH selection is one of the optimization techniques for enlarging stability and network lifespan. Deterministic Stable Election Protocol (DSEP) is an effectual clustering protocol that makes use of three kinds of nodes with dissimilar residual energy for CH election. Fuzzy Logic technology is used to expand energy level of DSEP protocol by using fuzzy inference system. This paper presents protocol DSEP using Fuzzy Logic (DSEP-FL) CH by taking into account four linguistic variables such as energy, concentration, centrality and distance to base station. Simulation results show that our proposed method gives more effective results in term of a lifespan of network and stability as compared to the performance of other clustering protocols.

Keywords: DSEP, fuzzy logic, energy model, WSN

Procedia PDF Downloads 182
4769 Comprehensive Lifespan Support for Quality of Life

Authors: Joann Douziech

Abstract:

Individuals with intellectual and developmental disabilities (IDD) possess characteristics that present both challenges and gifts. Individuals with IDD require and are worthy of intentional, strategic, and specialized support throughout their lifespan to ensure optimum quality-of-life outcomes. The current global advocacy movement advancing the rights of individuals with IDD emphasizes a high degree of choice over life decisions. For some individuals, this degree of choice results in a variety of negative health and well-being outcomes. Improving the quality of life outcomes requires the combination of a commitment to the rights of the individual with a responsibility to provide support and choice commensurate with individual capacity. A belief that individuals with IDD are capable of learning and they are worthy of being taught provides the foundation for a holistic model of support throughout their lifespan. This model is based on three pillars of engineering the environment, promoting skill development and maintenance, and staff support. In an ever-changing world, supporting quality of life requires attention to moments, phases, and changes in stages throughout the lifespan. Balancing these complexities with strategic, responsive, and dynamic interventions enhances the quality of life of individuals with ID throughout their lifespan.

Keywords: achieving optimum quality of life, comprehensive support, lifespan approach, philosophy and pedagogy

Procedia PDF Downloads 53
4768 Comparative Analysis of Hybrid and Non-hybrid Cooled 185 KW High-Speed Permanent Magnet Synchronous Machine for Air Suspension Blower

Authors: Usman Abubakar, Xiaoyuan Wang, Sayyed Haleem Shah, Sadiq Ur Rahman, Rabiu Saleh Zakariyya

Abstract:

High-speed Permanent magnet synchronous machine (HSPMSM) uses in different industrial applications like blowers, compressors as a result of its superb performance. Nevertheless, the over-temperature rise of both winding and PM is one of their substantial problem for a high-power HSPMSM, which affects its lifespan and performance. According to the literature, HSPMSM with a Hybrid cooling configuration has a much lower temperature rise than non-hybrid cooling. This paper presents the design 185kW, 26K rpm with two different cooling configurations, i.e., hybrid cooling configuration (forced air and housing spiral water jacket) and non-hybrid (forced air cooling assisted with winding’s potting material and sleeve’s material) to enhance the heat dissipation of winding and PM respectively. Firstly, the machine’s electromagnetic design is conducted by the finite element method to accurately account for machine losses. Then machine’s cooling configurations are introduced, and their effectiveness is validated by lumped parameter thermal network (LPTN). Investigation shows that using potting, sleeve materials to assist non-hybrid cooling configuration makes the machine’s winding and PM temperature closer to hybrid cooling configuration. Therefore, the machine with non-hybrid cooling is prototyped and tested due to its simplicity, lower energy consumption and can still maintain the lifespan and performance of the HSPMSM.

Keywords: airflow network, axial ventilation, high-speed PMSM, thermal network

Procedia PDF Downloads 207
4767 Too Well to Die; Too Ill to Live

Authors: Deepak Jugran

Abstract:

The last century has witnessed rapid scientific growth, and social policies mainly targeted to increase the “life expectancy” of the people. As a result of these developments, the aging as well as ailing population, is increasing by every day. Despite an increase in “life expectancy”, we have not recorded compression in morbidity numbers as the age of onset of the majority of health issues has not increased substantially. In recent years, the prevalence of chronic diseases along with the improved treatment has also resulted in the increase of people living with chronic diseases. The last decade has also focused on social policies to increase the life expectancy in the population; however, in recent decades, social policies and biomedical research are gradually shifting on the potential of increasing healthy life or healthspan. In this article, we review the existing framework of lifespan and healthspan and wish to ignite a discussion among social scientists and public health experts to propose a wholistic framework to balance the trade-offs on social policies for “lifespan” and “healthspan”.

Keywords: lifespan, healthspan, chronic diseases, social policies

Procedia PDF Downloads 85
4766 Adaptive Energy-Aware Routing (AEAR) for Optimized Performance in Resource-Constrained Wireless Sensor Networks

Authors: Innocent Uzougbo Onwuegbuzie

Abstract:

Wireless Sensor Networks (WSNs) are crucial for numerous applications, yet they face significant challenges due to resource constraints such as limited power and memory. Traditional routing algorithms like Dijkstra, Ad hoc On-Demand Distance Vector (AODV), and Bellman-Ford, while effective in path establishment and discovery, are not optimized for the unique demands of WSNs due to their large memory footprint and power consumption. This paper introduces the Adaptive Energy-Aware Routing (AEAR) model, a solution designed to address these limitations. AEAR integrates reactive route discovery, localized decision-making using geographic information, energy-aware metrics, and dynamic adaptation to provide a robust and efficient routing strategy. We present a detailed comparative analysis using a dataset of 50 sensor nodes, evaluating power consumption, memory footprint, and path cost across AEAR, Dijkstra, AODV, and Bellman-Ford algorithms. Our results demonstrate that AEAR significantly reduces power consumption and memory usage while optimizing path weight. This improvement is achieved through adaptive mechanisms that balance energy efficiency and link quality, ensuring prolonged network lifespan and reliable communication. The AEAR model's superior performance underlines its potential as a viable routing solution for energy-constrained WSN environments, paving the way for more sustainable and resilient sensor network deployments.

Keywords: wireless sensor networks (WSNs), adaptive energy-aware routing (AEAR), routing algorithms, energy, efficiency, network lifespan

Procedia PDF Downloads 1
4765 Most Recent Lifespan Estimate for the Itaipu Hydroelectric Power Plant Computed by Using Borland and Miller Method and Mass Balance in Brazil, Paraguay

Authors: Anderson Braga Mendes

Abstract:

Itaipu Hydroelectric Power Plant is settled on the Paraná River, which is a natural boundary between Brazil and Paraguay; thus, the facility is shared by both countries. Itaipu Power Plant is the biggest hydroelectric generator in the world, and provides clean and renewable electrical energy supply for 17% and 76% of Brazil and Paraguay, respectively. The plant started its generation in 1984. It counts on 20 Francis turbines and has installed capacity of 14,000 MWh. Its historic generation record occurred in 2016 (103,098,366 MWh), and since the beginning of its operation until the last day of 2016 the plant has achieved the sum of 2,415,789,823 MWh. The distinct sedimentologic aspects of the drainage area of Itaipu Power Plant, from its stretch upstream (Porto Primavera and Rosana dams) to downstream (Itaipu dam itself), were taken into account in order to best estimate the increase/decrease in the sediment yield by using data from 2001 to 2016. Such data are collected through a network of 14 automatic sedimentometric stations managed by the company itself and operating in an hourly basis, covering an area of around 136,000 km² (92% of the incremental drainage area of the undertaking). Since 1972, a series of lifespan studies for the Itaipu Power Plant have been made, being first assessed by Sir Hans Albert Einstein, at the time of the feasibility studies for the enterprise. From that date onwards, eight further studies were made through the last 44 years aiming to confer more precision upon the estimates based on more updated data sets. From the analysis of each monitoring station, it was clearly noticed strong increase tendencies in the sediment yield through the last 14 years, mainly in the Iguatemi, Ivaí, São Francisco Falso and Carapá Rivers, the latter situated in Paraguay, whereas the others are utterly in Brazilian territory. Five lifespan scenarios considering different sediment yield tendencies were simulated with the aid of the softwares SEDIMENT and DPOSIT, both developed by the author of the present work. Such softwares thoroughly follow the Borland & Miller methodology (empirical method of area-reduction). The soundest scenario out of the five ones under analysis indicated a lifespan foresight of 168 years, being the reservoir only 1.8% silted by the end of 2016, after 32 years of operation. Besides, the mass balance in the reservoir (water inflows minus outflows) between 1986 and 2016 shows that 2% of the whole Itaipu lake is silted nowadays. Owing to the convergence of both results, which were acquired by using different methodologies and independent input data, it is worth concluding that the mathematical modeling is satisfactory and calibrated, thus assigning credibility to this most recent lifespan estimate.

Keywords: Borland and Miller method, hydroelectricity, Itaipu Power Plant, lifespan, mass balance

Procedia PDF Downloads 258
4764 Advanced Concrete Crack Detection Using Light-Weight MobileNetV2 Neural Network

Authors: Li Hui, Riyadh Hindi

Abstract:

Concrete structures frequently suffer from crack formation, a critical issue that can significantly reduce their lifespan by allowing damaging agents to enter. Traditional methods of crack detection depend on manual visual inspections, which heavily relies on the experience and expertise of inspectors using tools. In this study, a more efficient, computer vision-based approach is introduced by using the lightweight MobileNetV2 neural network. A dataset of 40,000 images was used to develop a specialized crack evaluation algorithm. The analysis indicates that MobileNetV2 matches the accuracy of traditional CNN methods but is more efficient due to its smaller size, making it well-suited for mobile device applications. The effectiveness and reliability of this new method were validated through experimental testing, highlighting its potential as an automated solution for crack detection in concrete structures.

Keywords: Concrete crack, computer vision, deep learning, MobileNetV2 neural network

Procedia PDF Downloads 46
4763 Securing Wireless Sensor Network From Rank Attack Using Fast Sensor Data Encryption and Decryption Protocol

Authors: Eden Teshome Hunde

Abstract:

Wireless sensor and actuator networks (WSANs) are of great significance in the realm of industrial automation systems. However, the aspect of security in WSANs has been somewhat overlooked. One particular security concern is the rank attack, where malicious actors actively manipulate the transmission of messages from neighboring nodes. This undermines the entire network's data collection and routing operations, resulting in a significant degradation of network performance. This attack adversely affects crucial metrics such as packet delivery ratio (PDR), latency, and power consumption, ultimately reducing the network's overall lifespan. In order to foster trust among nodes, ensure accurate delivery of data to end users, safeguard shared data in the cloud from security breaches, and prevent rank attacks within the network, it is crucial to protect the network against such malicious activities. This research paper aims to introduce an enhanced version of the Routing Protocol for Low-Power and Lossy Networks (RPL) protocol, specifically tailored to identify and eliminate rank attacks within existing WSANs. The effectiveness of the new protocol will be assessed through experimentation using Zolertia (Z1) sensors in the Cooja network simulator. To minimize network overhead on the sensors' side, the proposed scheme limits cryptographic operations to symmetric key-based mechanisms such as XORing, hash functions, and encryption. These operations will be implemented using a C-compiler and verified through the ModelSIM Altera SE edition 11.0 simulator.

Keywords: ModelSIM Altera SE, RPL, WSANs, Zolertia

Procedia PDF Downloads 17
4762 Cellular Degradation Activity is Activated by Ambient Temperature Reduction in an Annual Fish (Nothobranchius rachovii)

Authors: Cheng-Yen Lu, Chin-Yuan Hsu

Abstract:

Ambient temperature reduction (ATR) can extend the lifespan of an annual fish (Nothobranchius rachovii), but the underlying mechanism is unknown. In this study, the expression, concentration, and activity of cellular-degraded molecules were evaluated in the muscle of N. rachovii reared under high (30 °C), moderate (25 °C), and low (20 °C) ambient temperatures by biochemical techniques. The results showed that (i) the activity of the 20S proteasome, the expression of microtubule-associated protein 1 light chain 3-II (LC3-II), the expression of lysosome-associated membrane protein type 2a (Lamp 2a), and lysosome activity increased with ATR; (ii) the expression of the 70 kD heat shock cognate protein (Hsc 70) decreased with ATR; (iii) the expression of the 20S proteasome, the expression of lysosome-associated membrane protein type 1 (Lamp 1), the expression of molecular target of rapamycin (mTOR), the expression of phosphorylated mTOR (p-mTOR), and the p-mTOR/mTOR ratio did not change with ATR. These findings indicated that ATR activated the activity of proteasome, macroautophagy, and chaperone-mediated autophagy. Taken together these data reveal that ATR likely activates cellular degradation activity to extend the lifespan of N. rachovii.

Keywords: ambient temperature reduction, autophagy, degradation activity, lifespan, proteasome

Procedia PDF Downloads 441
4761 Purple Sweet Potato Anthocyanin Attenuates the Fat-Induced Mortality in Drosophila Melanogaster

Authors: Lijun Wang, Zhen-Yu Chen

Abstract:

A high-fat diet induces the accumulation of lipid hydroperoxides, accelerates the ageing process and causes a greater mortality in Drosophila melanogaster. The purple sweet potato is rich in antioxidant anthocyanin. The present study was to examine if supplementation of purple sweet potato anthocyanin (PSPA) could reduce the mortality of fruit flies fed a high-fat diet. Results showed that the mean lifespan of fruit fly was shortened from 56 to 35 days in a dose-dependent manner when lard in the diet increased from 0% to 20%. PSPA supplementation attenuated partially the lard-induced mortality. The maximum lifespan and 50% survival time were 49 and 27 days for the 10% lard control flies, in contrast, they increased to 57 and 30 days in the PSPA-supplemented fruit flies. PSPA-supplemented diet significantly up-regulated the mRNA of superoxide dismutase, catalase and Rpn11, compared with those in the control lard diet. In addition, PSPA supplementation could restore the climbing ability of fruit flies fed a 10% lard diet. It was concluded that the lifespan-prolonging activity of PSPA was most likely mediated by modulating the genes of SOD, CAT and Rpn11.

Keywords: purple sweet potato, anthocyanin, high-fat diet, oxidative stress

Procedia PDF Downloads 254
4760 Quantification of the Non-Registered Electrical and Electronic Equipment for Domestic Consumption and Enhancing E-Waste Estimation: A Case Study on TVs in Vietnam

Authors: Ha Phuong Tran, Feng Wang, Jo Dewulf, Hai Trung Huynh, Thomas Schaubroeck

Abstract:

The fast increase and complex components have made waste of electrical and electronic equipment (or e-waste) one of the most problematic waste streams worldwide. Precise information on its size on national, regional and global level has therefore been highlighted as prerequisite to obtain a proper management system. However, this is a very challenging task, especially in developing countries where both formal e-waste management system and necessary statistical data for e-waste estimation, i.e. data on the production, sale and trade of electrical and electronic equipment (EEE), are often lacking. Moreover, there is an inflow of non-registered electronic and electric equipment, which ‘invisibly’ enters the EEE domestic market and then is used for domestic consumption. The non-registration/invisibility and (in most of the case) illicit nature of this flow make it difficult or even impossible to be captured in any statistical system. The e-waste generated from it is thus often uncounted in current e-waste estimation based on statistical market data. Therefore, this study focuses on enhancing e-waste estimation in developing countries and proposing a calculation pathway to quantify the magnitude of the non-registered EEE inflow. An advanced Input-Out Analysis model (i.e. the Sale–Stock–Lifespan model) has been integrated in the calculation procedure. In general, Sale-Stock-Lifespan model assists to improve the quality of input data for modeling (i.e. perform data consolidation to create more accurate lifespan profile, model dynamic lifespan to take into account its changes over time), via which the quality of e-waste estimation can be improved. To demonstrate the above objectives, a case study on televisions (TVs) in Vietnam has been employed. The results show that the amount of waste TVs in Vietnam has increased four times since 2000 till now. This upward trend is expected to continue in the future. In 2035, a total of 9.51 million TVs are predicted to be discarded. Moreover, estimation of non-registered TV inflow shows that it might on average contribute about 15% to the total TVs sold on the Vietnamese market during the whole period of 2002 to 2013. To tackle potential uncertainties associated with estimation models and input data, sensitivity analysis has been applied. The results show that both estimations of waste and non-registered inflow depend on two parameters i.e. number of TVs used in household and the lifespan. Particularly, with a 1% increase in the TV in-use rate, the average market share of non-register inflow in the period 2002-2013 increases 0.95%. However, it decreases from 27% to 15% when the constant unadjusted lifespan is replaced by the dynamic adjusted lifespan. The effect of these two parameters on the amount of waste TV generation for each year is more complex and non-linear over time. To conclude, despite of remaining uncertainty, this study is the first attempt to apply the Sale-Stock-Lifespan model to improve the e-waste estimation in developing countries and to quantify the non-registered EEE inflow to domestic consumption. It therefore can be further improved in future with more knowledge and data.

Keywords: e-waste, non-registered electrical and electronic equipment, TVs, Vietnam

Procedia PDF Downloads 233
4759 Family Business Succession through the Eye of the Upper Echelon Theory: A Phenomenological Approach

Authors: Ruswiati Suryasaputra, Linda Salim

Abstract:

This concept paper, initially a proposal for the completion of the degree of Doctor of Philosophy, is seeking to gain more understanding of family business succession in order to extend the average lifespan of family business that has shrunken significantly for the past 20 years. While multitude studies have been done in family business succession, the average lifespan of a family business continues to decline sharply over the past two decades to only 24 years, or 1.5 generations, in 2010, from 50-60 years, equivalent to 3 generations, as recently as 1990. While the qualitative approach of this study will not churn a theoretical framework unique to the family business field, it will bring to the surface important issues during a family business succession process that have been hidden behind the mostly profit-making issues that have been the main highlight of the family business field.

Keywords: family business, succession, nepotism, family studies

Procedia PDF Downloads 524
4758 Intimate Partner Violence and Risk of Obesity among Women

Authors: Fatemeh Abdollahi, Munn-Sann Lye, Jamshid Yazdani Charati, Mehran Zarghami

Abstract:

Both obesity and intimate partner violence (IPV) are growing health threats. This study aimed to assess the prevalence and risk factors of both IPV and obesity and their association. In this cross-sectional study, 530 women aged 16-65 years attending Mazandaran primary health centers were recruited through the stratified random sampling method (2019-2020). Data were collected using the modified World Health Organization Domestic Violence questionnaire, Perceived Stress Scale, and socio-demographic, obstetric, and anthropometric questionnaires. The data were analyzed using descriptive statistics, the chi-square test, and multiple logistic regression. The prevalence of overweight, obesity and psychological, physical, and sexual IPV were 47.6%, 26.7%, 70.4%, 17.9%, and 6.4%, respectively. Increasing women’s educational level and exposure to violence during their lifespan increased the odds of any type of IPV while living in a nuclear family reduced it. In groups of women who were subjected to any type of IPV and only psychological IPV, experiencing violence during the lifespan was significant in predicting obesity. The alarming prevalence of IPV and obesity-overweight in this study points to the need for collaborative socio-political and health intervention. The link between experiencing violence during lifespan and obesity in some subgroups of women highlights the detrimental consequences of chronic violence and the urgent need for effective preventive programs.

Keywords: intimate partner violence, body mass index, obesity, risk factor, women

Procedia PDF Downloads 82
4757 Energy Efficient Clustering with Adaptive Particle Swarm Optimization

Authors: KumarShashvat, ArshpreetKaur, RajeshKumar, Raman Chadha

Abstract:

Wireless sensor networks have principal characteristic of having restricted energy and with limitation that energy of the nodes cannot be replenished. To increase the lifetime in this scenario WSN route for data transmission is opted such that utilization of energy along the selected route is negligible. For this energy efficient network, dandy infrastructure is needed because it impinges the network lifespan. Clustering is a technique in which nodes are grouped into disjoints and non–overlapping sets. In this technique data is collected at the cluster head. In this paper, Adaptive-PSO algorithm is proposed which forms energy aware clusters by minimizing the cost of locating the cluster head. The main concern is of the suitability of the swarms by adjusting the learning parameters of PSO. Particle Swarm Optimization converges quickly at the beginning stage of the search but during the course of time, it becomes stable and may be trapped in local optima. In suggested network model swarms are given the intelligence of the spiders which makes them capable enough to avoid earlier convergence and also help them to escape from the local optima. Comparison analysis with traditional PSO shows that new algorithm considerably enhances the performance where multi-dimensional functions are taken into consideration.

Keywords: Particle Swarm Optimization, adaptive – PSO, comparison between PSO and A-PSO, energy efficient clustering

Procedia PDF Downloads 228
4756 A Study of Different Factors Influencing Youngsters’ Mobile Device Buying Behaviors in Malaysia

Authors: Z. S. Yip, T. K. Tan, C. C. Geh, T. T. Ting

Abstract:

The mobile phone is an indispensable device in today’s daily living. The arising new brands in the market with different specification are targeting at the different population. The most promising market would be the younger generation who are IT savvy. Therefore, it is beneficial to find out their factors of consideration in purchasing a mobile phone. A survey is carried out in Malaysia to discover the current youngster’s mobile phone buying behavior. This study has found that the most influencing factor of consideration is Price, followed by Feature, and Battery Lifespan. Gender and Income have no relationship with certain factors of consideration. It is important to discover the factors of consideration in order to provide industry insight into the current trend of smartphone in Malaysia.

Keywords: buying behavior, smart phone, mobile brand, mobile operating system, specification, battery lifespan

Procedia PDF Downloads 335
4755 Performance Evaluation of Clustered Routing Protocols for Heterogeneous Wireless Sensor Networks

Authors: Awatef Chniguir, Tarek Farah, Zouhair Ben Jemaa, Safya Belguith

Abstract:

Optimal routing allows minimizing energy consumption in wireless sensor networks (WSN). Clustering has proven its effectiveness in organizing WSN by reducing channel contention and packet collision and enhancing network throughput under heavy load. Therefore, nowadays, with the emergence of the Internet of Things, heterogeneity is essential. Stable election protocol (SEP) that has increased the network stability period and lifetime is the first clustering protocol for heterogeneous WSN. SEP and its descendants, namely SEP, Threshold Sensitive SEP (TSEP), Enhanced TSEP (ETSSEP) and Current Energy Allotted TSEP (CEATSEP), were studied. These algorithms’ performance was evaluated based on different metrics, especially first node death (FND), to compare their stability. Simulations were conducted on the MATLAB tool considering two scenarios: The first one demonstrates the fraction variation of advanced nodes by setting the number of total nodes. The second considers the interpretation of the number of nodes while keeping the number of advanced nodes permanent. CEATSEP outperforms its antecedents by increasing stability and, at the same time, keeping a low throughput. It also operates very well in a large-scale network. Consequently, CEATSEP has a useful lifespan and energy efficiency compared to the other routing protocol for heterogeneous WSN.

Keywords: clustering, heterogeneous, stability, scalability, IoT, WSN

Procedia PDF Downloads 113
4754 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 387
4753 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 484
4752 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.

Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost

Procedia PDF Downloads 231
4751 The Effect of Cow Reproductive Traits on Lifetime Productivity and Longevity

Authors: Lāsma Cielava, Daina Jonkus, Līga Paura

Abstract:

The age of first calving (AFC) is one of the most important factors that have a significant impact on cow productivity in different lactations and its whole life. A belated AFC leads to reduced reproductive performance and it is one of the main reasons for reduced longevity. Cows that calved in time period from 2001-2007 and in this time finished at least four lactations were included in the database. Data were obtained from 68841 crossbred Holstein Black and White (HM), crossbred Latvian Brown (LB), and Latvian Brown genetic resources (LBGR) cows. Cows were distributed in four groups depending on age at first calving. The longest lifespan was conducted for LBGR cows, but they were also characterized with lowest lifetime milk yield and life day milk yield. HM breed cows had the shortest lifespan, but in the lifespan of 2862.2 days was obtained in average 37916.4 kg milk accordingly 13.2 kg milk in one life day. HM breed cows were also characterized with longer calving intervals (CI) in first four lactations, but LBGR cows had the shortest CI in the study group. Age at first calving significantly affected the length of CI in different lactations (p<0.05). HM cows that first time calved >30 months old in the fourth lactation had the longest CI in all study groups (421.4 days). The LBGR cows were characterized with the shortest CI, but there was slight increase in second and third lactation. Age at first calving had a significant impact on cows’ age in each calving time. In the analysis, cow group was conducted that cows with age at first calving <24 months or in average 580.5 days at the time of fifth calving were 2156.7 days (5.9 years) old, but cows with age at first calving >30 months (932.6 days) at the time of fifth calving were 2560.9 days (7.3 years) old.

Keywords: age at first calving, calving interval, longevity, milk yield

Procedia PDF Downloads 199
4750 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 431
4749 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 321
4748 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 628
4747 Lifespan Assessment of the Fish Crossing System of Itaipu Power Plant (Brazil/Paraguay) Based on the Reaching of Its Sedimentological Equilibrium Computed by 3D Modeling and Churchill Trapping Efficiency

Authors: Anderson Braga Mendes, Wallington Felipe de Almeida, Cicero Medeiros da Silva

Abstract:

This study aimed to assess the lifespan of the fish transposition system of the Itaipu Power Plant (Brazil/Paraguay) by using 3D hydrodynamic modeling and Churchill trapping effiency in order to identify the sedimentological equilibrium configuration in the main pond of the Piracema Channel, which is part of a 10 km hydraulic circuit that enables fish migration from downstream to upstream (and vice-versa) the Itaipu Dam, overcoming a 120 m water drop. For that, bottom data from 2002 (its opening year) and 2015 were collected and analyzed, besides bed material at 12 stations to the purpose of identifying their granulometric profiles. The Shields and Yalin and Karahan diagrams for initiation of motion of bed material were used to determine the critical bed shear stress for the sedimentological equilibrium state based on the sort of sediment (grain size) to be found at the bottom once the balance is reached. Such granulometry was inferred by analyzing the grosser material (fine and medium sands) which inflows the pond and deposits in its backwater zone, being adopted a range of diameters within the upper and lower limits of that sand stratification. The software Delft 3D was used in an attempt to compute the bed shear stress at every station under analysis. By modifying the input bathymetry of the main pond of the Piracema Channel so as to the computed bed shear stress at each station fell within the intervals of acceptable critical stresses simultaneously, it was possible to foresee the bed configuration of the main pond when the sedimentological equilibrium is reached. Under such condition, 97% of the whole pond capacity will be silted, and a shallow water course with depths ranging from 0.2 m to 1.5 m will be formed; in 2002, depths ranged from 2 m to 10 m. Out of that water path, the new bottom will be practically flat and covered by a layer of water 0.05 m thick. Thus, in the future the main pond of the Piracema Channel will lack its purpose of providing a resting place for migrating fish species, added to the fact that it may become an insurmountable barrier for medium and large sized specimens. Everything considered, it was estimated that its lifespan, from the year of its opening to the moment of the sedimentological equilibrium configuration, will be approximately 95 years–almost half of the computed lifespan of Itaipu Power Plant itself. However, it is worth mentioning that drawbacks concerning the silting in the main pond will start being noticed much earlier than such time interval owing to the reasons previously mentioned.

Keywords: 3D hydrodynamic modeling, Churchill trapping efficiency, fish crossing system, Itaipu power plant, lifespan, sedimentological equilibrium

Procedia PDF Downloads 215
4746 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 432
4745 Effect of Different Temperatures and Cold Storage on Pupaes Apanteles gelechiidivoris Marsh (Hymenoptera: Braconidae) Parasitoid of Tuta absoluta Meyrick (Lepidoptera: Gelechiidae)

Authors: Jessica Morales Perdomo, Daniel Rodriguez Caicedo, Fernando Cantor Rincon

Abstract:

Tuta absoluta known as the tomato leaf miner, is one of the main pests in tomato crops in South America and the main pest in many European countries. Apanteles gelechiidivoris is a parasitoid of third instar Tuta absoluta larvae. Our studies have demonstrated that this parasitoid can cause up to 80% mortality of T. absoluta larvae in the field. We investigated cold storage of A. gelechiidivoris pupae as a method of mass production of this parasitoid. This storage method does not interfere with biological characteristics of the parasitoid. In this study, we evaluated the effect of different temperatures (4, 8 and 12°C) and different time duration (7, 14, 21 or 28 days) of cold storage on biological parameters of A. gelechiidivoris pupae and adults. The biological parameters of the parasitoid evaluated were: adult emergence time, lifespan, parasitism percentage and sex ratio. We found that the adult emergence time was delayed when the parasitoid pupae were stored at 4°C and 8°C. The shortest adult emergence was recorded when pupae were stored for seven days. The lowest adult emergence was found for pupae stored at 4°C and decreased significantly as the days of storage increased. We found high percentages of adult emergence when pupae were stored at 8°C and 12°C for seven days. Adult lifespan decreased with increasing days of cold storage. Adults emerging from pupae stored at 8°C during seven and 14 days showed the longest lifespan (nine days). The lowest parasitism rate was recorded at 4°C at every time point. The highest percentage of parasitism (80%) was found at 8°C during seven days of storage. The treatments had no effect on adults the sex ratio. The results suggest that A. gelechiidivoris pupae can be stored for up to 14 days at 8°C without affecting the efficacy of the parasitoid in the field.

Keywords: biological control, cold storage, massive rearing, quality control

Procedia PDF Downloads 353
4744 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 249
4743 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 418
4742 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 440
4741 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 720