Search results for: node stabilization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 856

Search results for: node stabilization

796 Peat Soil Stabilization by Using Sugarcane Bagasse Ash (SCBA)

Authors: Mohd. Khaidir Abu Talib, Noriyuki Yasufuku, Ryohei Ishikura

Abstract:

It is well recognized that peat can impede the proper hydration of cement because of high organic content, presence of humic acid and less solid particles. That means the large amount of cement is required in order to neutralize the acids or otherwise the process of the peat stabilization remains retarded. Nevertheless, adding a great quantity of cement into the peat is absolutely an unfriendly and uneconomical solution. Sugarcane production is world number one commodities and produced a lot of bagasse. Bagasse is burnt to generate power required for diverse activities in the factory and leave bagasse ash as a waste. Increasing concern of disposal of bagasse residual creates interest to explore the potential application of this material. The objective of this study is to develop alternative binders that are environment friendly and contribute towards sustainable management by utilizing sugarcane bagasse ash (SCBA) in the stabilization of peat soil. Alongside SCBA, Ordinary Portland Cement (OPC), calcium chloride (CaCl2) and silica sand (K7) were used as additives to stabilize the peat that sampled from Hokkaido, Japan. In obtaining the optimal mix design, specimens of stabilized peat were tested in unconfined compression. It was found that stabilized peat comprising 20% and 5% (PCB1-20 and PCB2-5) partial replacement of OPC with SCBA 1 and SCBA 2 attain the maximum unconfined compressive strength (UCS) and discovered greater than untreated soil (P) and UCS of peat-cement (PC) specimen. At the optimal mix design, the UCS of the stabilized peat specimens increased with increasing of curing time, preloading during curing, OPC dosage and K7 dosage. For PCB1-20 mixture, inclusion of a minimum OPC dosage of 300 kg/m3 and K7 dosage of 500 kg/m3 along with curing under 20kPa pressure is recommendable for the peat stabilization to be effective. However for PCB2-5 mixture, it suggested to use more OPC and K7 dosage or alternatively increase the preloading during curing to 40kPa in order to achieve minimum strength target. It can be concluded that SCBA 1 has better quality than SCBA 2 in peat stabilization especially the contribution made by its fine particle size.

Keywords: peat stabilization, sugarcane bagasse ash utilization, partial cement replacement, unconfined strength

Procedia PDF Downloads 537
795 Event Driven Dynamic Clustering and Data Aggregation in Wireless Sensor Network

Authors: Ashok V. Sutagundar, Sunilkumar S. Manvi

Abstract:

Energy, delay and bandwidth are the prime issues of wireless sensor network (WSN). Energy usage optimization and efficient bandwidth utilization are important issues in WSN. Event triggered data aggregation facilitates such optimal tasks for event affected area in WSN. Reliable delivery of the critical information to sink node is also a major challenge of WSN. To tackle these issues, we propose an event driven dynamic clustering and data aggregation scheme for WSN that enhances the life time of the network by minimizing redundant data transmission. The proposed scheme operates as follows: (1) Whenever the event is triggered, event triggered node selects the cluster head. (2) Cluster head gathers data from sensor nodes within the cluster. (3) Cluster head node identifies and classifies the events out of the collected data using Bayesian classifier. (4) Aggregation of data is done using statistical method. (5) Cluster head discovers the paths to the sink node using residual energy, path distance and bandwidth. (6) If the aggregated data is critical, cluster head sends the aggregated data over the multipath for reliable data communication. (7) Otherwise aggregated data is transmitted towards sink node over the single path which is having the more bandwidth and residual energy. The performance of the scheme is validated for various WSN scenarios to evaluate the effectiveness of the proposed approach in terms of aggregation time, cluster formation time and energy consumed for aggregation.

Keywords: wireless sensor network, dynamic clustering, data aggregation, wireless communication

Procedia PDF Downloads 452
794 Performance Comparison of Thread-Based and Event-Based Web Servers

Authors: Aikaterini Kentroti, Theodore H. Kaskalis

Abstract:

Today, web servers are expected to serve thousands of client requests concurrently within stringent response time limits. In this paper, we evaluate experimentally and compare the performance as well as the resource utilization of popular web servers, which differ in their approach to handle concurrency. More specifically, Central Processing Unit (CPU)- and I/O intensive tests were conducted against the thread-based Apache and Go as well as the event-based Nginx and Node.js under increasing concurrent load. The tests involved concurrent users requesting a term of the Fibonacci sequence (the 10th, 20th, 30th) and the content of a table from the database. The results show that Go achieved the best performance in all benchmark tests. For example, Go reached two times higher throughput than Node.js and five times higher than Apache and Nginx in the 20th Fibonacci term test. In addition, Go had the smallest memory footprint and demonstrated the most efficient resource utilization, in terms of CPU usage. Instead, Node.js had by far the largest memory footprint, consuming up to 90% more memory than Nginx and Apache. Regarding the performance of Apache and Nginx, our findings indicate that Hypertext Preprocessor (PHP) becomes a bottleneck when the servers are requested to respond by performing CPU-intensive tasks under increasing concurrent load.

Keywords: apache, Go, Nginx, node.js, web server benchmarking

Procedia PDF Downloads 99
793 Avoiding Packet Drop for Improved through Put in the Multi-Hop Wireless N/W

Authors: Manish Kumar Rajak, Sanjay Gupta

Abstract:

Mobile ad hoc networks (MANETs) are infrastructure less and intercommunicate using single-hop and multi-hop paths. Network based congestion avoidance which involves managing the queues in the network devices is an integral part of any network. QoS: A set of service requirements that are met by the network while transferring a packet stream from a source to a destination. Especially in MANETs, packet loss results in increased overheads. This paper presents a new algorithm to avoid congestion using one or more queue on nodes and corresponding flow rate decided in advance for each node. When any node attains an initial value of queue then it sends this status to its downstream nodes which in turn uses the pre-decided flow rate of packet transfer to its upstream nodes. The flow rate on each node is adjusted according to the status received from its upstream nodes. This proposed algorithm uses the existing infrastructure to inform to other nodes about its current queue status.

Keywords: mesh networks, MANET, packet count, threshold, throughput

Procedia PDF Downloads 476
792 Modelling of Exothermic Reactions during Carbon Fibre Manufacturing and Coupling to Surrounding Airflow

Authors: Musa Akdere, Gunnar Seide, Thomas Gries

Abstract:

Carbon fibres are fibrous materials with a carbon atom amount of more than 90%. They combine excellent mechanicals properties with a very low density. Thus carbon fibre reinforced plastics (CFRP) are very often used in lightweight design and construction. The precursor material is usually polyacrylonitrile (PAN) based and wet-spun. During the production of carbon fibre, the precursor has to be stabilized thermally to withstand the high temperatures of up to 1500 °C which occur during carbonization. Even though carbon fibre has been used since the late 1970s in aerospace application, there is still no general method available to find the optimal production parameters and the trial-and-error approach is most often the only resolution. To have a much better insight into the process the chemical reactions during stabilization have to be analyzed particularly. Therefore, a model of the chemical reactions (cyclization, dehydration, and oxidation) based on the research of Dunham and Edie has been developed. With the presented model, it is possible to perform a complete simulation of the fibre undergoing all zones of stabilization. The fiber bundle is modeled as several circular fibers with a layer of air in-between. Two thermal mechanisms are considered to be the most important: the exothermic reactions inside the fiber and the convective heat transfer between the fiber and the air. The exothermic reactions inside the fibers are modeled as a heat source. Differential scanning calorimetry measurements have been performed to estimate the amount of heat of the reactions. To shorten the required time of a simulation, the number of fibers is decreased by similitude theory. Experiments were conducted to validate the simulation results of the fibre temperature during stabilization. The experiments for the validation were conducted on a pilot scale stabilization oven. To measure the fibre bundle temperature, a new measuring method is developed. The comparison of the results shows that the developed simulation model gives good approximations for the temperature profile of the fibre bundle during the stabilization process.

Keywords: carbon fibre, coupled simulation, exothermic reactions, fibre-air-interface

Procedia PDF Downloads 276
791 Diagnostic Accuracy in the Detection of Cervical Lymph Node Metastases in Head and Neck Squamous Cell Carcinoma Patients: A Comparison of Sonography, CT, PET/CT and MRI

Authors: Di Luo, Maria Buchberger, Anja Pickhard

Abstract:

Objectives: The purpose of this study was to assess and compare the diagnostic accuracy of four common morphological approaches, including sonography, computed tomography (CT), positron emission tomography/computed tomography (PET/CT), and magnetic resonance imaging (MRI) for the evaluation of cervical lymph node metastases in head and neck squamous cell carcinoma (HNSCC) patients. Material and Methods: Included in this retrospective study were 26 patients diagnosed with HNSCC between 2010 and 2011 who all underwent sonography, CT, PET/CT, and MRI imaging before neck dissection. Morphological data were compared to the corresponding histopathological results. Statistical analysis was performed with SPSS statistic software (version 26.0), calculating sensitivity, specificity, positive predictive value (PPV), negative predictive value (NPV), and accuracy for detection of cervical lymph node metastases. Results: The 5-year survival rate of the patient collective was 55.5%.Risk factors for survival included initial primary tumor stage, initial lymph node stage, initial metastasis status, and therapeutic approaches. Cox regression showed initial metastasis status(HR 8.671, 95%CI 1.316-57.123, p=0.025) and therapeutic approaches(HR 6.699, 95%CI 1.746-25.700, p=0.006)to be independent predictive risk factors for survival. Sensitivity was highest for MRI (96% compared to 85% for sonography and 89% for CT and PET/CT). Specificity was comparable with 95 % for CT and 98 % for sonography and PET/CT, but only 68% for MRI. While the MRI showed the least PPV (34%) compared to all other methods (85% for sonography,75% for CT, and 86% for PET/CT), the NPV was comparable in all methods(98-99%). The overall accuracy of cervical lymph node metastases detection was comparable for sonography, CT, and PET/CT with 96%,97%,94%, respectively, while MRI had only 72% accuracy. Conclusion: Since the initial status of metastasis is an independent predictive risk factor for patients’ survival, efficient detection is crucial to plan adequate therapeutic approaches. Sonography, CT, and PET/CT have better diagnostic accuracy than MRI for the evaluation of cervical lymph node metastases in HNSCC patients.

Keywords: cervical lymph node metastases, diagnostic accuracy, head and neck squamous carcinoma, risk factors, survival

Procedia PDF Downloads 134
790 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 73
789 Analytic Hierarchy Process

Authors: Hadia Rafi

Abstract:

To make any decision in any work/task/project it involves many factors that needed to be looked. The analytic Hierarchy process (AHP) is based on the judgments of experts to derive the required results this technique measures the intangibles and then by the help of judgment and software analysis the comparisons are made which shows how much a certain element/unit leads another. AHP includes how an inconsistent judgment should be made consistent and how the judgment should be improved when possible. The Priority scales are obtained by multiplying them with the priority of their parent node and after that they are added.

Keywords: AHP, priority scales, parent node, software analysis

Procedia PDF Downloads 406
788 ZigBee Wireless Sensor Nodes with Hybrid Energy Storage System Based on Li-Ion Battery and Solar Energy Supply

Authors: Chia-Chi Chang, Chuan-Bi Lin, Chia-Min Chan

Abstract:

Most ZigBee sensor networks to date make use of nodes with limited processing, communication, and energy capabilities. Energy consumption is of great importance in wireless sensor applications as their nodes are commonly battery-driven. Once ZigBee nodes are deployed outdoors, limited power may make a sensor network useless before its purpose is complete. At present, there are two strategies for long node and network lifetime. The first strategy is saving energy as much as possible. The energy consumption will be minimized through switching the node from active mode to sleep mode and routing protocol with ultra-low energy consumption. The second strategy is to evaluate the energy consumption of sensor applications as accurately as possible. Erroneous energy model may render a ZigBee sensor network useless before changing batteries. In this paper, we present a ZigBee wireless sensor node with four key modules: a processing and radio unit, an energy harvesting unit, an energy storage unit, and a sensor unit. The processing unit uses CC2530 for controlling the sensor, carrying out routing protocol, and performing wireless communication with other nodes. The harvesting unit uses a 2W solar panel to provide lasting energy for the node. The storage unit consists of a rechargeable 1200 mAh Li-ion battery and a battery charger using a constant-current/constant-voltage algorithm. Our solution to extend node lifetime is implemented. Finally, a long-term sensor network test is used to exhibit the functionality of the solar powered system.

Keywords: ZigBee, Li-ion battery, solar panel, CC2530

Procedia PDF Downloads 376
787 Treatment Performance of Waste Stabilization Ponds: A Look at Physic-Chemical Parameters in Ghana

Authors: Emmanuel Adu-Ofori, Richard Amfo-Otu, Isaac O. A. Hodgson

Abstract:

The study was conducted to determine the treatment performance of waste stabilization ponds in Akosombo. A total of 15 samples were taken for four consecutive months from the inlet, facultative pond and outlet of maturation pond. The samples were preserved and transported to Water Research Institute for laboratory analysis. The wastewater quality parameters analysed to assess the treatment performance were total suspended solids (TSS), biochemical oxygen demand (BOD), chemical oxygen demand (COD), ammonia and phosphate. The results of the laboratory analysis showed that the ponds achieved TSS, BOD and COD removals of about 30, 82 and 75 per cent respectively. Statistically, the BOD (t = 10.27, p = 6.68 x 10-6) and COD (t = 4.23, p = 0.0029) of the raw sewage were significantly different from the total effluent at 95% confidence interval. The ammonia and phosphate removal was as high as 92% and 84% respectively. The quality parameters analysed for the final effluent from the Waste Stabilisation Pond was within the EPA guideline values. The general treatment performances were very good with respect to the parameters studied and does not pose threat to the receiving water body. A further study to examine the bacteriological treatment performance was recommended.

Keywords: waste stabilization pond, wast water, treatment performance, nutrient, Ghana

Procedia PDF Downloads 322
786 Loading and Unloading Scheduling Problem in a Multiple-Multiple Logistics Network: Modelling and Solving

Authors: Yasin Tadayonrad

Abstract:

Most of the supply chain networks have many nodes starting from the suppliers’ side up to the customers’ side that each node sends/receives the raw materials/products from/to the other nodes. One of the major concerns in this kind of supply chain network is finding the best schedule for loading /unloading the shipments through the whole network by which all the constraints in the source and destination nodes are met and all the shipments are delivered on time. One of the main constraints in this problem is loading/unloading capacity in each source/ destination node at each time slot (e.g., per week/day/hour). Because of the different characteristics of different products/groups of products, the capacity of each node might differ based on each group of products. In most supply chain networks (especially in the Fast-moving consumer goods industry), there are different planners/planning teams working separately in different nodes to determine the loading/unloading timeslots in source/destination nodes to send/receive the shipments. In this paper, a mathematical problem has been proposed to find the best timeslots for loading/unloading the shipments minimizing the overall delays subject to respecting the capacity of loading/unloading of each node, the required delivery date of each shipment (considering the lead-times), and working-days of each node. This model was implemented on python and solved using Python-MIP on a sample data set. Finally, the idea of a heuristic algorithm has been proposed as a way of improving the solution method that helps to implement the model on larger data sets in real business cases, including more nodes and shipments.

Keywords: supply chain management, transportation, multiple-multiple network, timeslots management, mathematical modeling, mixed integer programming

Procedia PDF Downloads 92
785 Determination of Neighbor Node in Consideration of the Imaging Range of Cameras in Automatic Human Tracking System

Authors: Kozo Tanigawa, Tappei Yotsumoto, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara

Abstract:

An automatic human tracking system using mobile agent technology is realized because a mobile agent moves in accordance with a migration of a target person. In this paper, we propose a method for determining the neighbor node in consideration of the imaging range of cameras.

Keywords: human tracking, mobile agent, Pan/Tilt/Zoom, neighbor relation

Procedia PDF Downloads 516
784 The Application of the Analytic Basis Function Expansion Triangular-z Nodal Method for Neutron Diffusion Calculation

Authors: Kunpeng Wang, Hongchun, Wu, Liangzhi Cao, Chuanqi Zhao

Abstract:

The distributions of homogeneous neutron flux within a node were expanded into a set of analytic basis functions which satisfy the diffusion equation at any point in a triangular-z node for each energy group, and nodes were coupled with each other with both the zero- and first-order partial neutron current moments across all the interfaces of the triangular prism at the same time. Based this method, a code TABFEN has been developed and applied to solve the neutron diffusion equation in a complicated geometry. In addition, after a series of numerical derivation, one can get the neutron adjoint diffusion equations in matrix form which is the same with the neutron diffusion equation; therefore, it can be solved by TABFEN, and the low-high scan strategy is adopted to improve the efficiency. Four benchmark problems are tested by this method to verify its feasibility, the results show good agreement with the references which demonstrates the efficiency and feasibility of this method.

Keywords: analytic basis function expansion method, arbitrary triangular-z node, adjoint neutron flux, complicated geometry

Procedia PDF Downloads 446
783 Stabilization of Expansive Soils with Polypropylene Fiber

Authors: Ali Sinan Soğancı

Abstract:

Expansive soils are often encountered in many parts of the world, especially in arid and semi-arid fields. Such kind of soils, generally including active clay minerals in low water content, enlarge in volume by absorbing the water through the surface and cause a great harm to the light structures such as channel coating, roads and airports. The expansive soils were encountered on the path of Apa-Hotamış conveyance channel belonging to the State Hydraulic Works in the region of Konya. In the research done in this area, it is predicted that the soil has a swollen nature and the soil should be filled with proper granular equipment by digging the ground to 50-60 cm. In this study, for purpose of helping the other research to be done in the same area, it is thought that instead of replacing swollen soil with the granular soil, by stabilizing it with polypropylene fiber and using it its original place decreases effect of swelling percent, in this way the cost will be decreased. Therefore, a laboratory tests were conducted to study the effects of polypropylene fiber on swelling characteristics of expansive soil. Test results indicated that inclusion of fiber reduced swell percent of expansive soil. As the fiber content increased, the unconfined compressive strength was increased. Finally, it can be say that stabilization of expansive soils with polypropylene fiber is an effective method.

Keywords: expansive soils, polypropylene fiber, stabilization, swelling percent

Procedia PDF Downloads 474
782 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 164
781 The Effect of Polypropylene Fiber in the Stabilization of Expansive Soils

Authors: Ali Sinan Soğancı

Abstract:

Expansive soils are often encountered in many parts of the world, especially in arid and semi-arid fields. Such kind of soils, generally including active clay minerals in low water content, enlarge in volume by absorbing the water through the surface and cause a great harm to the light structures such as channel coating, roads and airports. The expansive soils were encountered on the path of Apa-Hotamış conveyance channel belonging to the State Hydraulic Works in the region of Konya. In the research done in this area, it is predicted that the soil has a swollen nature and the soil should be filled with proper granular equipment by digging the ground to 50-60 cm. In this study, for purpose of helping the other research to be done in the same area, it is thought that instead of replacing swollen soil with the granular soil, by stabilizing it with polypropylene fiber and using it its original place decreases effect of swelling percent, in this way the cost will be decreased. Therefore, a laboratory tests were conducted to study the effects of polypropylene fiber on swelling characteristics of expansive soil. Test results indicated that inclusion of fiber reduced swell percent of expansive soil. As the fiber content increased, the unconfined compressive strength was increased. Finally, it can be say that stabilization of expansive soils with polypropylene fiber is an effective method.

Keywords: expansive soils, polypropylene fiber, stabilization, swelling percent

Procedia PDF Downloads 519
780 Stabilization of Soil Organic Carbon within Silt+Clay Fraction in Shrub-Encroached Rangeland Shallow Soil at the University of Limpopo Syferkuil Experimental Farm

Authors: Millicent N. Khumalo, Phesheya E. Dlamini

Abstract:

Shrub-encroachment leads to a gain or loss of soil organic carbon (SOC) in previously open rangelands. The stabilization mechanisms controlling the storage of soil organic carbon (SOC) within aggregates of shrub-encroached grassland soils are poorly understood, especially in shallow plinthic soils. In this study, physical fractionation of surface soils (0- 10 cm) collected from open and shrub-encroached grasslands was conducted to determine the distribution of SOC within macro-and- microaggregates. Soil aggregates were classified into four fractions by a wet-sieving procedure, namely >2000 (large macro-aggregates), 212-2000 (small macro-aggregates), 50-212 (microaggregates) and < 50µm (silt+clay). In both shrub-encroached and open grassland soils, SOC was greater in the silt+clay fraction. In this fraction, SOC was on average 133% greater in shrub-encroached compared to open grassland. The greater SOC within the silt+clay fraction is due to the greater surface area and thus more exchange sites for carbon absorption. This implies that the SOC physically protected within the silt+clay is stored long-term.

Keywords: aggregate fractions, shrub-encroachment, soil organic carbon, stabilization

Procedia PDF Downloads 138
779 Image Distortion Correction Method of 2-MHz Side Scan Sonar for Underwater Structure Inspection

Authors: Youngseok Kim, Chul Park, Jonghwa Yi, Sangsik Choi

Abstract:

The 2-MHz Side Scan SONAR (SSS) attached to the boat for inspection of underwater structures is affected by shaking. It is difficult to determine the exact scale of damage of structure. In this study, a motion sensor is attached to the inside of the 2-MHz SSS to get roll, pitch, and yaw direction data, and developed the image stabilization tool to correct the sonar image. We checked that reliable data can be obtained with an average error rate of 1.99% between the measured value and the actual distance through experiment. It is possible to get the accurate sonar data to inspect damage in underwater structure.

Keywords: image stabilization, motion sensor, safety inspection, sonar image, underwater structure

Procedia PDF Downloads 280
778 An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle

Authors: Zhou Luchen, Wu Yubing, Burra Venkata Durga Kumar

Abstract:

As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm.

Keywords: k-means, resource allocation, SDN, UAV network, unmanned aerial vehicles

Procedia PDF Downloads 112
777 Morphological Variation of the Mesenteric Lymph Node in Dromedary Camels: The Impact of Rearing Systems

Authors: Khenenou Tarek, Mohamed Amine Fares, Djallal Eddine Rahmoun

Abstract:

The study intends to evaluate the morphological changes in the mesenteric lymph nodes of dromedaries in different rearing systems. we aimed to evaluate the adaptative behavior of the animal’s immune system with environmental variations, and to conduct a comparative analysis on the morphological features of the mesenteric lymph node of the one-humped camel (Camelus dromedarius) in the region of El Oued, with two different rearing systems, with different practices and different purposes. The study was conducted using histo-morphometric techniques to analyze the morphological features of the mesenteric lymph node of the one-humped camel (Camelus dromedarius) in the region of El Oued. Two groups of dromedaries were used in the study, one group raised in a free-roaming housing system and another group raised in a restricted-roaming housing system. The results revealed that there were significant differences between the two groups in terms of active follicle ratio and size and also the cellular population of functional zones. Animals living and roaming outside the farm barriers were more exposed to pathogens, which leads to the installation of an adaptative process, whereas the animals living under restricted-roaming housing system were not exposed to pathogens. This study indicated that the adaptative behavior of the animal’s immune system with environmental variations is the functional translation of morphological changes. The obtained findings revealed that the morphological features of the mesenteric lymph node of the one-humped camel (Camelus dromedarius) in the region of El Oued are directly linked to the rearing system practices

Keywords: adaptative behavior, dromedary, lymph node, morphology, rearing systems

Procedia PDF Downloads 26
776 Stabilization of Lateritic Soil Sample from Ijoko with Cement Kiln Dust and Lime

Authors: Akinbuluma Ayodeji Theophilus, Adewale Olutaiwo

Abstract:

When building roads and paved surfaces, a strong foundation is always essential. A durable material that can withstand years of traffic while staying trustworthy must be used to build the foundation. A frequent problem in the construction of roads and pavements is the lack of high-quality, long-lasting materials for the pavement structure (base, subbase, and subgrade). Hence, this study examined the stabilization of lateritic soil samples from Ijoko with cement kiln dust and lime. The study adopted the experimental design. Laboratory tests were conducted on classification, swelling potential, compaction, California bearing ratio (CBR), and unconfined compressive tests, among others, were conducted on the laterite sample treated with cement kiln dust (CKD) and lime in incremental order of 2% up to 10% of dry weight soft soil sample. The results of the test showed that the studied soil could be classified as an A-7-6 and CL soil using the American Association of State Highway and transport officials (AASHTO) and the unified soil classification system (USCS), respectively. The plasticity (PI) of the studied soil reduced from 30.5% to 29.9% at the application of CKD. The maximum dry density on the application of CKD reduced from 1.9.7 mg/m3 to 1.86mg/m3, and lime application yielded a reduction from 1.97mg/m3 to 1.88.mg/m3. The swell potential on CKD application was reduced from 0.05 to 0.039%. The study concluded that soil stabilizations are effective and economic way of improving road pavement for engineering benefit. The degree of effectiveness of stabilization in pavement construction was found to depend on the type of soil to be stabilized. The study therefore recommended that stabilized soil mixtures should be used to subbase material for flexible pavement since is a suitable.

Keywords: lateritic soils, sand, cement, stabilization, road pavement

Procedia PDF Downloads 91
775 The Modeling of Viscous Microenvironment for the Coupled Enzyme System of Bioluminescence Bacteria

Authors: Irina E. Sukovataya, Oleg S. Sutormin, Valentina A. Kratasyuk

Abstract:

Effect of viscosity of media on kinetic parameters of the coupled enzyme system NADH:FMN-oxidoreductase–luciferase was investigated with addition of organic solvents (glycerol and sucrose), because bioluminescent enzyme systems based on bacterial luciferases offer a unique and general tool for analysis of the many analytes and enzymes in the environment, research, and clinical laboratories and other fields. The possibility of stabilization and increase of activity of the coupled enzyme system NADH:FMN-oxidoreductase–luciferase activity in vicious aqueous-organic mixtures have been shown.

Keywords: coupled enzyme system of bioluminescence bacteria NAD(P)H:FMN-oxidoreductase–luciferase, glycerol, stabilization of enzymes, sucrose

Procedia PDF Downloads 395
774 Effect of Mineral Additives on Improving the Geotechnical Properties of Soils in Chief

Authors: Rabah Younes

Abstract:

The reduction of available land resources and the increased cout associated with the use of high quality materials have led to the need for local soils to be used in geotechnical construction, however; poor engineering properties of these soils pose difficulties for constructions project and need to be stabilized to improve their properties in other works unsuitable soils with low bearing capacity , high plasticity coupled with high instability are frequently encountered hence, there is a need to improve the physical and mechanical characteristics of these soils to make theme more suitable for construction this can be done by using different mechanical and chemical methods clayey soil stabilization has been practiced for sometime but mixing additives, such us cement, lime and fly ash to the soil to increase its strength.

Keywords: clay, soil stabilization, naturaln pozzolana, atterberg limits, compaction, compressive strength shear strength, curing

Procedia PDF Downloads 314
773 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 338
772 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 661
771 Effect of Lime Stabilization on E. coli Destruction and Heavy Metal Bioavailability in Sewage Sludge for Agricultural Utilization

Authors: G. Petruzzelli, F. Pedron, M. Grifoni, A. Pera, I. Rosellini, B. Pezzarossa

Abstract:

The addition of lime as Ca(OH)2 to sewage sludge to destroy pathogens (Escherichia coli), was evaluated also in relation to heavy metal bioavailability. The obtained results show that the use of calcium hydroxide at the dose of 3% effectively destroyed pathogens ensuring the stability at high pH values over long period and the duration of the sewage sludge stabilization. In general, lime addition decreased the total extractability of heavy metals indicating a reduced bioavailability of these elements. This is particularly important for a safe utilization in agricultural soils to reduce the possible transfer of heavy metals to the food chain.

Keywords: biological sludge, Ca(OH)2, copper, pathogens, sanitation, zinc

Procedia PDF Downloads 426
770 A Cooperative Space-Time Transmission Scheme Based On Symbol Combinations

Authors: Keunhong Chae, Seokho Yoon

Abstract:

This paper proposes a cooperative Alamouti space time transmission scheme with low relay complexity for the cooperative communication systems. In the proposed scheme, the source node combines the data symbols to construct the Alamouti-coded form at the destination node, while the conventional scheme performs the corresponding operations at the relay nodes. In simulation results, it is shown that the proposed scheme achieves the second order cooperative diversity while maintaining the same bit error rate (BER) performance as that of the conventional scheme.

Keywords: Space-time transmission, cooperative communication system, MIMO.

Procedia PDF Downloads 352
769 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 491
768 Energy-Efficient Contact Selection Method for CARD in Wireless Ad-Hoc Networks

Authors: Mehdi Assefi, Keihan Hataminezhad

Abstract:

One of the efficient architectures for exploring the resources in wireless ad-hoc networks is contact-based architecture. In this architecture, each node assigns a unique zone for itself and each node keeps all information from inside the zone, as well as some from outside the zone, which is called contact. Reducing the overlap between different zones of a node and its contacts increases its performance, therefore Edge Method (EM) is designed for this purpose. Contacts selected by EM do not have any overlap with their sources, but for choosing the contact a vast amount of information must be transmitted. In this article, we will offer a new protocol for contact selection, which is called PEM. The objective would be reducing the volume of transmitted information, using Non-Uniform Dissemination Probabilistic Protocols. Consumed energy for contact selection is a function of the size of transmitted information between nodes. Therefore, by reducing the content of contact selection message using the PEM will decrease the consumed energy. For evaluation of the PEM we applied the simulation method. Results indicated that PEM consumes less energy compared to EM, and by increasing the number of nodes (level of nodes), performance of PEM will improve in comparison with EM.

Keywords: wireless ad-hoc networks, contact selection, method for CARD, energy-efficient

Procedia PDF Downloads 291
767 Stabilization of the Bernoulli-Euler Plate Equation: Numerical Analysis

Authors: Carla E. O. de Moraes, Gladson O. Antunes, Mauro A. Rincon

Abstract:

The aim of this paper is to study the internal stabilization of the Bernoulli-Euler equation numerically. For this, we consider a square plate subjected to a feedback/damping force distributed only in a subdomain. An algorithm for obtaining an approximate solution to this problem was proposed and implemented. The numerical method used was the Finite Difference Method. Numerical simulations were performed and showed the behavior of the solution, confirming the theoretical results that have already been proved in the literature. In addition, we studied the validation of the numerical scheme proposed, followed by an analysis of the numerical error; and we conducted a study on the decay of the energy associated.

Keywords: Bernoulli-Euler plate equation, numerical simulations, stability, energy decay, finite difference method

Procedia PDF Downloads 416