Search results for: wireless networking
127 Rumination Time and Reticuloruminal Temperature around Calving in Eutocic and Dystocic Dairy Cows
Authors: Levente Kovács, Fruzsina Luca Kézér, Ottó Szenci
Abstract:
Prediction of the onset of calving and recognizing difficulties at calving has great importance in decreasing neonatal losses and reducing the risk of health problems in the early postpartum period. In this study, changes of rumination time, reticuloruminal pH and temperature were investigated in eutocic (EUT, n = 10) and dystocic (DYS, n = 8) dairy cows around parturition. Rumination time was continuously recorded using an acoustic biotelemetry system, whereas reticuloruminal pH and temperature were recorded using an indwelling and wireless data transmitting system. The recording period lasted from 3 d before calving until 7 days in milk. For the comparison of rumination time and reticuloruminal characteristics between groups, time to return to baseline (the time interval required to return to baseline from the delivery of the calf) and area under the curve (AUC, both for prepartum and postpartum periods) were calculated for each parameter. Rumination time decreased from baseline 28 h before calving both for EUT and DYS cows (P = 0.023 and P = 0.017, respectively). After 20 h before calving, it decreased onwards to reach 32.4 ± 2.3 and 13.2 ± 2.0 min/4 h between 8 and 4 h before delivery in EUT and DYS cows, respectively, and then it decreased below 10 and 5 min during the last 4 h before calving (P = 0.003 and P = 0.008, respectively). Until 12 h after delivery rumination time reached 42.6 ± 2.7 and 51.0 ± 3.1 min/4 h in DYS and EUT dams, respectively, however, AUC and time to return to baseline suggested lower rumination activity in DYS cows than in EUT dams for the 168-h postpartum observational period (P = 0.012 and P = 0.002, respectively). Reticuloruminal pH decreased from baseline 56 h before calving both for EUT and DYS cows (P = 0.012 and P = 0.016, respectively), but did not differ between groups before delivery. In DYS cows, reticuloruminal temperature decreased from baseline 32 h before calving by 0.23 ± 0.02 °C (P = 0.012), whereas in EUT cows such a decrease was found only 20 h before delivery (0.48 ± 0.05 °C, P < 0.01). AUC of reticuloruminal temperature calculated for the prepartum period was greater in EUT cows than in DYS cows (P = 0.042). During the first 4 h after calving, it decreased from 39.7 ± 0.1 to 39.00 ± 0.1 °C and from 39.8 ± 0.1 to 38.8 ± 0.1 °C in EUT and DYS cows, respectively (P < 0.01 for both groups) and reached baseline levels after 35.4 ± 3.4 and 37.8 ± 4.2 h after calving in EUT and DYS cows, respectively. Based on our results, continuous monitoring of changes in rumination time and reticuloruminal temperature seems to be promising in the early detection of cows with a higher risk of dystocia. Depressed postpartum rumination time of DYS cows highlights the importance of the monitoring of cows experiencing difficulties at calving.Keywords: reticuloruminal pH, reticuloruminal temperature, rumination time, dairy cows, dystocia
Procedia PDF Downloads 315126 A POX Controller Module to Collect Web Traffic Statistics in SDN Environment
Authors: Wisam H. Muragaa, Kamaruzzaman Seman, Mohd Fadzli Marhusin
Abstract:
Software Defined Networking (SDN) is a new norm of networks. It is designed to facilitate the way of managing, measuring, debugging and controlling the network dynamically, and to make it suitable for the modern applications. Generally, measurement methods can be divided into two categories: Active and passive methods. Active measurement method is employed to inject test packets into the network in order to monitor their behaviour (ping tool as an example). Meanwhile the passive measurement method is used to monitor the traffic for the purpose of deriving measurement values. The measurement methods, both active and passive, are useful for the collection of traffic statistics, and monitoring of the network traffic. Although there has been a work focusing on measuring traffic statistics in SDN environment, it was only meant for measuring packets and bytes rates for non-web traffic. In this study, a feasible method will be designed to measure the number of packets and bytes in a certain time, and facilitate obtaining statistics for both web traffic and non-web traffic. Web traffic refers to HTTP requests that use application layer; while non-web traffic refers to ICMP and TCP requests. Thus, this work is going to be more comprehensive than previous works. With a developed module on POX OpenFlow controller, information will be collected from each active flow in the OpenFlow switch, and presented on Command Line Interface (CLI) and wireshark interface. Obviously, statistics that will be displayed on CLI and on wireshark interfaces include type of protocol, number of bytes and number of packets, among others. Besides, this module will show the number of flows added to the switch whenever traffic is generated from and to hosts in the same statistics list. In order to carry out this work effectively, our Python module will send a statistics request message to the switch requesting its current ports and flows statistics in every five seconds; while the switch will reply with the required information in a message called statistics reply message. Thus, POX controller will be notified and updated with any changes could happen in the entire network in a very short time. Therefore, our aim of this study is to prepare a list for the important statistics elements that are collected from the whole network, to be used for any further researches; particularly, those that are dealing with the detection of the network attacks that cause a sudden rise in the number of packets and bytes like Distributed Denial of Service (DDoS).Keywords: mininet, OpenFlow, POX controller, SDN
Procedia PDF Downloads 235125 Research on Intercity Travel Mode Choice Behavior Considering Traveler’s Heterogeneity and Psychological Latent Variables
Authors: Yue Huang, Hongcheng Gan
Abstract:
The new urbanization pattern has led to a rapid growth in demand for short-distance intercity travel, and the emergence of new travel modes has also increased the variety of intercity travel options. In previous studies on intercity travel mode choice behavior, the impact of functional amenities of travel mode and travelers’ long-term personality characteristics has rarely been considered, and empirical results have typically been calibrated using revealed preference (RP) or stated preference (SP) data. This study designed a questionnaire that combines the RP and SP experiment from the perspective of a trip chain combining inner-city and intercity mobility, with consideration for the actual condition of the Huainan-Hefei traffic corridor. On the basis of RP/SP fusion data, a hybrid choice model considering both random taste heterogeneity and psychological characteristics was established to investigate travelers’ mode choice behavior for traditional train, high-speed rail, intercity bus, private car, and intercity online car-hailing. The findings show that intercity time and cost exert the greatest influence on mode choice, with significant heterogeneity across the population. Although inner-city cost does not demonstrate a significant influence, inner-city time plays an important role. Service attributes of travel mode, such as catering and hygiene services, as well as free wireless network supply, only play a minor role in mode selection. Finally, our study demonstrates that safety-seeking tendency, hedonism, and introversion all have differential and significant effects on intercity travel mode choice.Keywords: intercity travel mode choice, stated preference survey, hybrid choice model, RP/SP fusion data, psychological latent variable, heterogeneity
Procedia PDF Downloads 111124 Solvent-Free Conductive Coatings Containing Chemically Coupled Particles for Functional Textiles
Authors: Jagadeshvaran P. L., Kamlesh Panwar, Indumathi Ramakrishnan, Suryasarathi Bose
Abstract:
The surge in the usage of wireless electronics and communication devices has engendered a different form of pollution, viz. the electromagnetic (EM) pollution and yet another serious issue, electromagnetic interference (EMI). There is a legitimate need to develop strategies and materials to combat this issue, otherwise leading to dreadful consequences. Functional textiles have emerged as the modern materials to help attenuate EM waves due to the numerous advantages – flexibility being the most important. In addition to this, there is an inherent advantage of multiple interfaces in coated fabrics that can engender significant attenuation. Herein we report a coating having multifunctional properties – capable of blocking both UV and EM radiation (predominantly of the microwave frequencies) with flame-retarding properties. The layer described here comprises iron titanate(FT) synthesized from its sustainable precursor – ilmenite sand and carbon nanotubes (CNT) dispersed in waterborne polyurethane. It is worth noting that FT's use as a multifunctional material is being reported for the first time. It was observed that a single layer of coated fabric shows EMI shielding effectiveness of -40 dB translating to 99.99% attenuation and similarly a UV blocking of 99.99% in the wavelength ranging from 200-400 nm. The microwave shielding properties of the fabric were demonstrated using a Bluetooth module – where the coated fabric was able to block the incoming Bluetooth signals to the module from a mobile phone. Besides, the coated fabrics exhibited phenomenal enhancement in thermal stability - a five percent increase in the limiting oxygen index (LOI) was observed upon the application of the coating. Such exceptional properties complement cotton fabrics' existing utility, thereby extending their use to specialty applications.Keywords: multifunctional coatings, EMI shielding, UV blocking, iron titanate, CNT, waterborne polyurethane, cotton fabrics
Procedia PDF Downloads 116123 Investigation of the Psychological and Sociological Consequences of Facebook Usage towards Saudi Arabia University Students
Authors: Abdullah Alassiri
Abstract:
Prompted by the widespread saturation of Facebook usage in Saudi Arabia, among university students to socialize with online members, this study investigated the usage, self-presentation, psychological and sociological consequences of the Facebook social networking site among undergraduate students in Saudi Arabia. The problem statement of this study was addressed by answering the following questions: 1) What motivation do undergraduate students have for joining Facebook? 2) How do undergraduate students consume Facebook? 3) In what condition do undergraduate students need Facebook? 4) How do undergraduate students manage their self-presentation via Facebook? 5) What are the experiences obtained by the undergraduate students from Facebook psychologically? 6) What are the experiences obtained by the undergraduate students from Facebook sociologically? 7) How have Facebook activities affected the lifestyle of the undergraduate students?. These questions were answered by analyzing in-depth interview data collected from twenty male undergraduate students between the ages of 18 and 24 years selected from King Saud University (KSU) and King Khalid University (KKU) Saudi Arabia. Using thematic analysis, informants data were coded ‘R1 to R20’, validated and was transcribed to minimize error from translating into the study items from Arabic back to the English Language. Using purposive sampling method, informant perspective within the research context were explored. Data collection was confined to students’ motivations for engaging in online activities, self-presentation, psychological and sociological consequences to their everyday life was investigated based on the theoretical and philosophical perspective underpinnings media and gratification paradigm and social influence theory. The findings contributed to the development of important study themes that supported the development of a new research framework. Based on the analysis, all the study questions were answered. The findings of this study showed that the students use Facebook for the purpose of interacting with others, getting information and as knowledge sources. In terms of self-presentation, this study revealed that the students portray themselves in the real and not fake image while socializing with others. Psychological and sociological consequences from the usage of Facebook are recorded ranging from cheerful to stress and from loneliness to having many friends. As a conclusion, this study conclusively drew that Facebook is a very persuasive medium of communication among the University students in Saudi Arabia that bridges across socio-cultural boundaries and unite students to interact as a community.Keywords: Saudi Arabia, Facebook, undergraduate students, social network
Procedia PDF Downloads 165122 Hybrid Strategies of Crisis Intervention for Sexualized Violence Using Digital Media
Authors: Katharina Kargel, Frederic Vobbe
Abstract:
Sexualized violence against children and adolescents using digital media poses particular challenges for practitioners with a focus on crisis intervention (social work, psychotherapy, law enforcement). The technical delimitation of violence increases the burden on those affected and increases the complexity of interdisciplinary cooperation. Urgently needed recommendations for practical action do not yet exist in Germany. Funded by the Federal Ministry of Education and Research, these recommendations for action are being developed in the HUMAN project together with science and practice. The presentation introduces the participatory approach of the HUMAN project. We discuss the application-oriented, casuistic approach of the project and present its results using the example of concrete case-based recommendations for Action. The participants will be presented with concrete prototypical case studies from the project, which will be used to illustrate quality criteria for crisis intervention in cases of sexualized violence using digital media. On the basis of case analyses, focus group interviews and interviews with victims of violence, we present the six central challenges of sexualized violence with the use of digital media, namely: • Diffusion (Ambiguities regarding the extent and significance of violence) , • Transcendence (Space and time independence of the dynamics of violence, omnipresence), • omnipresent anxiety (considering diffusion and transcendence), • being haunted (repeated confrontation with digital memories of violence or the perpetrator), • disparity (conflicts of interpretative power between those affected and the social environment) • simultaneity (of all other factors). We point out generalizable principles with which these challenges can be dealt with professionally. Dealing professionally with sexualized violence using digital media requires a stronger networking of professional actors. A clear distinction must be made between their own mission and the mission of the network partners. Those affected by violence must be shown options for crisis intervention in the context of the aid networks. The different competencies and the professional mission of the offers of help are to be made transparent. The necessity of technical possibilities for deleting abuse images beyond criminal prosecution will be discussed. Those affected are stabilized by multimodal strategies such as a combination of rational emotive therapy, legal support and technical assistance.Keywords: sexualized violence, intervention, digital media, children and youth
Procedia PDF Downloads 233121 Thick Data Techniques for Identifying Abnormality in Video Frames for Wireless Capsule Endoscopy
Authors: Jinan Fiaidhi, Sabah Mohammed, Petros Zezos
Abstract:
Capsule endoscopy (CE) is an established noninvasive diagnostic modality in investigating small bowel disease. CE has a pivotal role in assessing patients with suspected bleeding or identifying evidence of active Crohn's disease in the small bowel. However, CE produces lengthy videos with at least eighty thousand frames, with a frequency rate of 2 frames per second. Gastroenterologists cannot dedicate 8 to 15 hours to reading the CE video frames to arrive at a diagnosis. This is why the issue of analyzing CE videos based on modern artificial intelligence techniques becomes a necessity. However, machine learning, including deep learning, has failed to report robust results because of the lack of large samples to train its neural nets. In this paper, we are describing a thick data approach that learns from a few anchor images. We are using sound datasets like KVASIR and CrohnIPI to filter candidate frames that include interesting anomalies in any CE video. We are identifying candidate frames based on feature extraction to provide representative measures of the anomaly, like the size of the anomaly and the color contrast compared to the image background, and later feed these features to a decision tree that can classify the candidate frames as having a condition like the Crohn's Disease. Our thick data approach reported accuracy of detecting Crohn's Disease based on the availability of ulcer areas at the candidate frames for KVASIR was 89.9% and for the CrohnIPI was 83.3%. We are continuing our research to fine-tune our approach by adding more thick data methods for enhancing diagnosis accuracy.Keywords: thick data analytics, capsule endoscopy, Crohn’s disease, siamese neural network, decision tree
Procedia PDF Downloads 156120 Low-Voltage and Low-Power Bulk-Driven Continuous-Time Current-Mode Differentiator Filters
Authors: Ravi Kiran Jaladi, Ezz I. El-Masry
Abstract:
Emerging technologies such as ultra-wide band wireless access technology that operate at ultra-low power present several challenges due to their inherent design that limits the use of voltage-mode filters. Therefore, Continuous-time current-mode (CTCM) filters have become very popular in recent times due to the fact they have a wider dynamic range, improved linearity, and extended bandwidth compared to their voltage-mode counterparts. The goal of this research is to develop analog filters which are suitable for the current scaling CMOS technologies. Bulk-driven MOSFET is one of the most popular low power design technique for the existing challenges, while other techniques have obvious shortcomings. In this work, a CTCM Gate-driven (GD) differentiator has been presented with a frequency range from dc to 100MHz which operates at very low supply voltage of 0.7 volts. A novel CTCM Bulk-driven (BD) differentiator has been designed for the first time which reduces the power consumption multiple times that of GD differentiator. These GD and BD differentiator has been simulated using CADENCE TSMC 65nm technology for all the bilinear and biquadratic band-pass frequency responses. These basic building blocks can be used to implement the higher order filters. A 6th order cascade CTCM Chebyshev band-pass filter has been designed using the GD and BD techniques. As a conclusion, a low power GD and BD 6th order chebyshev stagger-tuned band-pass filter was simulated and all the parameters obtained from all the resulting realizations are analyzed and compared. Monte Carlo analysis is performed for both the 6th order filters and the results of sensitivity analysis are presented.Keywords: bulk-driven (BD), continuous-time current-mode filters (CTCM), gate-driven (GD)
Procedia PDF Downloads 260119 A Study on the Different Components of a Typical Back-Scattered Chipless RFID Tag Reflection
Authors: Fatemeh Babaeian, Nemai Chandra Karmakar
Abstract:
Chipless RFID system is a wireless system for tracking and identification which use passive tags for encoding data. The advantage of using chipless RFID tag is having a planar tag which is printable on different low-cost materials like paper and plastic. The printed tag can be attached to different items in the labelling level. Since the price of chipless RFID tag can be as low as a fraction of a cent, this technology has the potential to compete with the conventional optical barcode labels. However, due to the passive structure of the tag, data processing of the reflection signal is a crucial challenge. The captured reflected signal from a tag attached to an item consists of different components which are the reflection from the reader antenna, the reflection from the item, the tag structural mode RCS component and the antenna mode RCS of the tag. All these components are summed up in both time and frequency domains. The effect of reflection from the item and the structural mode RCS component can distort/saturate the frequency domain signal and cause difficulties in extracting the desired component which is the antenna mode RCS. Therefore, it is required to study the reflection of the tag in both time and frequency domains to have a better understanding of the nature of the captured chipless RFID signal. The other benefits of this study can be to find an optimised encoding technique in tag design level and to find the best processing algorithm the chipless RFID signal in decoding level. In this paper, the reflection from a typical backscattered chipless RFID tag with six resonances is analysed, and different components of the signal are separated in both time and frequency domains. Moreover, the time domain signal corresponding to each resonator of the tag is studied. The data for this processing was captured from simulation in CST Microwave Studio 2017. The outcome of this study is understanding different components of a measured signal in a chipless RFID system and a discovering a research gap which is a need to find an optimum detection algorithm for tag ID extraction.Keywords: antenna mode RCS, chipless RFID tag, resonance, structural mode RCS
Procedia PDF Downloads 200118 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks
Authors: Hyunsun Lee, Yi Zhu
Abstract:
Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles
Procedia PDF Downloads 123117 Low Overhead Dynamic Channel Selection with Cluster-Based Spatial-Temporal Station Reporting in Wireless Networks
Authors: Zeyad Abdelmageid, Xianbin Wang
Abstract:
Choosing the operational channel for a WLAN access point (AP) in WLAN networks has been a static channel assignment process initiated by the user during the deployment process of the AP, which fails to cope with the dynamic conditions of the assigned channel at the station side afterward. However, the dramatically growing number of Wi-Fi APs and stations operating in the unlicensed band has led to dynamic, distributed, and often severe interference. This highlights the urgent need for the AP to dynamically select the best overall channel of operation for the basic service set (BSS) by considering the distributed and changing channel conditions at all stations. Consequently, dynamic channel selection algorithms which consider feedback from the station side have been developed. Despite the significant performance improvement, existing channel selection algorithms suffer from very high feedback overhead. Feedback latency from the STAs, due to the high overhead, can cause the eventually selected channel to no longer be optimal for operation due to the dynamic sharing nature of the unlicensed band. This has inspired us to develop our own dynamic channel selection algorithm with reduced overhead through the proposed low-overhead, cluster-based station reporting mechanism. The main idea behind the cluster-based station reporting is the observation that STAs which are very close to each other tend to have very similar channel conditions. Instead of requesting each STA to report on every candidate channel while causing high overhead, the AP divides STAs into clusters then assigns each STA in each cluster one channel to report feedback on. With the proper design of the cluster based reporting, the AP does not lose any information about the channel conditions at the station side while reducing feedback overhead. The simulation results show equal performance and, at times, better performance with a fraction of the overhead. We believe that this algorithm has great potential in designing future dynamic channel selection algorithms with low overhead.Keywords: channel assignment, Wi-Fi networks, clustering, DBSCAN, overhead
Procedia PDF Downloads 119116 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates
Procedia PDF Downloads 305115 An Integrated Approach to Syllabus Design for Business Chinese
Authors: Dongshuo Wang, Minjie Xing
Abstract:
International businesses prefer to hire people who speak more than one language. With the booming of China’s market, industries and trade, business leaders are looking for people who can speak Chinese and operate successfully in a Chinese cultural context, and therefore an increasing number of tertiary students choose a Business Chinese (BC) course. As a result, BC syllabus design is urgently needed. What business knowledge should be included in China’s context? What aspects of BC culture should be included? How much Chinese language should be introduced to conduct business in China? With these research questions, this research explores a syllabus design that integrates the three aspects of subject knowledge of business in communication, business practice including the procedure of and strategies for communicating business in practice and language skills including the disciplinary and professional contexts in which linguistic choices are made. After literature review and consultancy with China-related business professionals, senior staff from business schools and representatives of students, the authors of this paper, together with language tutors drafted a syllabus based on the integrated approach to include subject knowledge, business practice and language skills. Due to the nature of this research which requires trial/test and detailed description for each correction, qualitative methods are adopted. Two in-depth focus group interviews (with 2 staff and 4 students in each group), and 18 individual interviews (8 staff and 10 students) were conducted. QDA was used for systematizing, organizing, and analysing qualitative data. It was discovered that the business knowledge related to a Chinese cultural context, including face value, networking skills, strategic plans for signing a contract, marketing, sales, and after-sale service, should be introduced through lectures and seminars; business practice could be implemented by students setting up their own companies, virtual or real; and language skills would be trained via writing business messages and presenting their companies in fairs and exhibitions. After a longitudinal study of trials and amendments for three years from 2013 to 2016, the syllabus was approved by staff and students and the university. Students appreciated the syllabus, as they could apply the subject knowledge into practice by using it in their own companies and Chinese language was used throughout the process. The syllabus is now ready to be used in universities offering BC, and the designing process can be applied to other new courses as well.Keywords: business Chinese, syllabus design, business knowledge, language skills
Procedia PDF Downloads 335114 Controlling Drone Flight Missions through Natural Language Processors Using Artificial Intelligence
Authors: Sylvester Akpah, Selasi Vondee
Abstract:
Unmanned Aerial Vehicles (UAV) as they are also known, drones have attracted increasing attention in recent years due to their ubiquitous nature and boundless applications in the areas of communication, surveying, aerial photography, weather forecasting, medical delivery, surveillance amongst others. Operated remotely in real-time or pre-programmed, drones can fly autonomously or on pre-defined routes. The application of these aerial vehicles has successfully penetrated the world due to technological evolution, thus a lot more businesses are utilizing their capabilities. Unfortunately, while drones are replete with the benefits stated supra, they are riddled with some problems, mainly attributed to the complexities in learning how to master drone flights, collision avoidance and enterprise security. Additional challenges, such as the analysis of flight data recorded by sensors attached to the drone may take time and require expert help to analyse and understand. This paper presents an autonomous drone control system using a chatbot. The system allows for easy control of drones using conversations with the aid of Natural Language Processing, thus to reduce the workload needed to set up, deploy, control, and monitor drone flight missions. The results obtained at the end of the study revealed that the drone connected to the chatbot was able to initiate flight missions with just text and voice commands, enable conversation and give real-time feedback from data and requests made to the chatbot. The results further revealed that the system was able to process natural language and produced human-like conversational abilities using Artificial Intelligence (Natural Language Understanding). It is recommended that radio signal adapters be used instead of wireless connections thus to increase the range of communication with the aerial vehicle.Keywords: artificial ntelligence, chatbot, natural language processing, unmanned aerial vehicle
Procedia PDF Downloads 142113 Mobile-Assisted Language Learning (MALL) Applications for Interactive and Engaging Classrooms: APPsolutely!
Authors: Ajda Osifo, Amanda Radwan
Abstract:
Mobile-assisted language learning (MALL) or m-learning which is defined as learning with mobile devices that can be utilized in any place that is equipped with unbroken transmission signals, has created new opportunities and challenges for educational use. It introduced a new learning model combining new types of mobile devices, wireless communication services and technologies with teaching and learning. Recent advancements in the mobile world such as the Apple IOS devices (IPhone, IPod Touch and IPad), Android devices and other smartphone devices and environments (such as Windows Phone 7 and Blackberry), allowed learning to be more flexible inside and outside the classroom, making the learning experience unique, adaptable and tailored to each user. Creativity, learner autonomy, collaboration and digital practices of language learners are encouraged as well as innovative pedagogical applications, like the flipped classroom, for such practices in classroom contexts are enhanced. These developments are gradually embedded in daily life and they also seem to be heralding the sustainable move to paperless classrooms. Since mobile technologies are increasingly viewed as a main platform for delivery, we as educators need to design our activities, materials and learning environments in such a way to ensure that learners are engaged and feel comfortable. For the purposes of our session, several core MALL applications that work on the Apple IPad/IPhone will be explored; the rationale and steps needed to successfully implement these applications will be discussed and student examples will be showcased. The focus of the session will be on the following points: 1-Our current pedagogical approach, 2-The rationale and several core MALL apps, 3-Possible Challenges for Teachers and Learners, 4-Future implications. This session is aimed at instructors who are interested in integrating MALL apps into their own classroom planning.Keywords: MALL, educational technology, iPads, apps
Procedia PDF Downloads 394112 Survey of Communication Technologies for IoT Deployments in Developing Regions
Authors: Namugenyi Ephrance Eunice, Julianne Sansa Otim, Marco Zennaro, Stephen D. Wolthusen
Abstract:
The Internet of Things (IoT) is a network of connected data processing devices, mechanical and digital machinery, items, animals, or people that may send data across a network without requiring human-to-human or human-to-computer interaction. Each component has sensors that can pick up on specific phenomena, as well as processing software and other technologies that can link to and communicate with other systems and/or devices over the Internet or other communication networks and exchange data with them. IoT is increasingly being used in fields other than consumer electronics, such as public safety, emergency response, industrial automation, autonomous vehicles, the Internet of Medical Things (IoMT), and general environmental monitoring. Consumer-based IoT applications, like smart home gadgets and wearables, are also becoming more prevalent. This paper presents the main IoT deployment areas for environmental monitoring in developing regions and the backhaul options suitable for them. A detailed review of each of the list of papers selected for the study is included in section III of this document. The study includes an overview of existing IoT deployments, the underlying communication architectures, protocols, and technologies that support them. This overview shows that Low Power Wireless Area Networks (LPWANs), as summarized in Table 1, are very well suited for monitoring environment architectures designed for remote locations. LoRa technology, particularly the LoRaWAN protocol, has an advantage over other technologies due to its low power consumption, adaptability, and suitable communication range. The prevailing challenges of the different architectures are discussed and summarized in Table 3 of the IV section, where the main problem is the obstruction of communication paths by buildings, trees, hills, etc.Keywords: communication technologies, environmental monitoring, Internet of Things, IoT deployment challenges
Procedia PDF Downloads 85111 Design and Implementation of Smart Watch Textile Antenna for Wi-Fi Bio-Medical Applications in Millimetric Wave Band
Authors: M. G. Ghanem, A. M. M. A. Allam, Diaa E. Fawzy, Mehmet Faruk Cengiz
Abstract:
This paper is devoted to the design and implementation of a smartwatch textile antenna for Wi-Fi bio-medical applications in millimetric wave bands. The antenna is implemented on a leather textile-based substrate to be embedded in a smartwatch. It enables the watch to pick Wi-Fi signals without the need to be connected to a mobile through Bluetooth. It operates at 60 GHz or WiGig (Wireless Gigabit Alliance) band with a wide band for higher rate applications. It also could be implemented over many stratified layers of the body organisms to be used in the diagnosis of many diseases like diabetes and cancer. The structure is designed and simulated using CST (Studio Suite) program. The wearable patch antenna has an octagon shape, and it is implemented on leather material that acts as a flexible substrate with a size of 5.632 x 6.4 x 2 mm3, a relative permittivity of 2.95, and a loss tangent of 0.006. The feeding is carried out using differential feed (discrete port in CST). The work provides five antenna implementations; antenna without ground, a ground is added at the back of the antenna in order to increase the antenna gain, the substrate dimensions are increased to 15 x 30 mm2 to resemble the real hand watch size, layers of skin and fat are added under the ground of the antenna to study the effect of human body tissues human on the antenna performance. Finally, the whole structure is bent. It is found that the antenna can achieve a simulated peak realized gain in dB of 5.68, 7.28, 6.15, 3.03, and 4.37 for antenna without ground, antenna with the ground, antenna with larger substrate dimensions, antenna with skin and fat, and bent structure, respectively. The antenna with ground exhibits high gain; while adding the human organisms absorption, the gain is degraded because of human absorption. The bent structure contributes to higher gain.Keywords: bio medical engineering, millimetric wave, smart watch, textile antennas, Wi-Fi
Procedia PDF Downloads 121110 Gains and Pitfalls of Participating on International Staff Exchange Programs: Individual Experiences of Academic Staff of Makerere University, Uganda
Authors: David Onen
Abstract:
Staff exchanges amongst different work organizations are a growing international phenomenon. In higher education in particular, it is not only the staff participating on international exchange programs, but their students as well. The practice of exchanging staff is premised on the belief that participating members of staff would not only get the chance to network with colleagues from partner institutions but also gain the opportunity for knowledge sharing and skills development. As a result, it would not only benefit the participating individual staff but their institutions too. However, in practice, staff exchange programs everywhere are not all ‘a bed of roses’. In fact, some of the programs seem to be laden with unapparent source of trouble or danger for the participating staff. This paper is a report on an on-going study investigating the experiences of members of academic staff of Makerere University in Uganda who have ever participated on international staff exchange programs. The study is aimed at documenting individual experiences in order to stimulate, not only a debate, but practical ways of enriching the experiences of staff who engage on well-meant international staff exchange programs. The study has employed an exploratory survey research design in which self-administered questionnaire and interview guide are being used to collect data from university academic staff respondents selected through snow-ball and purposive sampling techniques. Data have been analysed with the use of appropriate descriptive and inferential statistics as well as content analysis techniques. Preliminary study findings reveal that the majority of the respondents (95.5%) were, to a large extent, fully satisfied with their participation on the staff exchange programs. Many attested to gaining new experience (97%), networking (75%), gaining new knowledge (94%), acquiring new skills (88%), and therefore bringing to their institutions something ‘new’ and ‘beneficial’. However, a reasonably large percentage (57%) of the participants too expressed dissatisfaction in the institutional support that Makerere University gave them during their participation on the exchange programs. Some respondents reported about the ‘unfriendly welcome’ they received upon returning ‘home’ because colleagues detested how they were chosen to participate on such programs. The researcher thus concluded that international staff exchange programs are truly beneficial to both the participating staff and their institutions though with pitfalls. The researcher thus recommended for mutual and preferably equal engagement of the participating institutions on staff exchange programs if such programs are to benefit both the participating staff and institutions. Besides, exchange programs require clear terms of cooperation including on how staff are selected, facilitated and what are expected of the sending and host institutions as well as the concerned staff.Keywords: gains, exchange programs, higher education, pitfalls
Procedia PDF Downloads 344109 TikTok as a Search Engine for Selecting Traveling Destinations and Its Relation to Nation’s Destinations Branding: Comparative Study Between Gen-Y and Gen-Z in the Egyptian Community
Authors: Ghadeer Aly, Yasmeen Hanafy
Abstract:
The way we research travel options and decide where to go has substantially changed in the digital age. Atypical search engines like social networking sites like TikTok have evolved, influencing the preferences of various generations. The influence of TikTok use as a search engine for choosing travel locations and its effect on a country's destination branding are both examined in this study. The study specifically focuses on the comparative preferences and actions of Generations Y and Z within the Egyptian community, shedding light on how these generations interact with travel related TikTok content and how it influences their perceptions of various destinations. It also investigates how TikTok Accounts use tourism branding techniques to promote a country's tourist destination. The investigation of how social media platforms are changing as unconventional search engines has theoretical relevance. This study can advance our knowledge of how digital platforms alter information-seeking behaviors and affect the way people make decisions. Furthermore, investigating the relationship between TikTok video and destination branding might shed light on the intricate interplay between social media, perceptions of locations, and travel preferences, enhancing theories about consumer behavior and communication in the digital age. Regarding the methodology of the research, the study is conducted in two stages: first, both generations are polled, and from the results, the top three destinations are chosen to be subjected to content analysis. As for the research's theoretical framework, it incorporates the tourism destination branding model as well as the conceptual model of nation branding. Through the use of the survey as a quantitative approach and the qualitative content analysis, the research will rely on both quantitative and qualitative methods. When it comes to the theoretical framework, both the Nation Branding Model and the Tourism Branding Model can offer useful frameworks for analyzing and comprehending the dynamics of using TikTok as a search engine to choose travel destinations, especially in the context of Generation Y and Generation Z in the Egyptian community. Additionally, the sample will be drawn specifically from both Gen-Y and Gen-Z. 100 members of Gen Z and 100 members of Gen Y will be chosen from TikTok users and followers of travel-related accounts, and the sample for the content analysis will be chosen based on the survey's results.Keywords: tiktok, nation image, egyptian community, tourism branding
Procedia PDF Downloads 76108 A User Interface for Easiest Way Image Encryption with Chaos
Authors: D. López-Mancilla, J. M. Roblero-Villa
Abstract:
Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.Keywords: image encryption, chaos, secure communications, user interface
Procedia PDF Downloads 489107 Capacity Building and Training of Health Personals for Disaster Preparedness in North East India
Authors: U. K. Tamuli
Abstract:
Introduction: North East India is graced with natural beauty and hazards. This area is prone to major earthquakes, floods, landslides, accidents, terrorist activities etc. Academy of Trauma (AOT), an NGO of Doctors, conducts training programs, mock drills, field trials amongst the doctors and paramedics in North East India. The present study is to evaluate the efficacy of such training in terms of sensitivity, awareness, and delivery systems of the products. Here the health care delivery system for disaster management is inadequate. Clear guideline of mass casualty management is unavailable. AOT has initiated steps to increase the awareness and handling of mass casualty management to improve the emergency health care delivery system. Method: AOT has conducted training programmes on emergency health management, mass casualty management and hospital preparedness amongst 800 doctors and 1200 paramedics in twenty-two districts of Assam in Northeast India. The training module consists of lectures, hands-on workshop using manikins, mock drills, distribution of manuals, emergency management exercises, periodic exchange of experience and debriefings. AOT evaluates the impact of these trainings by conducting pre and post tests of delegates, trainer’s evaluation, delegate’s satisfaction and confidence level and their suggestions. Results: The module, training, hands-on workshops, mock drills were highly appreciated. There is significant improvement in scores on the post-training tests. The confidence level of the participants has risen to deal with emergency medical situation Conclusion: These kinds of trainings increase the awareness of the medical members to handle mass casualties in different situations. One such training actually sensitises the delegates. Repetition of such training, TOT (Training-of-Trainers) programs, and individual efforts of delegates are extremely important for sustenance and success of health care delivery service during disasters in the developing countries. Further collaboration, assistance, networking, suggestions from established global agencies in this field will be highly appreciated.Keywords: capacity building, North East India, non-governmental organization, trauma
Procedia PDF Downloads 287106 Flexible PVC Based Nanocomposites With the Incorporation of Electric and Magnetic Nanofillers for the Shielding Against EMI and Thermal Imaging Signals
Authors: H. M. Fayzan Shakir, Khadija Zubair, Tingkai Zhao
Abstract:
Electromagnetic (EM) waves are being used widely now a days. Cell phone signals, WIFI signals, wireless telecommunications etc everything uses EM waves which then create EM pollution. EM pollution can cause serious effects on both human health and nearby electronic devices. EM waves have electric and magnetic components that disturb the flow of charged particles in both human nervous system and electronic devices. The shielding of both humans and electronic devices are a prime concern today. EM waves can cause headaches, anxiety, suicide and depression, nausea, fatigue and loss of libido in humans and malfunctioning in electronic devices. Polyaniline (PANI) and polypyrrole (PPY) were successfully synthesized using chemical polymerizing using ammonium persulfate and DBSNa as oxidant respectively. Barium ferrites (BaFe) were also prepared using co-precipitation method and calcinated at 10500C for 8h. Nanocomposite thin films with various combinations and compositions of Polyvinylchloride, PANI, PPY and BaFe were prepared. X-ray diffraction technique was first used to confirm the successful fabrication of all nano fillers and particle size analyzer to measure the exact size and scanning electron microscopy is used for the shape. According to Electromagnetic Interference theory, electrical conductivity is the prime property required for the Electromagnetic Interference shielding. 4-probe technique is then used to evaluate DC conductivity of all samples. Samples with high concentration of PPY and PANI exhibit remarkable increased electrical conductivity due to fabrication of interconnected network structure inside the Polyvinylchloride matrix that is also confirmed by SEM analysis. Less than 1% transmission was observed in whole NIR region (700 nm – 2500 nm). Also, less than -80 dB Electromagnetic Interference shielding effectiveness was observed in microwave region (0.1 GHz to 20 GHz).Keywords: nanocomposites, polymers, EMI shielding, thermal imaging
Procedia PDF Downloads 106105 Improving Fingerprinting-Based Localization System Using Generative AI
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. It also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 59104 Research Trends in Using Virtual Reality for the Analysis and Treatment of Lower-Limb Musculoskeletal Injury of Athletes: A Literature Review
Authors: Hannah K. M. Tang, Muhammad Ateeq, Mark J. Lake, Badr Abdullah, Frederic A. Bezombes
Abstract:
There is little research applying virtual reality (VR) to the treatment of musculoskeletal injury in athletes. This is despite their prevalence, and the implications for physical and psychological health. Nevertheless, developments of wireless VR headsets better facilitate dynamic movement in VR environments (VREs), and more research is expected in this emerging field. This systematic review identified publications that used VR interventions for the analysis or treatment of lower-limb musculoskeletal injury of athletes. It established a search protocol, and through narrative discussion, identified existing trends. Database searches encompassed four term sets: 1) VR systems; 2) musculoskeletal injuries; 3) sporting population; 4) movement outcome analysis. Overall, a total of 126 publications were identified through database searching, and twelve were included in the final analysis and discussion. Many of the studies were pilot and proof of concept work. Seven of the twelve publications were observational studies. However, this may provide preliminary data from which clinical trials will branch. If specified, the focus of the literature was very narrow, with very similar population demographics and injuries. The trends in the literature findings emphasised the role of VR and attentional focus, the strategic manipulation of movement outcomes, and the transfer of skill to the real-world. Causal inferences may have been undermined by flaws, as most studies were limited by the practicality of conducting a two-factor clinical-VR-based study. In conclusion, by assessing the exploratory studies, and combining this with the use of numerous developments, techniques, and tools, a novel application could be established to utilise VR with dynamic movement, for the effective treatment of specific musculoskeletal injuries of athletes.Keywords: athletes, lower-limb musculoskeletal injury, rehabilitation, return-to-sport, virtual reality
Procedia PDF Downloads 233103 Exploring Barriers to Social Innovation: Swedish Experiences from Nine Research Circles
Authors: Claes Gunnarsson, Karin Fröding, Nina Hasche
Abstract:
Innovation is a necessity for the evolution of societies and it is also a driving force in human life that leverages value creation among cross-sector participants in various network arrangements. Social innovations can be characterized as the creation and implementation of a new solution to a social problem, which is more effective and sustainable than existing solutions in terms of improvement of society’s conditions and in particular social inclusion processes. However, barriers exist which may restrict the potential of social innovations to live up to its promise as a societal welfare promoting driving force. The literature points at difficulties in tackling social problems primarily related to problem complexity, access to networks, and lack of financial muscles. Further research is warranted at detailed at detail clarification of these barriers, also connected to recognition of the interplay between institutional logics on the development of cross-sector collaborations in networks and the organizing processes to achieve innovation barrier break-through. There is also a need to further elaborate how obstacles that spur a difference between the actual and desired state of innovative value creating service systems can be overcome. The purpose of this paper is to illustrate barriers to social innovations, based on qualitative content analysis of 36 dialogue-based seminars (i.e. research circles) with nine Swedish focus groups including more than 90 individuals representing civil society organizations, private business, municipal offices, and politicians; and analyze patterns that reveal constituents of barriers to social innovations. The paper draws on central aspects of innovation barriers as discussed in the literature and analyze barriers basically related to internal/external and tangible/intangible characteristics. The findings of this study are that existing institutional structures highly influence the transformative potential of social innovations, as well as networking conditions in terms of building a competence-propelled strategy, which serves as an offspring for overcoming barriers of competence extension. Both theoretical and practical knowledge will contribute to how policy-makers and SI-practitioners can facilitate and support social innovation processes to be contextually adapted and implemented across areas and sectors.Keywords: barriers, research circles, social innovation, service systems
Procedia PDF Downloads 257102 Analysis and Design of Inductive Power Transfer Systems for Automotive Battery Charging Applications
Authors: Wahab Ali Shah, Junjia He
Abstract:
Transferring electrical power without any wiring has been a dream since late 19th century. There were some advances in this area as to know more about microwave systems. However, this subject has recently become very attractive due to their practiScal systems. There are low power applications such as charging the batteries of contactless tooth brushes or implanted devices, and higher power applications such as charging the batteries of electrical automobiles or buses. In the first group of applications operating frequencies are in microwave range while the frequency is lower in high power applications. In the latter, the concept is also called inductive power transfer. The aim of the paper is to have an overview of the inductive power transfer for electrical vehicles with a special concentration on coil design and power converter simulation for static charging. Coil design is very important for an efficient and safe power transfer. Coil design is one of the most critical tasks. Power converters are used in both side of the system. The converter on the primary side is used to generate a high frequency voltage to excite the primary coil. The purpose of the converter in the secondary is to rectify the voltage transferred from the primary to charge the battery. In this paper, an inductive power transfer system is studied. Inductive power transfer is a promising technology with several possible applications. Operation principles of these systems are explained, and components of the system are described. Finally, a single phase 2 kW system was simulated and results were presented. The work presented in this paper is just an introduction to the concept. A reformed compensation network based on traditional inductor-capacitor-inductor (LCL) topology is proposed to realize robust reaction to large coupling variation that is common in dynamic wireless charging application. In the future, this type compensation should be studied. Also, comparison of different compensation topologies should be done for the same power level.Keywords: coil design, contactless charging, electrical automobiles, inductive power transfer, operating frequency
Procedia PDF Downloads 249101 Network Governance and Renewable Energy Transition in Sub-Saharan Africa: Contextual Evidence from Ghana
Authors: Kyere Francis, Sun Dongying, Asante Dennis, Nkrumah Nana Kwame Edmund, Naana Yaa Gyamea Kumah
Abstract:
With a focus on renewable energy to achieve low-carbon transition objectives, there is a greater demand for effective collaborative strategies for planning, strategic decision mechanisms, and long-term policy designs to steer the transitions. Government agencies, NGOs, the private sector, and individual citizens play an important role in sustainable energy production. In Ghana, however, such collaboration is fragile in the fight against climate change. This current study seeks to re-examine the position or potential of network governance in Ghana's renewable energy transition. The study adopted a qualitative approach and employed semi-structured interviews for data gathering. To explore network governance and low carbon transitions in Ghana, we examine key themes such as political environment and impact, actor cooperation and stakeholder interactions, financing and the transition, market design and renewable energy integration, existing regulation and policy gaps for renewable energy transition, clean cooking accessibility, and affordability. The findings reveal the following; Lack of comprehensive consultations with relevant stakeholders leads to lower acceptance of the policy model and sometimes lack of policy awareness. Again, the unavailability and affordability of renewable energy technologies and access to credit facilities is a significant hurdle to long-term renewable transition. Ghana's renewable energy transitions require strong networking and interaction among the public, private, and non-governmental organizations. The study participants believe that the involvement of relevant energy experts and stakeholders devoid of any political biases is instrumental in accelerating renewable energy transitions, as emphasized in the proposed framework. The study recommends that the national renewable energy transition plan be evident to all stakeholders and political administrators. Such policy may encourage renewable energy investment through stable and fixed lending rates by the financial institutions and build a network with international organizations and corporations. These findings could serve as valuable information for the transition-based energy process, primarily aiming to govern sustainability changes through network governance.Keywords: actors, development, sustainable energy, network governance, renewable energy transition
Procedia PDF Downloads 88100 A Ku/K Band Power Amplifier for Wireless Communication and Radar Systems
Authors: Meng-Jie Hsiao, Cam Nguyen
Abstract:
Wide-band devices in Ku band (12-18 GHz) and K band (18-27 GHz) have received significant attention for high-data-rate communications and high-resolution sensing. Especially, devices operating around 24 GHz is attractive due to the 24-GHz unlicensed applications. One of the most important components in RF systems is power amplifier (PA). Various PAs have been developed in the Ku and K bands on GaAs, InP, and silicon (Si) processes. Although the PAs using GaAs or InP process could have better power handling and efficiency than those realized on Si, it is very hard to integrate the entire system on the same substrate for GaAs or InP. Si, on the other hand, facilitates single-chip systems. Hence, good PAs on Si substrate are desirable. Especially, Si-based PA having good linearity is necessary for next generation communication protocols implemented on Si. We report a 16.5 to 25.5 GHz Si-based PA having flat saturated power of 19.5 ± 1.5 dBm, output 1-dB power compression (OP1dB) of 16.5 ± 1.5 dBm, and 15-23 % power added efficiency (PAE). The PA consists of a drive amplifier, two main amplifiers, and lump-element Wilkinson power divider and combiner designed and fabricated in TowerJazz 0.18µm SiGe BiCMOS process having unity power gain frequency (fMAX) of more than 250 GHz. The PA is realized as a cascode amplifier implementing both heterojunction bipolar transistor (HBT) and n-channel metal–oxide–semiconductor field-effect transistor (NMOS) devices for gain, frequency response, and linearity consideration. Particularly, a body-floating technique is utilized for the NMOS devices to improve the voltage swing and eliminate parasitic capacitances. The developed PA has measured flat gain of 20 ± 1.5 dB across 16.5-25.5 GHz. At 24 GHz, the saturated power, OP1dB, and maximum PAE are 20.8 dBm, 18.1 dBm, and 23%, respectively. Its high performance makes it attractive for use in Ku/K-band, especially 24 GHz, communication and radar systems. This paper was made possible by NPRP grant # 6-241-2-102 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors.Keywords: power amplifiers, amplifiers, communication systems, radar systems
Procedia PDF Downloads 11199 Private Technology Parks–The New Engine for Innovation Development in Russia
Authors: K. Volkonitskaya, S. Lyapina
Abstract:
According to the National Monitoring Centre of innovation infrastructure, scientific and technical activities and regional innovation systems by December 2014. 166 technology parks were established in Russia. Comparative analysis of technological parks performance in Russia, the USA, Israel and the European Union countries revealed significant reduction of key performance indicators in Russian innovation infrastructure institutes. The largest deviations were determined in the following indicators: new products and services launched, number of companies and jobs, amount of venture capital invested. Lower performance indicators of Russian technology parks can be partly explained by slack demand for national high-tech products and services, lack of qualified specialists in the sphere of innovation management and insufficient cooperation between different innovation infrastructure institutes. In spite of all constraints in innovation segment of Russian economy in 2010-2012 private investors for the first time proceeded to finance building of technological parks. The general purpose of the research is to answer two questions: why despite the significant investment risks private investors continue to implement such comprehensive infrastructure projects in Russia and is business model of private technological park more efficient than strategies of state innovation infrastructure institutes? The goal of the research was achieved by analyzing business models of private technological parks in Moscow, Kaliningrad, Astrakhan and Kazan. The research was conducted in two stages: the on-line survey of key performance indicators of private and state Russian technological parks and in-depth interviews with top managers and investors, who have already build private technological parks in by 2014 or are going to complete investment stage in 2014-2016. The results anticipated are intended to identify the reasons of efficient and inefficient technological parks performance. Furthermore, recommendations for improving the efficiency of state technological and industrial parks were formulated. Particularly, the recommendations affect the following issues: networking with other infrastructural institutes, services and infrastructure provided, mechanisms of public-private partnership and investment attraction. In general intensive study of private technological parks performance and development of effective mechanisms of state support can have a positive impact on the growth rates of the number of Russian technological, industrial and science parks.Keywords: innovation development, innovation infrastructure, private technology park, public-private partnership
Procedia PDF Downloads 43698 Exploring the Connectedness of Ad Hoc Mesh Networks in Rural Areas
Authors: Ibrahim Obeidat
Abstract:
Reaching a fully-connected network of mobile nodes in rural areas got a great attention between network researchers. This attention rose due to the complexity and high costs while setting up the needed infrastructures for these networks, in addition to the low transmission range these nodes has. Terranet technology, as an example, employs ad-hoc mesh network where each node has a transmission range not exceed one kilometer, this means that every two nodes are able to communicate with each other if they are just one kilometer far from each other, otherwise a third-party will play the role of the “relay”. In Terranet, and as an idea to reduce network setup cost, every node in the network will be considered as a router that is responsible of forwarding data between other nodes which result in a decentralized collaborative environment. Most researches on Terranet presents the idea of how to encourage mobile nodes to become more cooperative by letting their devices in “ON” state as long as possible while accepting to play the role of relay (router). This research presents the issue of finding the percentage of nodes in ad-hoc mesh network within rural areas that should play the role of relay at every time slot, relating to what is the actual area coverage of nodes in order to have the network reach the fully-connectivity. Far from our knowledge, till now there is no current researches discussed this issue. The research is done by making an implementation that depends on building adjacency matrix as an indicator to the connectivity between network members. This matrix is continually updated until each value in it refers to the number of hubs that should be followed to reach from one node to another. After repeating the algorithm on different area sizes, different coverage percentages for each size, and different relay percentages for several times, results extracted shows that for area coverage less than 5% we need to have 40% of the nodes to be relays, where 10% percentage is enough for areas with node coverage greater than 5%.Keywords: ad-hoc mesh networks, network connectivity, mobile ad-hoc networks, Terranet, adjacency matrix, simulator, wireless sensor networks, peer to peer networks, vehicular Ad hoc networks, relay
Procedia PDF Downloads 282