Search results for: distributed ledger technologies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5432

Search results for: distributed ledger technologies

3452 A Crop Growth Subroutine for Watershed Resources Management (WRM) Model

Authors: Kingsley Nnaemeka Ogbu, Constantine Mbajiorgu

Abstract:

Vegetation has a marked effect on runoff and has become an important component in hydrologic model. The watershed Resources Management (WRM) model, a process-based, continuous, distributed parameter simulation model developed for hydrologic and soil erosion studies at the watershed scale lack a crop growth component. As such, this model assumes a constant parameter values for vegetation and hydraulic parameters throughout the duration of hydrologic simulation. Our approach is to develop a crop growth algorithm based on the original plant growth model used in the Environmental Policy Integrated Climate Model (EPIC) model. This paper describes the development of a single crop growth model which has the capability of simulating all crops using unique parameter values for each crop. Simulated crop growth processes will reflect the vegetative seasonality of the natural watershed system. An existing model was employed for evaluating vegetative resistance by hydraulic and vegetative parameters incorporated into the WRM model. The improved WRM model will have the ability to evaluate the seasonal variation of the vegetative roughness coefficient with depth of flow and further enhance the hydrologic model’s capability for accurate hydrologic studies

Keywords: crop yield, roughness coefficient, PAR, WRM model

Procedia PDF Downloads 401
3451 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 428
3450 Benefits of Tele ICU in Remote Parts of India: A Study

Authors: Rajendra Raval

Abstract:

Tele ICU services leverage advanced telecommunication technologies to enhance intensive care unit (ICU) capabilities. By integrating real-time remote monitoring, diagnostic tools, and expert consultations, these services provide continuous, high-quality care to critically ill patients. Healthcare professionals can access patient data, view live video feeds, and collaborate with on-site ICU teams, regardless of their physical location. This model improves patient outcomes through timely interventions, optimizes resource utilization, and extends the reach of specialized care to underserved or remote areas. The implementation of Tele ICU services represents a significant advancement in critical care, bridging gaps in accessibility and ensuring a consistent standard of care across various settings.

Keywords: optimised human resource, remote areas, tele-ICU, telemedicine

Procedia PDF Downloads 16
3449 The Profit Trend of Cosmetics Products Using Bootstrap Edgeworth Approximation

Authors: Edlira Donefski, Lorenc Ekonomi, Tina Donefski

Abstract:

Edgeworth approximation is one of the most important statistical methods that has a considered contribution in the reduction of the sum of standard deviation of the independent variables’ coefficients in a Quantile Regression Model. This model estimates the conditional median or other quantiles. In this paper, we have applied approximating statistical methods in an economical problem. We have created and generated a quantile regression model to see how the profit gained is connected with the realized sales of the cosmetic products in a real data, taken from a local business. The Linear Regression of the generated profit and the realized sales was not free of autocorrelation and heteroscedasticity, so this is the reason that we have used this model instead of Linear Regression. Our aim is to analyze in more details the relation between the variables taken into study: the profit and the finalized sales and how to minimize the standard errors of the independent variable involved in this study, the level of realized sales. The statistical methods that we have applied in our work are Edgeworth Approximation for Independent and Identical distributed (IID) cases, Bootstrap version of the Model and the Edgeworth approximation for Bootstrap Quantile Regression Model. The graphics and the results that we have presented here identify the best approximating model of our study.

Keywords: bootstrap, edgeworth approximation, IID, quantile

Procedia PDF Downloads 155
3448 A Decentralized Application for Secure Data Handling of Wireless Networks Using Ethereum Smart Contracts

Authors: Midhun Xavier

Abstract:

This paper introduces a method to verify multi-agent systems in industrial control systems using blockchain technology. The proposed solution enables to record and verify each process that occurs while generating a customized product using Ethereum-based smart contracts. Node-Red software agents are developed with the help of semantic web technologies, and these software agents interact with IEC 61499 function blocks to execute the processes. The agent associated with each mechatronic component and its controller can communicate with the blockchain to record various events that occur during each process, and the latter smart contract helps to verify these process orders of the customized product.

Keywords: blockchain, Ethereum, node-red, IEC 61499, multi-agent system, MQTT

Procedia PDF Downloads 84
3447 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 450
3446 The Effects of Quality of Web-Based Applications on Competitive Advantage: An Empirical Study in Commercial Banks in Jordan

Authors: Faisal Asad Aburub

Abstract:

Many organizations are investing in web applications and technologies in order to be competitive, some of them could not achieve its goals. The quality of web-based applications could play an important role for organizations to be competitive. So the aim of this study is to investigate the impact of quality of web-based applications to achieve a competitive advantage. A new model has been developed. An empirical investigation was performed on a banking sector in Jordan to test the new model. The results show that impact of web-based applications on competitive advantage is significant. Finally, further work is planned to validate and evaluate the proposed model using several domains.

Keywords: competitive advantage, web-based applications, empirical investigation, commercial banks in Jordan

Procedia PDF Downloads 330
3445 Investigation into Micro-Grids with Renewable Energy Sources for Use as High Reliability Electrical Power Supply in a Nuclear Facility

Authors: Gerard R. Lekhema, Willie A Cronje, Ian Korir

Abstract:

The objective of this research work is to investigate the use of a micro-grid system to improve the reliability and availability of emergency electrical power in a nuclear facility. The nuclear facility is a safety-critical application that requires reliable electrical power for safe startup, operation and normal or emergency shutdown conditions. The majority of the nuclear facilities around the world utilize diesel generators as emergency power supply during loss of offsite power events. This study proposes the micro-grid system with distributed energy sources and energy storage systems for use as emergency power supply. The systems analyzed include renewable energy sources, decay heat recovery system and large scale energy storage system. The configuration of the micro-grid system is realized with guidelines of nuclear safety standards and requirements. The investigation results presented include performance analysis of the micro-grid system in terms of reliability and availability.

Keywords: emergency power supply, micro-grid, nuclear facility, renewable energy sources

Procedia PDF Downloads 388
3444 Using Hidden Markov Chain for Improving the Dependability of Safety-Critical Wireless Sensor Networks

Authors: Issam Alnader, Aboubaker Lasebae, Rand Raheem

Abstract:

Wireless sensor networks (WSNs) are distributed network systems used in a wide range of applications, including safety-critical systems. The latter provide critical services, often concerned with human life or assets. Therefore, ensuring the dependability requirements of Safety critical systems is of paramount importance. The purpose of this paper is to utilize the Hidden Markov Model (HMM) to elongate the service availability of WSNs by increasing the time it takes a node to become obsolete via optimal load balancing. We propose an HMM algorithm that, given a WSN, analyses and predicts undesirable situations, notably, nodes dying unexpectedly or prematurely. We apply this technique to improve on C. Lius’ algorithm, a scheduling-based algorithm which has served to improve the lifetime of WSNs. Our experiments show that our HMM technique improves the lifetime of the network, achieved by detecting nodes that die early and rebalancing their load. Our technique can also be used for diagnosis and provide maintenance warnings to WSN system administrators. Finally, our technique can be used to improve algorithms other than C. Liu’s.

Keywords: wireless sensor networks, IoT, dependability of safety WSNs, energy conservation, sleep awake schedule

Procedia PDF Downloads 97
3443 Interoperable Platform for Internet of Things at Home Applications

Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo

Abstract:

With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.

Keywords: cloud computing, IoT, robotics, smart house

Procedia PDF Downloads 373
3442 A Review on Big Data Movement with Different Approaches

Authors: Nay Myo Sandar

Abstract:

With the growth of technologies and applications, a large amount of data has been producing at increasing rate from various resources such as social media networks, sensor devices, and other information serving devices. This large collection of massive, complex and exponential growth of dataset is called big data. The traditional database systems cannot store and process such data due to large and complexity. Consequently, cloud computing is a potential solution for data storage and processing since it can provide a pool of resources for servers and storage. However, moving large amount of data to and from is a challenging issue since it can encounter a high latency due to large data size. With respect to big data movement problem, this paper reviews the literature of previous works, discusses about research issues, finds out approaches for dealing with big data movement problem.

Keywords: Big Data, Cloud Computing, Big Data Movement, Network Techniques

Procedia PDF Downloads 76
3441 Ternary Content Addressable Memory Cell with a Leakage Reduction Technique

Authors: Gagnesh Kumar, Nitin Gupta

Abstract:

Ternary Content Addressable Memory cells are mainly popular in network routers for packet forwarding and packet classification, but they are also useful in a variety of other applications that require high-speed table look-up. The main TCAM-design challenge is to decrease the power consumption associated with the large amount of parallel active circuitry, without compromising with speed or memory density. Furthermore, when the channel length decreases, leakage power becomes more significant, and it can even dominate dynamic power at lower technologies. In this paper, we propose a TCAM-design technique, called Virtual Power Supply technique that reduces the leakage by a substantial amount.

Keywords: match line (ML), search line (SL), ternary content addressable memory (TCAM), Leakage power (LP)

Procedia PDF Downloads 290
3440 Filling the Gap of Extraction of Digital Evidence from Emerging Platforms Without Forensics Tools

Authors: Yi Anson Lam, Siu Ming Yiu, Kam Pui Chow

Abstract:

Digital evidence has been tendering to courts at an exponential rate in recent years. As an industrial practice, most digital evidence is extracted and preserved using specialized and well-accepted forensics tools. On the other hand, the advancement in technologies enables the creation of quite a few emerging platforms such as Telegram, Signal etc. Existing (well-accepted) forensics tools were not designed to extract evidence from these emerging platforms. While new forensics tools require a significant amount of time and effort to be developed and verified, this paper tries to address how to fill this gap using quick-fix alternative methods for digital evidence collection (e.g., based on APIs provided by Apps) and discuss issues related to the admissibility of this evidence to courts with support from international courts’ stance and the circumstances of accepting digital evidence using these proposed alternatives.

Keywords: extraction, digital evidence, laws, investigation

Procedia PDF Downloads 61
3439 Improving Power Quality in Wind Power Generation System

Authors: A. Omeiri, A. Djellad, P. O. Logerais, O. Riou, J. F. Durastanti

Abstract:

With the growing of electrical energy demand, wind power capacity has experienced tremendous growth in the past decade, thanks to wind power’s environmental benefits. Direct driven permanent magnet synchronous generator (PMSG) with a full size back-to-back converter set is one of the promising technologies employed with wind power generation. Wind grid integration brings the problems of voltage fluctuation and harmonic pollution. In the present study, the filter is placed between the wind system and the network to reduce the total harmonic distortion (THD) and enhance power quality during disturbances. The models of wind turbine, PMSG, power electronic converters and the filter are implemented in MATLAB/SIMULINK environment.

Keywords: wind energy conversion system, PMSG, PWM, THD, power quality, passive filter

Procedia PDF Downloads 643
3438 Study Technical Possibilities of Agricultural Reuse of by-Products from Treatment Plant of Boumerdes, Algeria

Authors: Kadir Mokrane, Souag Doudja

Abstract:

In Algeria, one of the Mediterranean countries, water resources are limited and unevenly distributed in space and in time. Boumerdes, coastal town of Algeria, known for its farming and fishing activities. The region is also known for its semi-arid climate and a large water deficit. In order to preserve the quality of water bodies and to reduce withdrawals in the natural environment, it is necessary to seek alternative supplies. The reuse of treated wastewater seems to be a good alternative, especially for irrigation. In the framework of sustainable development, it is imperative to rationalize the use of water resources conventional and unconventional. That is why the re-use agricultural of by-products of the treatment is an alternative expected to preserve the environment and promotion of the agricultural sector. The present work aims, to search for the possibility of reuse of treated wastewater, and sludge resulting from treatment plant of the city of Boumerdes in agriculture, through the analysis of physical, chemical and bacteriological on the samples, and the continuous monitoring of the evolution of several elements during the period of study extended over 12 months, and then, the comparison of these test results to standards and guidelines established in the framework of irrigation and land application.

Keywords: treated water, sewage sludge, recycling, agriculture

Procedia PDF Downloads 243
3437 Laboratory Studies to Assess the Effect of Recron Fiber on Soil Subgrade Characteristics

Authors: Lokesh Gupta, Rakesh Kumar

Abstract:

Stabilization of weak subgrade soil is mainly aimed for the improvement of soil strength and its durability. Highway engineers are concerned to get the soil material or system that will hold under the design use conditions and for the designed life of the engineering project. The present study envisages the effect of Recron fibres mixed in different proportion (up to 1% by weight of dry soil) on Atterberg limits, Compaction of the soil, California bearing ratio (CBR) values and unconfined compressive strength (UCS) of the soil. The present study deals with the influence of varying in length (20 mm, 30mm, 40mm and 50mm) and percentage (0.25 %, 0.50 %, 0.75 % and 1.0 %) of fibre added to the soil samples. The aim of study is to determine the reinforcing effect of randomly distributed fibres on the Compaction characteristics, penetration resistance and unconfined compressive strength of soils. The addition of fibres leads to an increase in the optimum moisture content and decrease in maximum dry density. With the addition of the fibres, the increases in CBR and UCS values are observed. The test result shows higher CBR and unconfined compressive strength value for the soil reinforced with 0.5% Recron fibre, once keeping aspect ratio as 160.

Keywords: soil, recron fiber, unconfined compressive strength (UCS), California bearing ratio (CBR)

Procedia PDF Downloads 156
3436 Information and Communication Technology in Architectural Education: The Challenges

Authors: Oluropo Stephen Ilesanmi, Oluwole Ayodele Alejo

Abstract:

Architectural education, beyond training the students to become architects, impacts in them the appreciation of the responsibilities relating to public health, safety, and welfare. Architecture is no longer a personal philosophical or aesthetic pursuit by individuals, rather, it has to consider everyday needs of the people and use technology to give a liveable environment. In the present age, architectural education must have to grapple with the recent integration of technology, in particular, facilities offered by information and communication technology. Electronic technologies have moved architecture from the drawing board to cyberspace. The world is now a global village in which new information and methods are easily and quickly available to people at different poles of the globe. It is the position of this paper that in order to remain relevant in the ever-competing forces within the building industry, architectural education must show the impetus to continue to draw from technological advancements associated with the use of computers.

Keywords: architecture, education, communication, information, technology

Procedia PDF Downloads 201
3435 Modeling the Saltatory Conduction in Myelinated Axons by Order Reduction

Authors: Ruxandra Barbulescu, Daniel Ioan, Gabriela Ciuprina

Abstract:

The saltatory conduction is the way the action potential is transmitted along a myelinated axon. The potential diffuses along the myelinated compartments and it is regenerated in the Ranvier nodes due to the ion channels allowing the flow across the membrane. For an efficient simulation of populations of neurons, it is important to use reduced order models both for myelinated compartments and for Ranvier nodes and to have control over their accuracy and inner parameters. The paper presents a reduced order model of this neural system which allows an efficient simulation method for the saltatory conduction in myelinated axons. This model is obtained by concatenating reduced order linear models of 1D myelinated compartments and nonlinear 0D models of Ranvier nodes. The models for the myelinated compartments are selected from a series of spatially distributed models developed and hierarchized according to their modeling errors. The extracted model described by a nonlinear PDE of hyperbolic type is able to reproduce the saltatory conduction with acceptable accuracy and takes into account the finite propagation speed of potential. Finally, this model is again reduced in order to make it suitable for the inclusion in large-scale neural circuits.

Keywords: action potential, myelinated segments, nonlinear models, Ranvier nodes, reduced order models, saltatory conduction

Procedia PDF Downloads 154
3434 Flow Control Optimisation Using Vortex Generators in Turbine Blade

Authors: J. Karthik, G. Vinayagamurthy

Abstract:

Aerodynamic flow control is achieved by interaction of flowing medium with corresponding structure so that its natural flow state is disturbed to delay the transition point. This paper explains the aerodynamic effect and optimized design of Vortex Generators on the turbine blade to achieve maximum flow control. The airfoil is chosen from NREL [National Renewable Energy Laboratory] S-series airfoil as they are characterized with good lift characteristics and lower noise. Vortex generators typically chosen are Ogival, Rectangular, Triangular and Tapered Fin shapes attached near leading edge. Vortex generators are typically distributed from the primary to tip of the blade section. The design wind speed is taken as 6m/s and the computational analysis is executed. The blade surface is simulated using k- ɛ SST model and results are compared with X-FOIL results. The computational results are validated using Wind Tunnel Testing of the blade corresponding to the design speed. The effect of Vortex generators on the flow characteristics is studied from the results of analysis. By comparing the computational and test results of all shapes of Vortex generators; the optimized design is achieved for effective flow control corresponding to the blade.

Keywords: flow control, vortex generators, design optimisation, CFD

Procedia PDF Downloads 399
3433 Use of Fruit Beetles, Waxworms Larvae and Tiger Worms in Waste Conditioning for Composting

Authors: Waleed S. Alwaneen

Abstract:

In many countries, cow dung is used as farm manure and for biogas production. Several bacterial strains associated with cow dung such as Campylobacter, Salmonella sp. and Escherichia coli cause serious human diseases. The objective of the present study was to investigate the use of insect larvae including fruit beetle, waxworms and tiger worms to improve the breakdown of agricultural wastes and reduce their pathogen loads. Fresh cow faeces were collected from a cattle farm and distributed into plastic boxes (100 g/box). Each box was provided with 10 larvae of fruit beetle, Waxworms and Tiger worms, respectively. There were 3 replicates in each treatment including the control. Bacteria were isolated weekly from both control and cow faeces to which larvae were added to determine the bacterial populations. Results revealed that the bacterial load was higher in the cow faeces treated with fruit beetles than in the control, while the bacterial load was lower in the cow faeces treated with waxworms and tiger worms than in the control. The activities of the fruit beetle larvae led to the cow faeces being liquefied which provided a more conducive growing media for bacteria. Therefore, higher bacterial load in the cow faeces treated with fruit beetle might be attributed to the liquefaction of cow faeces.

Keywords: fruit beetle, waxworms, tiger worms, waste conditioning, composting

Procedia PDF Downloads 247
3432 Analyzing the Factors that Cause Parallel Performance Degradation in Parallel Graph-Based Computations Using Graph500

Authors: Mustafa Elfituri, Jonathan Cook

Abstract:

Recently, graph-based computations have become more important in large-scale scientific computing as they can provide a methodology to model many types of relations between independent objects. They are being actively used in fields as varied as biology, social networks, cybersecurity, and computer networks. At the same time, graph problems have some properties such as irregularity and poor locality that make their performance different than regular applications performance. Therefore, parallelizing graph algorithms is a hard and challenging task. Initial evidence is that standard computer architectures do not perform very well on graph algorithms. Little is known exactly what causes this. The Graph500 benchmark is a representative application for parallel graph-based computations, which have highly irregular data access and are driven more by traversing connected data than by computation. In this paper, we present results from analyzing the performance of various example implementations of Graph500, including a shared memory (OpenMP) version, a distributed (MPI) version, and a hybrid version. We measured and analyzed all the factors that affect its performance in order to identify possible changes that would improve its performance. Results are discussed in relation to what factors contribute to performance degradation.

Keywords: graph computation, graph500 benchmark, parallel architectures, parallel programming, workload characterization.

Procedia PDF Downloads 139
3431 Time Organization for Decongesting Urban Mobility: New Methodology Identifying People's Behavior

Authors: Yassamina Berkane, Leila Kloul, Yoann Demoli

Abstract:

Quality of life, environmental impact, congestion of mobility means, and infrastructures remain significant challenges for urban mobility. Solutions like car sharing, spatial redesign, eCommerce, and autonomous vehicles will likely increase the unit veh-km and the density of cars in urban traffic, thus reducing congestion. However, the impact of such solutions is not clear for researchers. Congestion arises from growing populations that must travel greater distances to arrive at similar locations (e.g., workplaces, schools) during the same time frame (e.g., rush hours). This paper first reviews the research and application cases of urban congestion methods through recent years. Rethinking the question of time, it then investigates people’s willingness and flexibility to adapt their arrival and departure times from workplaces. We use neural networks and methods of supervised learning to apply a new methodology for predicting peoples' intentions from their responses in a questionnaire. We created and distributed a questionnaire to more than 50 companies in the Paris suburb. Obtained results illustrate that our methodology can predict peoples' intentions to reschedule their activities (work, study, commerce, etc.).

Keywords: urban mobility, decongestion, machine learning, neural network

Procedia PDF Downloads 187
3430 The Relationship between Competency-Based Learning and Learning Efficiency of Media Communication Students at Suan Sunandha Rajabhat University

Authors: Somtop Keawchuer

Abstract:

This research aims to study (1) the relationship between competency-based learning and learning efficiency of new media communication students at Suan Sunandha University (2) the demographic factor effect on learning efficiency of students at Suan Sunandha University. This research method will use quantitative research; data was collected by questionnaires distributed to students from new media communication in management science faculty of Suan Sunandha Rajabhat University for 1340 sample by purposive sampling method. Data was analyzed by descriptive statistic including percentage, mean, standard deviation and inferential statistic including T-test, ANOVA and Pearson correlation for hypothesis testing. The results showed that the competency-based learning in term of ability to communicate, ability to think and solve the problem, life skills and ability to use technology has a significant relationship with learning efficiency in term of the cognitive domain, psychomotor domain and affective domain at the 0.05 level and which is in harmony with the research hypotheses.

Keywords: competency-based learning, learning efficiency, new media communication students, Suan Sunandha Rajabhat University

Procedia PDF Downloads 239
3429 Investigate the Effects of Geometrical Structure and Layer Orientation on Strength of 3D-FDM Rapid Prototyped Samples

Authors: Ahmed A.D. Sarhan, Chong Feng Duan, Mum Wai Yip, M. Sayuti

Abstract:

Rapid Prototyping (RP) technologies enable physical parts to be produced from various materials without depending on the conventional tooling. Fused Deposition Modeling (FDM) is one of the famous RP processes used at present. Tensile strength and compressive strength resistance will be identified for different sample structures and different layer orientations of ABS rapid prototype solid models. The samples will be fabricated by a FDM rapid prototyping machine in different layer orientations with variations in internal geometrical structure. The 0° orientation where layers were deposited along the length of the samples displayed superior strength and impact resistance over all the other orientations. The anisotropic properties were probably caused by weak interlayer bonding and interlayer porosity.

Keywords: building orientation, compression strength, rapid prototyping, tensile strength

Procedia PDF Downloads 691
3428 Channel Estimation for Orthogonal Frequency Division Multiplexing Systems over Doubly Selective Channels Base on DCS-DCSOMP Algorithm

Authors: Linyu Wang, Furui Huo, Jianhong Xiang

Abstract:

The Doppler shift generated by high-speed movement and multipath effects in the channel are the main reasons for the generation of a time-frequency doubly-selective (DS) channel. There is severe inter-carrier interference (ICI) in the DS channel. Channel estimation for an orthogonal frequency division multiplexing (OFDM) system over a DS channel is very difficult. The simultaneous orthogonal matching pursuit algorithm under distributed compressive sensing theory (DCS-SOMP) has been used in channel estimation for OFDM systems over DS channels. However, the reconstruction accuracy of the DCS-SOMP algorithm is not high enough in the low SNR stage. To solve this problem, in this paper, we propose an improved DCS-SOMP algorithm based on the inner product difference comparison operation (DCS-DCSOMP). The reconstruction accuracy is improved by increasing the number of candidate indexes and designing the comparison conditions of inner product difference. We combine the DCS-DCSOMP algorithm with the basis expansion model (BEM) to reduce the complexity of channel estimation. Simulation results show the effectiveness of the proposed algorithm and its advantages over other algorithms.

Keywords: OFDM, doubly selective, channel estimation, compressed sensing

Procedia PDF Downloads 90
3427 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 166
3426 Entrepreneurial Practice and Corruption in Tourism Sector: A Study of Entrepreneurial Orientation and Organizational Corruption in Nepali Star Hotels

Authors: Prabin Raj Gautam

Abstract:

Entrepreneurship in tourism sectors, particularly hotel entrepreneurship has contributed to Nepalese Gross Domestic Production (GDP). The tourist standard and star hotels in developing countries have not only been generating revenues but also providing international hospitality to the guest in the local areas. For doing so, these hotel enterprises must need to implement different business strategies to enhance and maintain their international business benchmark. The Entrepreneurial Orientation (EO) is core for making business strategies. Meanwhile, the corruption is labeled as negative factor for economic development. This paper presents the relationship between EO of Nepalese star hotels and organizational corruption. The study employed questionnaire survey as data collection tool under the quantitative methodology. Five hypotheses are developed and tested. After gathering the data form 216 questionnaire distributed to CEOs/Managers of the sample hotels, the findings show that out of five dimensions of EO, only autonomy, pro-activeness, and innovativeness are not significant to organizational corruption; however, risk-taking and competitive aggressiveness are found significant contributor. The descriptive statistics and structural equation modeling are employed to describe the data and fit the model.

Keywords: entrepreneurship, entrepreneurial orientation, organizational corruption, dimensions

Procedia PDF Downloads 313
3425 Microstructural Evidences for Exhaustion Theory of Low Temperature Creep in Martensitic Steels

Authors: Nagarjuna Remalli, Robert Brandt

Abstract:

Down-sizing of combustion engines in automobiles are prevailed owing to required increase in efficiency. This leads to a stress increment on valve springs, which affects their intended function due to an increase in relaxation. High strength martensitic steels are used for valve spring applications. Recent investigations unveiled that low temperature creep (LTC) in martensitic steels obey a logarithmic creep law. The exhaustion theory links the logarithmic creep behavior to an activation energy which is characteristic for any given time during creep. This activation energy increases with creep strain due to barriers of low activation energies exhausted during creep. The assumption of the exhaustion theory is that the material is inhomogeneous in microscopic scale. According to these assumptions it is anticipated that small obstacles (e. g. ε–carbides) having a wide range of size distribution are non-uniformly distributed in the materials. X-ray diffraction studies revealed the presence of ε–carbides in high strength martensitic steels. In this study, high strength martensitic steels that are crept in the temperature range of 75 – 150 °C were investigated with the aid of a transmission electron microscope for the evidence of an inhomogeneous distribution of obstacles having different size to examine the validation of exhaustion theory.

Keywords: creep mechanisms, exhaustion theory, low temperature creep, martensitic steels

Procedia PDF Downloads 258
3424 Geotechnical Engineering Solutions for Adaptation

Authors: Johnstone Walubengo Wangusi

Abstract:

Geotechnical engineering is a multidisciplinary field that encompasses the study of soil, rock, and groundwater properties and their interactions with civil engineering structures. This research paper provides an in-depth overview of geotechnical engineering, covering its fundamental principles, applications in civil infrastructure projects, and the challenges faced by practitioners in the field. Through a comprehensive examination of soil mechanics, foundation design, slope stability analysis, and geotechnical site investigation techniques, this paper aims to highlight the importance of geotechnical engineering in ensuring the safety, stability, and sustainability of infrastructure development. Additionally, it discusses emerging trends, innovative technologies, and future directions in geotechnical engineering research and practice.

Keywords: sustainable geotechnical engineering solutions, education and training for future generations geotechnical engineers, integration of geotechnical engineering and structural engineering, use of AI in geotechnical engineering modelling

Procedia PDF Downloads 45
3423 Detection of Intravenous Infiltration Using Impedance Parameters in Patients in a Long-Term Care Hospital

Authors: Ihn Sook Jeong, Eun Joo Lee, Jae Hyung Kim, Gun Ho Kim, Young Jun Hwang

Abstract:

This study investigated intravenous (IV) infiltration using bioelectrical impedance for 27 hospitalized patients in a long-term care hospital. Impedance parameters showed significant differences before and after infiltration as follows. First, the resistance (R) after infiltration significantly decreased compared to the initial resistance. This indicates that the IV solution flowing from the vein due to infiltration accumulates in the extracellular fluid (ECF). Second, the relative resistance at 50 kHz was 0.94 ± 0.07 in 9 subjects without infiltration and was 0.75 ± 0.12 in 18 subjects with infiltration. Third, the magnitude of the reactance (Xc) decreased after infiltration. This is because IV solution and blood components released from the vein tend to aggregate in the cell membrane (and acts analogously to the linear/parallel circuit), thereby increasing the capacitance (Cm) of the cell membrane and reducing the magnitude of reactance. Finally, the data points plotted in the R-Xc graph were distributed on the upper right before infiltration but on the lower left after infiltration. This indicates that the infiltration caused accumulation of fluid or blood components in the epidermal and subcutaneous tissues, resulting in reduced resistance and reactance, thereby lowering integrity of the cell membrane. Our findings suggest that bioelectrical impedance is an effective method for detection of infiltration in a noninvasive and quantitative manner.

Keywords: intravenous infiltration, impedance, parameters, resistance, reactance

Procedia PDF Downloads 175