Search results for: wireless transaction protocol
1813 Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks
Authors: Fisayo G. Ojo, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain
Abstract:
As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing.Keywords: discrete event simulation (DES), distributed computing, energy efficiency (EE), internet of things (IOT), quality of service (QOS), user equipment (UE), wireless mesh network (WMN), wireless sensor network (wsn), worldwide interoperability for microwave access x (WiMAX)
Procedia PDF Downloads 1921812 Wireless Backhauling for 5G Small Cell Networks
Authors: Abdullah A. Al Orainy
Abstract:
Small cell backhaul solutions need to be cost-effective, scalable, and easy to install. This paper presents an overview of small cell backhaul technologies. Wireless solutions including TV white space, satellite, sub-6 GHz radio wave, microwave and mmWave with their backhaul characteristics are discussed. Recent research on issues like beamforming, backhaul architecture, precoding and large antenna arrays, and energy efficiency for dense small cell backhaul with mmWave communications is reviewed. Recent trials of 5G technologies are summarized.Keywords: backhaul, small cells, wireless, 5G
Procedia PDF Downloads 5131811 To Design an Architectural Model for On-Shore Oil Monitoring Using Wireless Sensor Network System
Authors: Saurabh Shukla, G. N. Pandey
Abstract:
In recent times, oil exploration and monitoring in on-shore areas have gained much importance considering the fact that in India the oil import is 62 percent of the total imports. Thus, architectural model like wireless sensor network to monitor on-shore deep sea oil well is being developed to get better estimate of the oil prospects. The problem we are facing nowadays that we have very few restricted areas of oil left today. Countries like India don’t have much large areas and resources for oil and this problem with most of the countries that’s why it has become a major problem when we are talking about oil exploration in on-shore areas also the increase of oil prices has further ignited the problem. For this the use of wireless network system having relative simplicity, smallness in size and affordable cost of wireless sensor nodes permit heavy deployment in on-shore places for monitoring oil wells. Deployment of wireless sensor network in large areas will surely reduce the cost it will be very much cost effective. The objective of this system is to send real time information of oil monitoring to the regulatory and welfare authorities so that suitable action could be taken. This system architecture is composed of sensor network, processing/transmission unit and a server. This wireless sensor network system could remotely monitor the real time data of oil exploration and monitoring condition in the identified areas. For wireless sensor networks, the systems are wireless, have scarce power, are real-time, utilize sensors and actuators as interfaces, have dynamically changing sets of resources, aggregate behaviour is important and location is critical. In this system a communication is done between the server and remotely placed sensors. The server gives the real time oil exploration and monitoring conditions to the welfare authorities.Keywords: sensor, wireless sensor network, oil, sensor, on-shore level
Procedia PDF Downloads 4461810 On the Performance Analysis of Coexistence between IEEE 802.11g and IEEE 802.15.4 Networks
Authors: Chompunut Jantarasorn, Chutima Prommak
Abstract:
This paper presents an intensive measurement studying of the network performance analysis when IEEE 802.11g Wireless Local Area Networks (WLAN) coexisting with IEEE 802.15.4 Wireless Personal Area Network (WPAN). The measurement results show that the coexistence between both networks could increase the Frame Error Rate (FER) of the IEEE 802.15.4 networks up to 60% and it could decrease the throughputs of the IEEE 802.11g networks up to 55%.Keywords: wireless performance analysis, coexistence analysis, IEEE 802.11g, IEEE 802.15.4
Procedia PDF Downloads 5521809 Pilot Directional Protection Scheme Using Wireless Communication
Authors: Nitish Sharma, G. G. Karady
Abstract:
This paper presents a scheme for the protection of loop system from all type of faults using the direction of fault current. The presence of distributed generation in today’s system increases the complexity of fault detection as the power flow is bidirectional. Hence, protection scheme specific to this purpose needs to be developed. This paper shows a fast protection scheme using communication which can be fiber optic or wireless. In this paper, the possibility of wireless communication for protection is studied to exchange the information between the relays. The negative sequence and positive sequence directional elements are used to determine the direction of fault current. A PSCAD simulation is presented and validated using commercial SEL relays.Keywords: smart grid protection, pilot protection, power system simulation, wireless communication
Procedia PDF Downloads 6361808 Design Of High Sensitivity Transceiver for WSN
Authors: A. Anitha, M. Aishwariya
Abstract:
The realization of truly ubiquitous wireless sensor networks (WSN) demands Ultra-low power wireless communication capability. Because the radio transceiver in a wireless sensor node consumes more power when compared to the computation part it is necessary to reduce the power consumption. Hence, a low power transceiver is designed and implemented in a 120 nm CMOS technology for wireless sensor nodes. The power consumption of the transceiver is reduced still by maintaining the sensitivity. The transceiver designed combines the blocks including differential oscillator, mixer, envelope detector, power amplifiers, and LNA. RF signal modulation and demodulation is carried by On-Off keying method at 2.4 GHz which is said as ISM band. The transmitter demonstrates an output power of 2.075 mW while consuming a supply voltage of range 1.2 V-5.0 V. Here the comparison of LNA and power amplifier is done to obtain an amplifier which produces a high gain of 1.608 dB at receiver which is suitable to produce a desired sensitivity. The multistage RF amplifier is used to improve the gain at the receiver side. The power dissipation of the circuit is in the range of 0.183-0.323 mW. The receiver achieves a sensitivity of about -95 dBm with data rate of 1 Mbps.Keywords: CMOS, envelope detector, ISM band, LNA, low power electronics, PA, wireless transceiver
Procedia PDF Downloads 5191807 Multiple Query Optimization in Wireless Sensor Networks Using Data Correlation
Authors: Elaheh Vaezpour
Abstract:
Data sensing in wireless sensor networks is done by query deceleration the network by the users. In many applications of the wireless sensor networks, many users send queries to the network simultaneously. If the queries are processed separately, the network’s energy consumption will increase significantly. Therefore, it is very important to aggregate the queries before sending them to the network. In this paper, we propose a multiple query optimization framework based on sensors physical and temporal correlation. In the proposed method, queries are merged and sent to network by considering correlation among the sensors in order to reduce the communication cost between the sensors and the base station.Keywords: wireless sensor networks, multiple query optimization, data correlation, reducing energy consumption
Procedia PDF Downloads 3341806 Utility Assessment Model for Wireless Technology in Construction
Authors: Yassir AbdelRazig, Amine Ghanem
Abstract:
Construction projects are information intensive in nature and involve many activities that are related to each other. Wireless technologies can be used to improve the accuracy and timeliness of data collected from construction sites and shares it with appropriate parties. Nonetheless, the construction industry tends to be conservative and shows hesitation to adopt new technologies. A main concern for owners, contractors or any person in charge on a job site is the cost of the technology in question. Wireless technologies are not cheap. There are a lot of expenses to be taken into consideration, and a study should be completed to make sure that the importance and savings resulting from the usage of this technology is worth the expenses. This research attempts to assess the effectiveness of using the appropriate wireless technologies based on criteria such as performance, reliability, and risk. The assessment is based on a utility function model that breaks down the selection issue into alternatives attribute. Then the attributes are assigned weights and single attributes are measured. Finally, single attribute are combined to develop one single aggregate utility index for each alternative.Keywords: analytic hierarchy process, decision theory, utility function, wireless technologies
Procedia PDF Downloads 3421805 An Analytical Approach for Medication Protocol Errors from Pediatric Nurse Curriculum
Authors: Priyanka Jani
Abstract:
The main focus of this research is to consider the objective of nursing curriculum in concern with pediatric nurses in respect to various parameters such as causes, reporting and prevention of medication protocol errors. A design or method selected for the study is the descriptive and cross sectional with respect to analytical study. Nurses were selected from inpatient pediatric wards of 5 hospitals in Gujarat, as a population. 126 pediatric nurses gave approval to participate in the research and completed with quarter questionnaires. The actual data was collected and analyzed. The actual data was collected and analyzed. The medium age of the nurses was 25.7 ± 3.68 years; the maximum was lady (97.6%) pediatric nurses stated that the most common causes of medication protocol errors were large work time (69.2%) and a huge ratio of patient: nurse (59.9%). Even though the highest number of nurses (89%) made use of a medication protocol errors notification system, or else they use to check it before. Many errors were not reported and nurses cited abeyant claims of nurses in case of adverse and opposite output for patient (53.97%), distrust (52.45%), and fear of various/different protocol for mediations (42%) among the causes of insufficient of notification in concern to ignorance, nurses most commonly noted the requirement for efficient data concerning the safe use of medications (47.5%). This is the frequent study made by researcher in Gujarat about the pediatric nurse curriculum regarding medication protocol errors. The outputs debate that there is a requirement for ongoing coaching of pediatric nurses regarding safe & secure medication observation and that the causes and post reporting of medication protocol errors by hand further survey.Keywords: pediatric, medication, protocol, errors
Procedia PDF Downloads 2921804 Structural Health Monitoring of Offshore Structures Using Wireless Sensor Networking under Operational and Environmental Variability
Authors: Srinivasan Chandrasekaran, Thailammai Chithambaram, Shihas A. Khader
Abstract:
The early-stage damage detection in offshore structures requires continuous structural health monitoring and for the large area the position of sensors will also plays an important role in the efficient damage detection. Determining the dynamic behavior of offshore structures requires dense deployment of sensors. The wired Structural Health Monitoring (SHM) systems are highly expensive and always needs larger installation space to deploy. Wireless sensor networks can enhance the SHM system by deployment of scalable sensor network, which consumes lesser space. This paper presents the results of wireless sensor network based Structural Health Monitoring method applied to a scaled experimental model of offshore structure that underwent wave loading. This method determines the serviceability of the offshore structure which is subjected to various environment loads. Wired and wireless sensors were installed in the model and the response of the scaled BLSRP model under wave loading was recorded. The wireless system discussed in this study is the Raspberry pi board with Arm V6 processor which is programmed to transmit the data acquired by the sensor to the server using Wi-Fi adapter, the data is then hosted in the webpage. The data acquired from the wireless and wired SHM systems were compared and the design of the wireless system is verified.Keywords: condition assessment, damage detection, structural health monitoring, structural response, wireless sensor network
Procedia PDF Downloads 2761803 Wireless Based System for Continuous Electrocardiography Monitoring during Surgery
Authors: K. Bensafia, A. Mansour, G. Le Maillot, B. Clement, O. Reynet, P. Ariès, S. Haddab
Abstract:
This paper presents a system designed for wireless acquisition, the recording of electrocardiogram (ECG) signals and the monitoring of the heart’s health during surgery. This wireless recording system allows us to visualize and monitor the state of the heart’s health during a surgery, even if the patient is moved from the operating theater to post anesthesia care unit. The acquired signal is transmitted via a Bluetooth unit to a PC where the data are displayed, stored and processed. To test the reliability of our system, a comparison between ECG signals processed by a conventional ECG monitoring system (Datex-Ohmeda) and by our wireless system is made. The comparison is based on the shape of the ECG signal, the duration of the QRS complex, the P and T waves, as well as the position of the ST segments with respect to the isoelectric line. The proposed system is presented and discussed. The results have confirmed that the use of Bluetooth during surgery does not affect the devices used and vice versa. Pre- and post-processing steps are briefly discussed. Experimental results are also provided.Keywords: electrocardiography, monitoring, surgery, wireless system
Procedia PDF Downloads 3701802 Effect of Common Yoga Protocol on Reaction Time of Football Players
Authors: Vikram Singh
Abstract:
The objective of the study was to study the effectiveness of common yoga protocol on reaction time (simple visual reaction time-SVRT measured in milliseconds/seconds) of male football players in the age group of 15 to 21 years. The 40 boys were randomly assigned into two groups i.e. control and experimental. SVRT for both the groups were measured on day-1 and post intervention (common yoga protocol here) was measured after 45 days of training to the experimental group only. One way ANOVA (Univariate analysis) and Independent t-test using SPSS 23 statistical package was applied to get and analyze the results. There was a significant difference after 45 days of yoga protocol in simple visual reaction time of experimental group (p = .032), t (33.05) = 3.881, p = .000 (two-tailed). Null hypothesis (that there would be no post measurement differences in reaction times of control and experimental groups) was rejected. Where p<.05. Therefore alternate hypothesis was accepted.Keywords: footballers, t-test, yoga protocol, reaction time
Procedia PDF Downloads 2531801 Design of a Universal Wireless Battery Charger
Authors: Ahmad B. Musamih, Ahmad A. Albloushi, Ahmed H. Alshemeili, Abdulaziz Y. Alfili, Ala A. Hussien
Abstract:
This paper proposes a universal wireless battery charger design for portable electronic devices. As the number of portable electronics devices increases, the demand for more flexible and reliable charging techniques is becoming more urgent. A wireless battery charger differs from a traditional charger in the way the power transferred to the battery. In the latter, the power is transferred through electrical wires that connect the charger terminals to the battery terminals, while in the former; the power is transferred by induction without electrical connections. With a detection algorithm that detects the battery size and chemistry, the proposed charger will be able to accommodate a wide range of applications, and will allow a more flexible and reliable option to most of today’s portable electronics.Keywords: efficiency, magnetically-coupled resonators, resonance frequency, wireless power transfer
Procedia PDF Downloads 4541800 Fault-Detection and Self-Stabilization Protocol for Wireless Sensor Networks
Authors: Ather Saeed, Arif Khan, Jeffrey Gosper
Abstract:
Sensor devices are prone to errors and sudden node failures, which are difficult to detect in a timely manner when deployed in real-time, hazardous, large-scale harsh environments and in medical emergencies. Therefore, the loss of data can be life-threatening when the sensed phenomenon is not disseminated due to sudden node failure, battery depletion or temporary malfunctioning. We introduce a set of partial differential equations for localizing faults, similar to Green’s and Maxwell’s equations used in Electrostatics and Electromagnetism. We introduce a node organization and clustering scheme for self-stabilizing sensor networks. Green’s theorem is applied to regions where the curve is closed and continuously differentiable to ensure network connectivity. Experimental results show that the proposed GTFD (Green’s Theorem fault-detection and Self-stabilization) protocol not only detects faulty nodes but also accurately generates network stability graphs where urgent intervention is required for dynamically self-stabilizing the network.Keywords: Green’s Theorem, self-stabilization, fault-localization, RSSI, WSN, clustering
Procedia PDF Downloads 751799 Condition Monitoring System of Mine Air Compressors Based on Wireless Sensor Network
Authors: Sheng Fu, Yinbo Gao, Hao Lin
Abstract:
In the current mine air compressors monitoring system, there are some difficulties in the installation and maintenance because of the wired connection. To solve the problem, this paper introduces a new air compressors monitoring system based on ZigBee in which the monitoring parameters are transmitted wirelessly. The collecting devices are designed to form a cluster network to collect vibration, temperature, and pressure of air cylinders and other parameters. All these devices are battery-powered. Besides, the monitoring software in PC is developed using MFC. Experiments show that the designed wireless sensor network works well in the site environmental condition and the system is very convenient to be installed since the wireless connection. This monitoring system will have a wide application prospect in the upgrade of the old monitoring system of the air compressors.Keywords: condition monitoring, wireless sensor network, air compressor, zigbee, data collecting
Procedia PDF Downloads 5061798 Deep Learning-Based Channel Estimation for RIS-Assisted Unmanned Aerial Vehicle-Enabled Wireless Communication System
Authors: Getaneh Berie Tarekegn
Abstract:
Wireless communication via unmanned aerial vehicles (UAVs) has drawn a great deal of attention due to its flexibility in establishing line-of-sight (LoS) communications. However, in complex urban and dynamic environments, the movement of UAVs can be blocked by trees and high-rise buildings that obstruct directional paths. With reconfigurable intelligent surfaces (RIS), this problem can be effectively addressed. To achieve this goal, accurate channel estimation in RIS-assisted UAV-enabled wireless communications is crucial. This paper proposes an accurate channel estimation model using long short-term memory (LSTM) for a multi-user RIS-assisted UAV-enabled wireless communication system. According to simulation results, LSTM can improve the channel estimation performance of RIS-assisted UAV-enabled wireless communication.Keywords: channel estimation, reconfigurable intelligent surfaces, long short-term memory, unmanned aerial vehicles
Procedia PDF Downloads 571797 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network
Authors: Jin Xu
Abstract:
5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.Keywords: cloud radio access network, wireless network, cloud computing, multi-agent
Procedia PDF Downloads 4241796 Key Transfer Protocol Based on Non-invertible Numbers
Authors: Luis A. Lizama-Perez, Manuel J. Linares, Mauricio Lopez
Abstract:
We introduce a method to perform remote user authentication on what we call non-invertible cryptography. It exploits the fact that the multiplication of an invertible integer and a non-invertible integer in a ring Zn produces a non-invertible integer making infeasible to compute factorization. The protocol requires the smallest key size when is compared with the main public key algorithms as Diffie-Hellman, Rivest-Shamir-Adleman or Elliptic Curve Cryptography. Since we found that the unique opportunity for the eavesdropper is to mount an exhaustive search on the keys, the protocol seems to be post-quantum.Keywords: invertible, non-invertible, ring, key transfer
Procedia PDF Downloads 1791795 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations
Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson
Abstract:
Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.Keywords: oblivious transfer, quantum protocol, cryptography, XOR
Procedia PDF Downloads 1261794 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
Abstract:
Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability
Procedia PDF Downloads 2931793 Study and Analysis of Optical Intersatellite Links
Authors: Boudene Maamar, Xu Mai
Abstract:
Optical Intersatellite Links (OISLs) are wireless communications using optical signals to interconnect satellites. It is expected to be the next generation wireless communication technology according to its inherent characteristics like: an increased bandwidth, a high data rate, a data transmission security, an immunity to interference, and an unregulated spectrum etc. Optical space links are the best choice for the classical communication schemes due to its distinctive properties; high frequency, small antenna diameter and lowest transmitted power, which are critical factors to define a space communication. This paper discusses the development of free space technology and analyses the parameters and factors to establish a reliable intersatellite links using an optical signal to exchange data between satellites.Keywords: optical intersatellite links, optical wireless communications, free space optical communications, next generation wireless communication
Procedia PDF Downloads 4471792 Specific Emitter Identification Based on Refined Composite Multiscale Dispersion Entropy
Authors: Shaoying Guo, Yanyun Xu, Meng Zhang, Weiqing Huang
Abstract:
The wireless communication network is developing rapidly, thus the wireless security becomes more and more important. Specific emitter identification (SEI) is an vital part of wireless communication security as a technique to identify the unique transmitters. In this paper, a SEI method based on multiscale dispersion entropy (MDE) and refined composite multiscale dispersion entropy (RCMDE) is proposed. The algorithms of MDE and RCMDE are used to extract features for identification of five wireless devices and cross-validation support vector machine (CV-SVM) is used as the classifier. The experimental results show that the total identification accuracy is 99.3%, even at low signal-to-noise ratio(SNR) of 5dB, which proves that MDE and RCMDE can describe the communication signal series well. In addition, compared with other methods, the proposed method is effective and provides better accuracy and stability for SEI.Keywords: cross-validation support vector machine, refined com- posite multiscale dispersion entropy, specific emitter identification, transient signal, wireless communication device
Procedia PDF Downloads 1291791 Deep Learning-Based Channel Estimation for Reconfigurable Intelligent Surface-Assisted Unmanned Aerial Vehicle-Enabled Wireless Communication System
Authors: Getaneh Berie Tarekegn
Abstract:
Wireless communication via unmanned aerial vehicles (UAVs) has drawn a great deal of attention due to its flexibility in establishing line-of-sight (LoS) communications. However, in complex urban and dynamic environments, the movement of UAVs can be blocked by trees and high-rise buildings that obstruct directional paths. With reconfigurable intelligent surfaces (RIS), this problem can be effectively addressed. To achieve this goal, accurate channel estimation in RIS-assisted UAV-enabled wireless communications is crucial. This paper proposes an accurate channel estimation model using long short-term memory (LSTM) for a multi-user RIS-assisted UAV-enabled wireless communication system. According to simulation results, LSTM can improve the channel estimation performance of RIS-assisted UAV-enabled wireless communication.Keywords: channel estimation, reconfigurable intelligent surfaces, long short-term memory, unmanned aerial vehicles
Procedia PDF Downloads 1121790 Software Quality Assurance in 5G Technology-Redefining Wireless Communication: A Comprehensive Survey
Authors: Sumbal Riaz, Sardar-un-Nisa, Mehreen Sirshar
Abstract:
5G - The 5th generation of mobile phone and data communication standards is the next edge of innovation for whole mobile industry. 5G is Real Wireless World System and it will provide a totally wireless communication system all over the world without limitations. 5G uses many 4g technologies and it will hit the market in 2020. This research is the comprehensive survey on the quality parameters of 5G technology.5G provide High performance, Interoperability, easy roaming, fully converged services, friendly interface and scalability at low cost. To meet the traffic demands in future fifth generation wireless communications systems will include i) higher densification of heterogeneous networks with massive deployment of small base stations supporting various Radio Access Technologies (RATs), ii) use of massive Multiple Input Multiple Output (MIMO) arrays, iii) use of millimetre Wave spectrum where larger wider frequency bands are available, iv) direct device to device (D2D) communication, v) simultaneous transmission and reception, vi) cognitive radio technology.Keywords: 5G, 5th generation, innovation, standard, wireless communication
Procedia PDF Downloads 4441789 A Study on Relationships between Authenticity of Transactions, Quality of Relationships, and Transaction Performances
Authors: Chan Kwon Park, Chae-Bogk Kim, Sung-Min Park
Abstract:
This study is a research on the authenticity of transactions between corporations and quality of their relationships and transaction performances. As the factors of authenticity of transactions, honesty, transparency, customer orientation and consistency were selected; as the factors of quality of relationships, trust and commitment were selected, and as the factors of transactions performances, intention of repeat transactions and switching intention were selected, and on these relationships a hypothesis was established, and verification was conducted. First, the factors of the authenticity of transactions positively influenced the factors of quality of relationships. Thus, a higher level of authenticity of transactions can lead to higher level of trust and commitment. Second, the factors of quality of relationships made a positive influence on the intention of repeat transactions, while a negative influence in the switching intention. Third, it showed that trust and commitment as the factors of quality of relationships functioned partly as the parameter between the authenticity of transactions and transaction performances. Finally, it proved that the factors of the authenticity of transactions improved trust and commitment in transactions between corporations and further improved the intention of repeat transactions while they decreased the switching intention.Keywords: authenticity of transactions, trust, commitment, intention of repeat transactions, switching intention
Procedia PDF Downloads 3731788 Revolutionizing RNA Extraction: A Unified, Sustainable, and Rapid Protocol for High-Quality Isolation from Diverse Tissues
Authors: Ying Qi Chan, Chunyu Li, Xu Rou Yoyo Ma, Yaya Li, Saber Khederzadeh
Abstract:
In the ever-evolving landscape of genome extraction protocols, the existing methodologies grapple with issues ranging from sub-optimal yields and compromised quality to time-intensive procedures and reliance on hazardous reagents, often necessitating substantial tissue quantities. This predicament is particularly challenging for scientists in developing countries, where resources are limited. Our investigation presents a protocol for the efficient extraction of high-yield RNA from various tissues such as muscle, insect, and plant samples. Noteworthy for its advantages, our protocol stands out as the safest, swiftest (completed in just 38 minutes), most cost-effective (coming in at a mere US$0.017), and highly efficient method in comparison to existing protocols. Notably, our method avoids the use of hazardous or toxic chemicals such as chloroform and phenol and enzymatic agents like RNase and Proteinase K. Our RNA extraction protocol has demonstrated clear advantages over other methods, including commercial kits, in terms of yield. This nucleic acid extraction protocol is more environmentally and research-friendly, suitable for a range of tissues, even in tiny volumes, hence facilitating various genetic diagnosis and researches across the globe.Keywords: RNA extraction, rapid protocol, universal method, diverse tissues
Procedia PDF Downloads 741787 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 4511786 Development and Investigation of Sustainable Wireless Sensor Networks for forest Ecosystems
Authors: Shathya Duobiene, Gediminas Račiukaitis
Abstract:
Solar-powered wireless sensor nodes work best when they operate continuously with minimal energy consumption. Wireless Sensor Networks (WSNs) are a new technology opens up wide studies, and advancements are expanding the prevalence of numerous monitoring applications and real-time aid for environments. The Selective Surface Activation Induced by Laser (SSAIL) technology is an exciting development that gives the design of WSNs more flexibility in terms of their shape, dimensions, and materials. This research work proposes a methodology for using SSAIL technology for forest ecosystem monitoring by wireless sensor networks. WSN monitoring the temperature and humidity were deployed, and their architectures are discussed. The paper presents the experimental outcomes of deploying newly built sensor nodes in forested areas. Finally, a practical method is offered to extend the WSN's lifespan and ensure its continued operation. When operational, the node is independent of the base station's power supply and uses only as much energy as necessary to sense and transmit data.Keywords: internet of things (IoT), wireless sensor network, sensor nodes, SSAIL technology, forest ecosystem
Procedia PDF Downloads 721785 Conceptual Design of a Wi-Fi and GPS Based Robotic Library Using an Intelligent System
Authors: M. S. Sreejith, Steffy Joy, Abhishesh Pal, Beom-Sahng Ryuh, V. R. Sanal Kumar
Abstract:
In this paper an attempt has been made for the design of a robotic library using an intelligent system. The robot works on the ARM microprocessor, motor driver circuit with 5 degrees of freedom with Wi-Fi and GPS based communication protocol. The authenticity of the library books is controlled by RFID. The proposed robotic library system is facilitated with embedded system and ARM. In this library issuance system the previous potential readers’ authentic review reports have been taken into consideration for recommending suitable books to the deserving new users and the issuance of books or periodicals is based on the users’ decision. We have conjectured that the Wi-Fi based robotic library management system would allow fast transaction of books issuance and it also produces quality readers.Keywords: GPS bsed based Robotic library, library management system, robotic library, Wi-Fi library
Procedia PDF Downloads 3071784 Modeling and Design of Rectenna for Low Power Medical Implants
Authors: Madhav Pant, Khem N. Poudel
Abstract:
Wireless power transfer is continuously becoming more powerful and compact in medical implantable devices and the wide range of applications. A rectenna is designed for wireless power transfer technique that can be applied to medical implant devices. The experiment is performed using ANSYS HFSS, a full wave electromagnetic simulation. The dipole antenna combinations operating at 2.4 GHz are used for wireless power transfer and the maximum DC voltage reception by the implant considering International Commission on Non-Ionizing Radiation Protection (ICNIRP) regulation. The power receiving dipole antenna is placed inside the cylindrical geometry having the similar properties of the human body at the frequency of 2.4 GHz. Our design can provide the power at the depth of 5 mm skin and 5mm of bone for the implant. The voltage doubler/quadrupler rectifier in ANSYS Simplorer is used to calculate the exact DC current utilized by implant inside the human body. The qualitative design and analysis of this wireless power transfer method could also be used for other biomedical implants systems such as cardiac pacemaker, insulin pump, and retinal implants.Keywords: dipole antenna, medical implants, wireless power transfer, rectifier
Procedia PDF Downloads 172