Search results for: mobile host
423 A Study of Geographic Information System Combining with GPS and 3G for Parking Guidance and Information System
Authors: Yu-Chi Shiue, Jyong Lin, Shih-Chang Chen
Abstract:
With the increase of economic behavior and the upgrade of living standar, the ratio for people in Taiwan who own automobiles and motorcycles have recently increased with multiples. Therefore, parking issues will be a big challenge to facilitate traffic network and ensure urban life quality. The Parking Guidance and Information System is one of important systems for Advanced Traveler Information Services (ATIS). This research proposes a parking guidance and information system which integrates GPS and 3G network for a map on the Geographic Information System to solution inadequate of roadside information kanban. The system proposed in this study mainly includes Parking Host, Parking Guidance and Information Server, Geographic Map and Information System as well as Parking Guidance and Information Browser. The study results show this system can increase driver-s efficiency to find parking space and efficiently enhance parking convenience in comparison with roadside kanban system.Keywords: Geographic Information System, 3G, GPS, parkinginformation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1814422 High Performance Electrocardiogram Steganography Based on Fast Discrete Cosine Transform
Authors: Liang-Ta Cheng, Ching-Yu Yang
Abstract:
Based on fast discrete cosine transform (FDCT), the authors present a high capacity and high perceived quality method for electrocardiogram (ECG) signal. By using a simple adjusting policy to the 1-dimentional (1-D) DCT coefficients, a large volume of secret message can be effectively embedded in an ECG host signal and be successfully extracted at the intended receiver. Simulations confirmed that the resulting perceived quality is good, while the hiding capability of the proposed method significantly outperforms that of existing techniques. In addition, our proposed method has a certain degree of robustness. Since the computational complexity is low, it is feasible for our method being employed in real-time applications.Keywords: Data hiding, ECG steganography, fast discrete cosine transform, 1-D DCT bundle, real-time applications.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 812421 Designing Mobile Application to Motivate Young People to Visit Cultural Heritage Sites
Authors: Yuko Hiramatsu, Fumihiro Sato, Atsushi Ito, Hiroyuki Hatano, Mie Sato, Yu Watanabe, Akira Sasaki
Abstract:
This paper presents a mobile phone application developed for sightseeing in Nikko, one of the cultural world heritages in Japan, using the BLE (Bluetooth Low Energy) beacon. Based on our pre-research, we decided to design our application for young people who walk around the area actively, but know little about the tradition and culture of Nikko. One solution is to construct many information boards to explain; however, it is difficult to construct new guide plates in cultural world heritage sites. The smartphone is a good solution to send such information to such visitors. This application was designed using a combination of the smartphone and beacons, set in the area, so that when a tourist passes near a beacon, the application displays information about the area including a map, historical or cultural information about the temples and shrines, and local shops nearby as well as a bus timetable. It is useful for foreigners, too. In addition, we developed quizzes relating to the culture and tradition of Nikko to provide information based on the Zeigarnik effect, a psychological effect. According to the results of our trials, tourists positively evaluated the basic information and young people who used the quiz function were able to learn the historical and cultural points. This application helped young visitors at Nikko to understand the cultural elements of the site. In addition, this application has a function to send notifications. This function is designed to provide information about the local community such as shops, local transportation companies and information office. The application hopes to also encourage people living in the area, and such cooperation from the local people will make this application vivid and inspire young visitors to feel that the cultural heritage site is still alive today. This is a gateway for young people to learn about a traditional place and understand the gravity of preserving such areas.
Keywords: BLE beacon, smartphone application, Zeigarnik effect, world heritage site, school trip.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1958420 Development and Evaluation of a Portable Ammonia Gas Detector
Authors: Jaheon Gu, Wooyong Chung, Mijung Koo, Seonbok Lee, Gyoutae Park, Sangguk Ahn, Hiesik Kim, Jungil Park
Abstract:
In this paper, we present a portable ammonia gas detector for performing the gas safety management efficiently. The display of the detector is separated from its body. The display module is received the data measured from the detector using ZigBee. The detector has a rechargeable li-ion battery which can be use for 11~12 hours, and a Bluetooth module for sending the data to the PC or the smart devices. The data are sent to the server and can access using the web browser or mobile application. The range of the detection concentration is 0~100ppm.
Keywords: Ammonia, detector, gas safety, portable.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1538419 Audio Watermarking Using Spectral Modifications
Authors: Jyotsna Singh, Parul Garg, Alok Nath De
Abstract:
In this paper, we present a non-blind technique of adding the watermark to the Fourier spectral components of audio signal in a way such that the modified amplitude does not exceed the maximum amplitude spread (MAS). This MAS is due to individual Discrete fourier transform (DFT) coefficients in that particular frame, which is derived from the Energy Spreading function given by Schroeder. Using this technique one can store double the information within a given frame length i.e. overriding the watermark on the host of equal length with least perceptual distortion. The watermark is uniformly floating on the DFT components of original signal. This helps in detecting any intentional manipulations done on the watermarked audio. Also, the scheme is found robust to various signal processing attacks like presence of multiple watermarks, Additive white gaussian noise (AWGN) and mp3 compression.Keywords: Discrete Fourier Transform, Spreading Function, Watermark, Pseudo Noise Sequence, Spectral Masking Effect
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1704418 Exploring the Perspective of Service Quality in mHealth Services during the COVID-19 Pandemic
Authors: Wan-I Lee, Nelio Mendoza Figueredo
Abstract:
The impact of COVID-19 has a significant effect on all sectors of society globally. Health information technology (HIT) has become an effective health strategy in this age of distancing. In this regard, Mobile Health (mHealth) plays a critical role in managing patient and provider workflows during the COVID-19 pandemic. Therefore, the users' perception of service quality about mHealth services plays a significant role in shaping confidence and subsequent behaviors regarding the mHealth users' intention of use. This study's objective was to explore levels of user attributes analyzed by a qualitative method of how health practitioners and patients are satisfied or dissatisfied with using mHealth services; and analyzed the users' intention in the context of Taiwan during the COVID-19 pandemic. This research explores the experienced usability of a mHealth services during the Covid-19 pandemic. This study uses qualitative methods that include in-depth and semi-structured interviews that investigate participants' perceptions and experiences and the meanings they attribute to them. The five cases consisted of health practitioners, clinic staff, and patients' experiences using mHealth services. This study encourages participants to discuss issues related to the research question by asking open-ended questions, usually in one-to-one interviews. The findings show the positive and negative attributes of mHealth service quality. Hence, the significant importance of patients' and health practitioners' issues on several dimensions of perceived service quality is system quality, information quality, and interaction quality. A concept map for perceptions regards to emergency uses' intention of mHealth services process is depicted. The findings revealed that users pay more attention to "Medical care", "ease of use" and "utilitarian benefits" and have less importance for "Admissions and Convenience" and "Social influence". To improve mHealth services, the mHealth providers and health practitioners should better manage users' experiences to enhance mHealth services. This research contributes to the understanding of service quality issues in mHealth services during the COVID-19 pandemic.
Keywords: COVID-19, mobile health, mHealth, service quality, use intention.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 697417 Analytical Model of Connection Establishment Duration Calculation in Wireless Networks
Authors: Y. Chaiko
Abstract:
It is important to provide possibility of so called “handover" for the mobile subscriber from GSM network to Wi-Fi network and back. To solve specified problem it is necessary to estimate connection time between base station and wireless access point. Difficulty to estimate this parameter is that it doesn-t described in specifications of the standard and, hence, no recommended value is given. In this paper, the analytical model is presented that allows the estimating connection time between base station and IEEE 802.11 access point.Keywords: Access point, connection procedure, Wi-Fi network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1722416 Topology Influence on TCP Congestion Control Performance in Multi-hop Ad Hoc Wireless
Authors: Haniza N., Md Khambari, M. N, Shahrin S., Adib M.Monzer Habbal, Suhaidi Hassan
Abstract:
Wireless ad hoc nodes are freely and dynamically self-organize in communicating with others. Each node can act as host or router. However it actually depends on the capability of nodes in terms of its current power level, signal strength, number of hops, routing protocol, interference and others. In this research, a study was conducted to observe the effect of hops count over different network topologies that contribute to TCP Congestion Control performance degradation. To achieve this objective, a simulation using NS-2 with different topologies have been evaluated. The comparative analysis has been discussed based on standard observation metrics: throughput, delay and packet loss ratio. As a result, there is a relationship between types of topology and hops counts towards the performance of ad hoc network. In future, the extension study will be carried out to investigate the effect of different error rate and background traffic over same topologies.Keywords: NS-2, network topology, network performance, multi-hops
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1572415 Audio Watermarking Based on Compression-expansion Technique
Authors: Say Wei Foo, Qi Dong
Abstract:
A novel robust audio watermarking scheme is proposed in this paper. In the proposed scheme, the host audio signals are segmented into frames. Two consecutive frames are assessed if they are suitable to represent a watermark bit. If so, frequency transform is performed on these two frames. The compressionexpansion technique is adopted to generate distortion over the two frames. The distortion is used to represent one watermark bit. Psychoacoustic model is applied to calculate local auditory mask to ensure that the distortion is not audible. The watermarking schemes using mono and stereo audio signals are designed differently. The correlation-based detection method is used to detect the distortion and extract embedded watermark bits. The experimental results show that the quality degradation caused by the embedded watermarks is perceptually transparent and the proposed schemes are very robust against different types of attacks.Keywords: Audio watermarking, Compression-expansion, Stereo signals, Robustness.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1645414 A Video Watermarking Algorithm Based on Chaotic and Wavelet Neural Network
Authors: Jiadong Liang
Abstract:
This paper presented a video watermarking algorithm based on wavelet chaotic neural network. First, to enhance binary image’s security, the algorithm encrypted it with double chaotic based on Arnold and Logistic map, Then, the host video was divided into some equal frames and distilled the key frame through chaotic sequence which generated by Logistic. Meanwhile, we distilled the low frequency coefficients of luminance component and self-adaptively embedded the processed image watermark into the low frequency coefficients of the wavelet transformed luminance component with the wavelet neural network. The experimental result suggested that the presented algorithm has better invisibility and robustness against noise, Gaussian filter, rotation, frame loss and other attacks.
Keywords: Video watermark, double chaotic encryption, wavelet neural network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1052413 Diasporic Discourse and Body Codes:Transnational Identities in Three Representative Chinese-French Artists
Authors: Wen-Hui Chang
Abstract:
This paper focuses upon three such painters working in France from this time and their representations both of their host country in which they found themselves displaced, and of their homeland which they represent through refracted memories from their new perspective in Europe. What is their representation of France and China´╝ÅTaiwan? Is it Otherness or an origin? This paper also attempts to explore the three artists- diasporic lives and to redefine their transnational identities. Hou Chin-lang, the significance of his multiple-split images serve to highlight the intricate relationships between his work and the surrounding family, and to reveal his identity of his Taiwan “homeland". Yin Xin takes paintings from the Western canon and subjects them to a process of transformation through Chinese imagery. In the same period, Lin Li-ling, transforms the transnational spirit of Yin Xin to symbolic codes with neutered female bodies and tatoos, thus creates images that challenge the boundaries of both gender and nationality.Keywords: Body Codes, Chinese French, Diasporic Discourse, Identity
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1402412 Cluster Based Ant Colony Routing Algorithm for Mobile Ad-Hoc Networks
Authors: Alaa E. Abdallah, Bajes Y. Alskarnah
Abstract:
Ant colony based routing algorithms are known to grantee the packet delivery, but they suffer from the huge overhead of control messages which are needed to discover the route. In this paper we utilize the network nodes positions to group the nodes in connected clusters. We use clusters-heads only on forwarding the route discovery control messages. Our simulations proved that the new algorithm has decreased the overhead dramatically without affecting the delivery rate.
Keywords: Ant colony-based routing, position-based routing, MANET.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1564411 Two Approaches to Code Mobility in an Agent-based E-commerce System
Authors: Costin Badica, Maria Ganzha, Marcin Paprzycki
Abstract:
Recently, a model multi-agent e-commerce system based on mobile buyer agents and transfer of strategy modules was proposed. In this paper a different approach to code mobility is introduced, where agent mobility is replaced by local agent creation supplemented by similar code mobility as in the original proposal. UML diagrams of agents involved in the new approach to mobility and the augmented system activity diagram are presented and discussed.
Keywords: Agent system, agent mobility, code mobility, e-commerce, UML formalization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1435410 Authentication in Multi-Hop Wireless Mesh Networks
Authors: Kaleemullah Khan, Muhammmad Akbar
Abstract:
Wireless Mesh Networks (WMNs) are an emerging technology for last-mile broadband access. In WMNs, similar to ad hoc networks, each user node operates not only as a host but also as a router. User packets are forwarded to and from an Internet-connected gateway in multi-hop fashion. The WMNs can be integrated with other networking technologies i.e. ad hoc networks, to implement a smooth network extension. The meshed topology provides good reliability and scalability, as well as low upfront investments. Despite the recent start-up surge in WMNs, much research remains to be done in standardizing the functional parameters of WMNs to fully exploit their full potential. An edifice of the security concerns of these networks is authentication of a new client joining an integrated ad hoc network and such a scenario will require execution of a multihop authentication technique. Our endeavor in this paper is to introduce a secure authentication technique, with light over-heads that can be conveniently implemented for the ad-hoc nodes forming clients of an integrated WMN, thus facilitating their inter-operability.Keywords: Multi-Hop WMNs, PANA, EAP-TTLS, Authentication, RADIUS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1820409 Local Algorithm for Establishing a Virtual Backbone in 3D Ad Hoc Network
Authors: Alaa E. Abdallah, M. Bsoul, Emad E. Abdallah, Ahmad Al-Khasawneh, Muath Alzghool
Abstract:
Due to the limited lifetime of the nodes in ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can be improved. One common design for routing protocols in mobile ad hoc networks is to use positioning information; we use the node-s geometric locations to introduce an algorithm that can construct the virtual backbone structure locally in 3D environment. The algorithm construction has a constant time.
Keywords: Virtual backbone, dominating set, UDG.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1679408 Trajectory Tracking Using Artificial Potential Fields
Authors: Krishna S. Raghuwaiya, Shonal Singh, Jito Vanualailai
Abstract:
In this paper, the trajectory tracking problem for carlike mobile robots have been studied. The system comprises of a leader and a follower robot. The purpose is to control the follower so that the leader-s trajectory is tracked with arbitrary desired clearance to avoid inter-robot collision while navigating in a terrain with obstacles. A set of artificial potential field functions is proposed using the Direct Method of Lyapunov for the avoidance of obstacles and attraction to their designated targets. Simulation results prove the efficiency of our control technique.
Keywords: Control, Trajectory Tracking, Lyapunov.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2257407 Electrochemical Performance of Al-Mn2O3 Based Electrode Materials
Authors: Noor Ul Ain Bhatti, M. Junaid Khan, Javed Ahmad, Murtaza Saleem, Shahid M. Ramay, Saadat A. Siddiqi
Abstract:
Manganese oxide is being recently used as electrode material for rechargeable batteries. In this study, Al incorporated Mn2O3 compositions were synthesized to study the effect of Al doping on electrochemical performance of host material. Structural studies were carried out using X-ray diffraction analysis to confirm the phase stability and explore the lattice parameters, crystallite size, lattice strain, density and cell volume. Morphology and composition were analyzed using field emission scanning electron microscope and energy dispersive X-ray spectroscopy, respectively. Dynamic light scattering analysis was performed to observe the average particle size of the compositions. FTIR measurements exhibit the O-Al-O and O-Mn-O and Al-O bonding and with increasing the concentration of Al, the vibrational peaks of Mn-O become sharper. An enhanced electrochemical performance was observed in compositions with higher Al content.
Keywords: Mn2O3, electrode materials, energy storage and conversion, electrochemical performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1860406 How CATV Survive in the Era of Convergence?
Authors: J. Park, J. Song, B. Lee
Abstract:
The purpose of this paper is to analyze the case of the U.S. Pivot and to suggest an appropriate model including entry strategies and success factors for QPS of Cable TV. The telecommunication companies have been operating QPS including IPTV service, which enables them to cross over broadcasting areas. Due to this circumstance, the Cable TV operators are now concerned and are planning to add QPS with the mobile service. Based on the Porter's five forces model, an analytical framework has been proposed to MVNO in Cable TV industry in the United States. As a result of this study, MVNO in Cable TV industry has to have a clear killer application with their sufficient contents. Subsequently, the direction of the future Cable TV industry is proposed.Keywords: CATV, MVNO, Pivot, QPS
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1553405 The Investigation of the Possible Connections between Acculturation and the Acquisition of a Second Language on Libyan Teenage Students
Authors: Hamza M. A. Muftah
Abstract:
The study investigates the possible connections between acculturation and the acquisition of a second language on Libyan teenage students in Australia. Specifically, the study examined how various socio-psychological variables influenced English oral proficiency (oral communicative competence and native-like pronunciation) of the participants. In addition, it looked at whether or not SLA affects acculturation towards the target language group. This is achieved by analysing data obtained from semi-structured interviews and oral proficiency interviews. The present study found a definite link between the students’ acculturation process and their oral communicative competence but not native-like pronunciation. The results also provided evidence that SLL process has an impact on integration into the host society as well as the acquisition of a second language culture. Yet, it did not draw a clear conclusion with respect to how such a process affects these aspects.
Keywords: Acculturation, Native-like pronunciation, Oral communicative competence, Second language acquisition, Second language learners.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2682404 Vehicular Ad Hoc Network
Authors: S. Swapna Kumar
Abstract:
A Vehicular Ad-Hoc Network (VANET) is a mobile Ad-Hoc Network that provides connectivity moving device to fixed equipments. Such type of device is equipped with vehicle provides safety for the passengers. In the recent research areas of traffic management there observed the wide scope of design of new methodology of extension of wireless sensor networks and ad-hoc network principal for development of VANET technology. This paper provides the wide research view of the VANET and MANET concept for the researchers to contribute the better optimization technique for the development of effective and fast atomization technique for the large size of data exchange in this complex networks.
Keywords: Ad-Hoc, MANET, Sensors, Security, VANET
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4501403 Visual Analytics of Higher Order Information for Trajectory Datasets
Authors: Ye Wang, Ickjai Lee
Abstract:
Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, and trajectories. This paper proposes three visual analytics approaches for higher order information of trajectory datasets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical, topological, and directional information. Experimental resultsdemonstrate the applicability and usefulness of proposed three approaches.
Keywords: Visual Analytics, Higher Order Information, Trajectory Datasets, Spatio-temporal data.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1638402 Blended Learning through Google Classroom
Authors: Lee Bih Ni
Abstract:
This paper discusses that good learning involves all academic groups in the school. Blended learning is learning outside the classroom. Google Classroom is a free service learning app for schools, non-profit organizations and anyone with a personal Google account. Facilities accessed through computers and mobile phones are very useful for school teachers and students. Blended learning classrooms using both traditional and technology-based methods for teaching have become the norm for many educators. Using Google Classroom gives students access to online learning. Even if the teacher is not in the classroom, the teacher can provide learning. This is the supervision of the form of the teacher when the student is outside the school.
Keywords: Blended learning, learning app, Google classroom, schools.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2463401 The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds
Authors: Sahar Sohrabi
Abstract:
The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt.Keywords: Bayesian, cloud computing, real-time private cloud, scheduling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1409400 Study the Influence of Chemical Treatment on the Compositional Changes and Defect Structures of ZnS Thin Film
Authors: N. Dahbi, D-E. Arafah
Abstract:
The effect of chemical treatment in CdCl2 on the compositional changes and defect structures of potentially useful ZnS solar cell thin films prepared by vacuum deposition method was studied using the complementary Rutherford backscattering (RBS) and Thermoluminesence (TL) techniques. A series of electron and hole traps are found in the various as deposited samples studied. After treatment, perturbation on the intensity is noted; mobile defect states and charge conversion and/or transfer between defect states are found.Keywords: chemical treatment, defect, glow curve, RBS, thinfilm, thermoluminescence, ZnS, vacuum deposition
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1599399 Comparison between Approaches Used in Two WalkAbout Projects
Authors: Derek O Reilly, Piotr Milczarski, Shane Dowdall, Artur Hłobaż, Krzysztof Podlaski, Hiram Bollaert
Abstract:
Learning through creation of contextual games is a very promising approach when undertaking interdisciplinary and international group projects. During 2013 and 2014 the authors organized two intensive student projects. The two projects were in different countries and different conditions. Between them, the two projects involved 68 students and 12 mentors from five EU countries and from various academic disciplines. In this paper we share our experience of these two projects and we suggest approaches that can be utilized to strengthen the chances of succeeding in short (12-15 days long) intensive student projects.
Keywords: Contextual games, mobile games, GGULIVRR, WalkAbout, Erasmus Intensive Programme.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1882398 Synthesis and Characterization of Recycled Isotactic Polypropylene Nanocomposites Containing Date Wood Fiber
Authors: Habib Shaban
Abstract:
Nanocomposites of isotactic polypropylene (iPP) and date wood fiber were prepared after modification of the host matrix by reactive extrusion grafting of maleic anhydride. Chemical and mechanical treatment of date wood flour (WF) was conducted to obtain nanocrystalline cellulose. Layered silicates (clay) were partially intercalated with date wood fiber, and the modified layered silicate was used as filler in the PP matrix via a melt-blending process. The tensile strength of composites prepared from wood fiber modified clay was greater than that of the iPP-clay and iPP-WF composites at a 6% filler concentration, whereas deterioration of mechanical properties was observed when clay and WF were used alone for reinforcement. The dispersion of the filler in the matrix significantly decreased after clay modification with cellulose at higher concentrations, as shown by X-ray diffraction (XRD) data.Keywords: Nanocomposites, isotactic polypropylene, date wood flour, intercalated, melt-blending.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1097397 Performance Evaluation of Routing Protocols For High Density Ad Hoc Networks based on Qos by GlomoSim Simulator
Abstract:
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of three routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR) , Ad Hoc On-Demand Distance Vector Routing (AODV), location-aided routing(LAR1).The performance differentials are analyzed using varying network load, mobility, and network size. We simulate protocols with GLOMOSIM simulator. Based on the observations, we make recommendations about when the performance of either protocol can be best.Keywords: Ad hoc Network , Glomosim , routing protocols.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1619396 Application of ESA in the CAVE Mode Authentication
Authors: Keonwoo Kim, Dowon Hong, Kyoil Chung
Abstract:
This paper proposes the authentication method using ESA algorithm instead of using CAVE algorithm in the CDMA mobile communication systems including IS-95 and CDMA2000 1x. And, we analyze to apply ESA mechanism on behalf of CAVE mechanism without the change of message format and air interface in the existing CDMA systems. If ESA algorithm can be used as the substitution of CAVE algorithm, security strength of authentication algorithm is intensified without protocol change. An algorithm replacement proposed in this paper is not to change an authentication mechanism, but to configure input of ESA algorithm and to produce output. Therefore, our proposal can be the compatible to the existing systems.Keywords: ESA, CAVE, CDMA, authentication, mobilecommunication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1592395 The Corporate Integration of Highly Skilled Professionals - A Social Capital Perspective
Authors: K. Zigan
Abstract:
Not with standing the importance of foreign highly skilled professionals for host economies, there is a paucity of research studies investigating the role of the corporate social context during the integration process. This research aims to address this paucity by exploring the role of social capital in the integration of foreign health professionals. It does so by using a qualitative research approach. In this pilot study the hospital sector forms this study-s sample and interviews were conducted with HR managers, foreign health professionals and external HR consultants. It was found that most of the participating hospitals had not established specific HR practices and had only partly linked the development of organisational social capital with a successful integration process. This research contributes, for example, to the HR literature on the integration of self-initiated expatriates by analysing the role of HRM in generating organisational social capital needed for a successful integration process.Keywords: Corporate integration, hospitals, self-initiated expatriates, organisational social capital.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1546394 Connected Objects with Optical Rectenna for Wireless Information Systems
Authors: Chayma Bahar, Chokri Baccouch, Hedi Sakli, Nizar Sakli
Abstract:
Harvesting and transport of optical and radiofrequency signals are a topical subject with multiple challenges. In this paper, we present a Optical RECTENNA system. We propose here a hybrid system solar cell antenna for 5G mobile communications networks. Thus, we propose rectifying circuit. A parametric study is done to follow the influence of load resistance and input power on Optical RECTENNA system performance. Thus, we propose a solar cell antenna structure in the frequency band of future 5G standard in 2.45 GHz bands.Keywords: Antenna, Rectenna, solar cell, 5G, optical RECTENNA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 484