30 research outputs found

    Routing Protocols for Underwater Acoustic Sensor Networks: A Survey from an Application Perspective

    Get PDF
    Underwater acoustic communications are different from terrestrial radio communications; acoustic channel is asymmetric and has large and variable end‐to‐end propagation delays, distance‐dependent limited bandwidth, high bit error rates, and multi‐path fading. Besides, nodes’ mobility and limited battery power also cause problems for networking protocol design. Among them, routing in underwater acoustic networks is a challenging task, and many protocols have been proposed. In this chapter, we first classify the routing protocols according to application scenarios, which are classified according to the number of sinks that an underwater acoustic sensor network (UASN) may use, namely single‐sink, multi‐sink, and no‐sink. We review some typical routing strategies proposed for these application scenarios, such as cross‐layer and reinforcement learning as well as opportunistic routing. Finally, some remaining key issues are highlighted

    Applications of Blockchain Technology to Higher Education Arena: A Bibliometric Analysis

    Get PDF
    Reis-Marques, C., Figueiredo, R., & Neto, M. D. C. (2021). Applications of Blockchain Technology to Higher Education Arena: A Bibliometric Analysis. European Journal of Investigation in Health, Psychology and Education, 11(4), 1406-1421. https://doi.org/10.3390/ejihpe11040101 ---------------------------------------------- This work is financed by national funds through FCT—Fundação para a Ciência e a Tecnologia, I. P., under the project “UIDB/04630/2020”.Research related to blockchain is rapidly gaining importance in the higher education. This opportunity collaborates with a proposal for a review of papers on the main blockchain topic. The bibliometric analysis included 61 peer-reviewed articles published in the Scopus database during the period of 2016 to 2021. This paper offers the identification of gaps in the literature enabling studies on the subject in higher education. The article identifies the main applications of blockchain technology in higher education around the world, as well as suggests future investigations. For further scientific investigation, we propose the operationalization of each of the researched approaches, especially combining the blockchain relationship, artificial intelligence, digital innovation, digital maturity, and customer experience in higher education.publishersversionpublishe

    LDA-Based Topic Strength Analysis

    Get PDF
    Topic strength is an important hotspot in topic research. The evolution of topic strength not only indicates emerging new topics, but also helps us to determine whether a topic will produce some fluctuation of topic strength over time. Thus, topic strength analysis can provide significant findings in public opinion monitoring and user personalization. In this paper, we present an LDA-based topic strength analysis approach. We take topic quality into our topic strength consideration by combining local LDA and global LDA. For empirical studies, we use three data sets in real applications: film critic data of "A Chinese Odyssey" in Douban Movies, corruption news data in Sina News, and public paper data. Compared to existing approaches, experimental results show that our proposed approach can obtain better results of topic strength analysis in detecting the time of event topic occurrences and distinguishing different types of topics, and it can be used to monitor the occurrences of public opinions and the changes of public concerns

    Semi-supervised Clustering Algorithm for Retention Time Alignment of Gas Chromatographic Data

    Get PDF
    Gas chromatography (GC) is an effective tool for the analysis of complex mixtures with a huge number of components. To keep tracking the chemical changes during the processes like plastic waste pyrolysis usually different sample states are profiled, but retention time drifts between the chromatograms make the comparability difficult. The aim of this study is to develop a fast and simple method to eliminate the time drifts between the chromatograms using easily accessible priori information. The proposed method is tested on GC chromatograms obtained by analysis of pyrolysis product (Mg/Y catalyst) of shredded real waste HDPE/PP/LDPE mixture. A modified k-means algorithm was developed to account the retention time drifts between samples (different sample states). The outcome of the retention time alignment is an averaged retention time for each peak from all the chromatograms which makes the comparison and further analysis (such as "fingerprinting") easier or possible

    Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review

    Get PDF
    Background: Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentralized Bluetooth-based tracing systems are examples of disease-centric P2P PHSs. Although using P2P technology for the provision of PHSs can be flexible, scalable, resilient to a single point of failure, and inexpensive for patients, the use of health information on P2P networks poses major security issues as users must manage information security largely by themselves. Objective: This study aims to identify the inherent security issues for PHS deployment in P2P networks and how they can be overcome. In addition, this study reviews different P2P architectures and proposes a suitable architecture for P2P PHS deployment. Methods: A systematic literature review was conducted following PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines. Thematic analysis was used for data analysis. We searched the following databases: IEEE Digital Library, PubMed, Science Direct, ACM Digital Library, Scopus, and Semantic Scholar. The search was conducted on articles published between 2008 and 2020. The Common Vulnerability Scoring System was used as a guide for rating security issues. Results: Our findings are consolidated into 8 key security issues associated with PHS implementation and deployment on P2P networks and 7 factors promoting them. Moreover, we propose a suitable architecture for P2P PHSs and guidelines for the provision of PHSs while maintaining information security. Conclusions: Despite the clear advantages of P2P PHSs, the absence of centralized controls and inconsistent views of the network on some P2P systems have profound adverse impacts in terms of security. The security issues identified in this study need to be addressed to increase patients\u27 intention to use PHSs on P2P networks by making them safe to use

    Instantaneous Power Theory with Fourier and Optimal Predictive Controller Design for Shunt Active Power Filter

    Get PDF
    This paper presents a novel harmonic identification algorithm of shunt active power filter for balanced and unbalanced three-phase systems based on the instantaneous power theory called instantaneous power theory with Fourier. Moreover, the optimal design of predictive current controller using an artificial intelligence technique called adaptive Tabu search is also proposed in the paper. These enhancements of the identification and current control parts are the aim of the good performance for shunt active power filter. The good results for harmonic mitigation using the proposed ideas in the paper are confirmed by the intensive simulation using SPS in SIMULINK. The simulation results show that the enhanced shunt active power filter can provide the minimum %THD (Total Harmonic Distortion) of source currents and unity power factor after compensation. In addition, the %THD also follows the IEEE Std.519-1992

    Survey of smart parking systems

    Get PDF
    The large number of vehicles constantly seeking access to congested areas in cities means that finding a public parking place is often difficult and causes problems for drivers and citizens alike. In this context, strategies that guide vehicles from one point to another, looking for the most optimal path, are needed. Most contributions in the literature are routing strategies that take into account different criteria to select the optimal route required to find a parking space. This paper aims to identify the types of smart parking systems (SPS) that are available today, as well as investigate the kinds of vehicle detection techniques (VDT) they have and the algorithms or other methods they employ, in order to analyze where the development of these systems is at today. To do this, a survey of 274 publications from January 2012 to December 2019 was conducted. The survey considered four principal features: SPS types reported in the literature, the kinds of VDT used in these SPS, the algorithms or methods they implement, and the stage of development at which they are. Based on a search and extraction of results methodology, this work was able to effectively obtain the current state of the research area. In addition, the exhaustive study of the studies analyzed allowed for a discussion to be established concerning the main difficulties, as well as the gaps and open problems detected for the SPS. The results shown in this study may provide a base for future research on the subject.Fil: Diaz Ogás, Mathias Gabriel. Universidad Nacional de San Juan. Facultad de Ciencias Exactas, Físicas y Naturales; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - San Juan; ArgentinaFil: Fabregat Gesa, Ramon. Universidad de Girona; EspañaFil: Aciar, Silvana Vanesa. Universidad Nacional de San Juan. Facultad de Ciencias Exactas, Físicas y Naturales; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - San Juan; Argentin

    Mobility management in 5G heterogeneous networks

    Get PDF
    In recent years, mobile data traffic has increased exponentially as a result of widespread popularity and uptake of portable devices, such as smartphones, tablets and laptops. This growth has placed enormous stress on network service providers who are committed to offering the best quality of service to consumer groups. Consequently, telecommunication engineers are investigating innovative solutions to accommodate the additional load offered by growing numbers of mobile users. The fifth generation (5G) of wireless communication standard is expected to provide numerous innovative solutions to meet the growing demand of consumer groups. Accordingly the ultimate goal is to achieve several key technological milestones including up to 1000 times higher wireless area capacity and a significant cut in power consumption. Massive deployment of small cells is likely to be a key innovation in 5G, which enables frequent frequency reuse and higher data rates. Small cells, however, present a major challenge for nodes moving at vehicular speeds. This is because the smaller coverage areas of small cells result in frequent handover, which leads to lower throughput and longer delay. In this thesis, a new mobility management technique is introduced that reduces the number of handovers in a 5G heterogeneous network. This research also investigates techniques to accommodate low latency applications in nodes moving at vehicular speeds

    From classical to quantum machine learning: survey on routing optimization in 6G software defined networking

    Get PDF
    The sixth generation (6G) of mobile networks will adopt on-demand self-reconfiguration to fulfill simultaneously stringent key performance indicators and overall optimization of usage of network resources. Such dynamic and flexible network management is made possible by Software Defined Networking (SDN) with a global view of the network, centralized control, and adaptable forwarding rules. Because of the complexity of 6G networks, Artificial Intelligence and its integration with SDN and Quantum Computing are considered prospective solutions to hard problems such as optimized routing in highly dynamic and complex networks. The main contribution of this survey is to present an in-depth study and analysis of recent research on the application of Reinforcement Learning (RL), Deep Reinforcement Learning (DRL), and Quantum Machine Learning (QML) techniques to address SDN routing challenges in 6G networks. Furthermore, the paper identifies and discusses open research questions in this domain. In summary, we conclude that there is a significant shift toward employing RL/DRL-based routing strategies in SDN networks, particularly over the past 3 years. Moreover, there is a huge interest in integrating QML techniques to tackle the complexity of routing in 6G networks. However, considerable work remains to be done in both approaches in order to accomplish thorough comparisons and synergies among various approaches and conduct meaningful evaluations using open datasets and different topologies
    corecore