348 research outputs found

    Mining Safety and Sustainability I

    Get PDF
    Safety and sustainability are becoming ever bigger challenges for the mining industry with the increasing depth of mining. It is of great significance to reduce the disaster risk of mining accidents, enhance the safety of mining operations, and improve the efficiency and sustainability of development of mineral resource. This book provides a platform to present new research and recent advances in the safety and sustainability of mining. More specifically, Mining Safety and Sustainability presents recent theoretical and experimental studies with a focus on safety mining, green mining, intelligent mining and mines, sustainable development, risk management of mines, ecological restoration of mines, mining methods and technologies, and damage monitoring and prediction. It will be further helpful to provide theoretical support and technical support for guiding the normative, green, safe, and sustainable development of the mining industry

    Towards end-to-end security in internet of things based healthcare

    Get PDF
    Healthcare IoT systems are distinguished in that they are designed to serve human beings, which primarily raises the requirements of security, privacy, and reliability. Such systems have to provide real-time notifications and responses concerning the status of patients. Physicians, patients, and other caregivers demand a reliable system in which the results are accurate and timely, and the service is reliable and secure. To guarantee these requirements, the smart components in the system require a secure and efficient end-to-end communication method between the end-points (e.g., patients, caregivers, and medical sensors) of a healthcare IoT system. The main challenge faced by the existing security solutions is a lack of secure end-to-end communication. This thesis addresses this challenge by presenting a novel end-to-end security solution enabling end-points to securely and efficiently communicate with each other. The proposed solution meets the security requirements of a wide range of healthcare IoT systems while minimizing the overall hardware overhead of end-to-end communication. End-to-end communication is enabled by the holistic integration of the following contributions. The first contribution is the implementation of two architectures for remote monitoring of bio-signals. The first architecture is based on a low power IEEE 802.15.4 protocol known as ZigBee. It consists of a set of sensor nodes to read data from various medical sensors, process the data, and send them wirelessly over ZigBee to a server node. The second architecture implements on an IP-based wireless sensor network, using IEEE 802.11 Wireless Local Area Network (WLAN). The system consists of a IEEE 802.11 based sensor module to access bio-signals from patients and send them over to a remote server. In both architectures, the server node collects the health data from several client nodes and updates a remote database. The remote webserver accesses the database and updates the webpage in real-time, which can be accessed remotely. The second contribution is a novel secure mutual authentication scheme for Radio Frequency Identification (RFID) implant systems. The proposed scheme relies on the elliptic curve cryptography and the D-Quark lightweight hash design. The scheme consists of three main phases: (1) reader authentication and verification, (2) tag identification, and (3) tag verification. We show that among the existing public-key crypto-systems, elliptic curve is the optimal choice due to its small key size as well as its efficiency in computations. The D-Quark lightweight hash design has been tailored for resource-constrained devices. The third contribution is proposing a low-latency and secure cryptographic keys generation approach based on Electrocardiogram (ECG) features. This is performed by taking advantage of the uniqueness and randomness properties of ECG's main features comprising of PR, RR, PP, QT, and ST intervals. This approach achieves low latency due to its reliance on reference-free ECG's main features that can be acquired in a short time. The approach is called Several ECG Features (SEF)-based cryptographic key generation. The fourth contribution is devising a novel secure and efficient end-to-end security scheme for mobility enabled healthcare IoT. The proposed scheme consists of: (1) a secure and efficient end-user authentication and authorization architecture based on the certificate based Datagram Transport Layer Security (DTLS) handshake protocol, (2) a secure end-to-end communication method based on DTLS session resumption, and (3) support for robust mobility based on interconnected smart gateways in the fog layer. Finally, the fifth and the last contribution is the analysis of the performance of the state-of-the-art end-to-end security solutions in healthcare IoT systems including our end-to-end security solution. In this regard, we first identify and present the essential requirements of robust security solutions for healthcare IoT systems. We then analyze the performance of the state-of-the-art end-to-end security solutions (including our scheme) by developing a prototype healthcare IoT system

    The State of Extraction: A Short History of Space and Extractive Industries in Tanzania, 1885 to 2019

    Get PDF
    Diese Arbeit skizziert die Geschichte des (Gold-)Bergbaus in Tansania von 1885 bis 2019 anhand vier chronologischer Kapitel (Kolonialzeit, 1885-1961; Sozialismus 1961-1885; Liberalisierung, 1885-2015; Neo-extraktivistische Wende, seit 2015). Dabei werden besonders die bisher vernachlĂ€ssigte Entstehung der Bergbauindustrie wĂ€hrend der deutschen Kolonialzeit (bis 1916) sowie die aktuellsten Entwicklungen seit 2015 hervorgehoben. Das zentrale Anliegen dieser Arbeit ist es, KontinuitĂ€t, BrĂŒche und VerĂ€nderungen in VerrĂ€umlichungsprozessen und -praktiken im Verlauf der Zeit herauszuarbeiten und zu zeigen, wie das Handeln und die Interessen verschiedener Akteursgruppen diese prĂ€gt.:1. Introduction 2. Extraction and space 3. Capitalist frontiers and extractive enclaves in colonial Tanzania, 1885 -1961 4. To mine or not to mine - The Tanzanian mineral economy after independence and under ujamaa, 1961 -1985 5. 'Foreignization', liberalization and commodity frontiers, 1985 to 2015 6. Tearing down fences, building walls - Tanzania's neo-extractivist turn under Magufuli 7. Conclusion - The state of extraction 8. BibliographyThis study provides an historical overview of the (gold-)mining industry in Tanzania between 1885 and 2019, divided into four periods (colonial occupation, 1885 -1961; the socialist period, 1961-1985; liberalization, 1985-2015), the neo-extractist turn, since 2015). The so far neglected history of mining in Tanganyika under German rule (until 1916) and the most recent developments under President Magufuli since 2015 receive special attention here. At the core, this study seeks to elaborate continuities, junctures and change in practices and processs of spatialization over time and to show, how the agency and interests of certain groups of actors shape them.:1. Introduction 2. Extraction and space 3. Capitalist frontiers and extractive enclaves in colonial Tanzania, 1885 -1961 4. To mine or not to mine - The Tanzanian mineral economy after independence and under ujamaa, 1961 -1985 5. 'Foreignization', liberalization and commodity frontiers, 1985 to 2015 6. Tearing down fences, building walls - Tanzania's neo-extractivist turn under Magufuli 7. Conclusion - The state of extraction 8. Bibliograph

    Internationales Kolloquium ĂŒber Anwendungen der Informatik und Mathematik in Architektur und Bauwesen : 20. bis 22.7. 2015, Bauhaus-UniversitĂ€t Weimar

    Get PDF
    The 20th International Conference on the Applications of Computer Science and Mathematics in Architecture and Civil Engineering will be held at the Bauhaus University Weimar from 20th till 22nd July 2015. Architects, computer scientists, mathematicians, and engineers from all over the world will meet in Weimar for an interdisciplinary exchange of experiences, to report on their results in research, development and practice and to discuss. The conference covers a broad range of research areas: numerical analysis, function theoretic methods, partial differential equations, continuum mechanics, engineering applications, coupled problems, computer sciences, and related topics. Several plenary lectures in aforementioned areas will take place during the conference. We invite architects, engineers, designers, computer scientists, mathematicians, planners, project managers, and software developers from business, science and research to participate in the conference

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Proceedings of the 2004 ONR Decision-Support Workshop Series: Interoperability

    Get PDF
    In August of 1998 the Collaborative Agent Design Research Center (CADRC) of the California Polytechnic State University in San Luis Obispo (Cal Poly), approached Dr. Phillip Abraham of the Office of Naval Research (ONR) with the proposal for an annual workshop focusing on emerging concepts in decision-support systems for military applications. The proposal was considered timely by the ONR Logistics Program Office for at least two reasons. First, rapid advances in information systems technology over the past decade had produced distributed collaborative computer-assistance capabilities with profound potential for providing meaningful support to military decision makers. Indeed, some systems based on these new capabilities such as the Integrated Marine Multi-Agent Command and Control System (IMMACCS) and the Integrated Computerized Deployment System (ICODES) had already reached the field-testing and final product stages, respectively. Second, over the past two decades the US Navy and Marine Corps had been increasingly challenged by missions demanding the rapid deployment of forces into hostile or devastate dterritories with minimum or non-existent indigenous support capabilities. Under these conditions Marine Corps forces had to rely mostly, if not entirely, on sea-based support and sustainment operations. Particularly today, operational strategies such as Operational Maneuver From The Sea (OMFTS) and Sea To Objective Maneuver (STOM) are very much in need of intelligent, near real-time and adaptive decision-support tools to assist military commanders and their staff under conditions of rapid change and overwhelming data loads. In the light of these developments the Logistics Program Office of ONR considered it timely to provide an annual forum for the interchange of ideas, needs and concepts that would address the decision-support requirements and opportunities in combined Navy and Marine Corps sea-based warfare and humanitarian relief operations. The first ONR Workshop was held April 20-22, 1999 at the Embassy Suites Hotel in San Luis Obispo, California. It focused on advances in technology with particular emphasis on an emerging family of powerful computer-based tools, and concluded that the most able members of this family of tools appear to be computer-based agents that are capable of communicating within a virtual environment of the real world. From 2001 onward the venue of the Workshop moved from the West Coast to Washington, and in 2003 the sponsorship was taken over by ONR’s Littoral Combat/Power Projection (FNC) Program Office (Program Manager: Mr. Barry Blumenthal). Themes and keynote speakers of past Workshops have included: 1999: ‘Collaborative Decision Making Tools’ Vadm Jerry Tuttle (USN Ret.); LtGen Paul Van Riper (USMC Ret.);Radm Leland Kollmorgen (USN Ret.); and, Dr. Gary Klein (KleinAssociates) 2000: ‘The Human-Computer Partnership in Decision-Support’ Dr. Ronald DeMarco (Associate Technical Director, ONR); Radm CharlesMunns; Col Robert Schmidle; and, Col Ray Cole (USMC Ret.) 2001: ‘Continuing the Revolution in Military Affairs’ Mr. Andrew Marshall (Director, Office of Net Assessment, OSD); and,Radm Jay M. Cohen (Chief of Naval Research, ONR) 2002: ‘Transformation ... ’ Vadm Jerry Tuttle (USN Ret.); and, Steve Cooper (CIO, Office ofHomeland Security) 2003: ‘Developing the New Infostructure’ Richard P. Lee (Assistant Deputy Under Secretary, OSD); and, MichaelO’Neil (Boeing) 2004: ‘Interoperability’ MajGen Bradley M. Lott (USMC), Deputy Commanding General, Marine Corps Combat Development Command; Donald Diggs, Director, C2 Policy, OASD (NII

    Advances in Computer Science and Engineering

    Get PDF
    The book Advances in Computer Science and Engineering constitutes the revised selection of 23 chapters written by scientists and researchers from all over the world. The chapters cover topics in the scientific fields of Applied Computing Techniques, Innovations in Mechanical Engineering, Electrical Engineering and Applications and Advances in Applied Modeling

    Advanced Materials and Technologies in Nanogenerators

    Get PDF
    This reprint discusses the various applications, new materials, and evolution in the field of nanogenerators. This lays the foundation for the popularization of their broad applications in energy science, environmental protection, wearable electronics, self-powered sensors, medical science, robotics, and artificial intelligence

    The internet of ontological things: On symmetries between ubiquitous problems and their computational solutions in the age of smart objects

    Get PDF
    This dissertation is about an abstract form of computer network that has recently earned a new physical incarnation called “the Internet of Things.” It surveys the ontological transformations that have occurred over recent decades to the computational components of this network, objects—initially designed as abstract algorithmic agents in a source code of computer programming but now transplanted into real-world objects. Embodying the ideal of modularity, objects have provided computer programmers with more intuitive means to construct a software application with lots of simple and reusable functional building blocks. Their capability of being reassembled into many different networks for a variety of applications has also embodied another ideal of computing machines, namely general-purposiveness. In the algorithmic cultures of the past century, these objects existed as mere abstractions to help humans to understand electromagnetic signals that had infiltrated every corner of automatized spaces from private to public. As an instrumental means to domesticate these elusive signals into programmable architectures according to the goals imposed by professional programmers and amateur end-users, objects promised a universal language for any computable human activities. This utopian vision for the object-oriented domestication of the digital has had enough traction for the growth of the software industry as it has provided an alibi to hide another process of colonization occurring on the flipside of their interfacing between humans and machines: making programmable the highest number of online and offline human activities possible. A more recent media age, which this dissertation calls the age of the Internet of Things, refers to the second phase of this colonization of human cultures by the algorithmic objects, no longer trapped in the hard-wired circuit boards of personal computer, but now residing in real-life objects with new wireless communicability. Chapters of this dissertation examine each different computer application—a navigation system in a smart car, smart home, open-world video games, and neuro-prosthetics—as each particular case of this object-oriented redefinition of human cultures
    • 

    corecore