4,036 research outputs found

    Lightweight edge-based networking architecture for low-power IoT devices

    Get PDF
    Abstract. The involvement of low power Internet of Things (IoT) devices in the Wireless Sensor Networks (WSN) allow enhanced autonomous monitoring capability in many application areas. Recently, the principles of edge computing paradigm have been used to cater onsite processing and managing actions in WSNs. However, WSNs deployed in remote sites require human involvement in data collection process since internet accessibility is still limited to population dense areas. Nowadays, researchers propose UAVs for monitoring applications where human involvement is required frequently. In this thesis work, we introduce an edge-based architecture which create end-to-end secure communication between IoT sensors in a remote WSN and central cloud via UAV, which assist the data collection, processing and managing procedures of the remote WSN. Since power is a limited resource, we propose Bluetooth Low Energy (BLE) as the communication media between UAV and sensors in the WSN, where BLE is considered as an ultra-low power radio access technology. To examine the performance of the system model, we have presented a simulation analysis considering three sensor nodes array types that can realize in the practical environment. The impact of BLE data rate, impact of speed of the UAV, impact of distance between adjacent sensors and impact of data generation rate of the sensor node have been analysed to examine the performance of system. Moreover, to observe the practical functionality of the proposed architecture, prototype implementation is presented using commercially available off-the-shelf devices. The prototype of the system is implemented assuming ideal environment

    Impact of Environmental Degradation on Human Health

    Full text link
    Degradation of environment is one of the most serious challenges before the mankind in today's world. Mankind has been facing a wide range of problem arising out of the degradation of environment. Not only the areas under human inhabitation, but the areas of the planet without human population have also been suffering from these problems. As the population increase day by day, the amenities are not improved simultaneously. With the advancement of science and technologies the needs of human beings has been changing rapidly. As a result different types of environmental problems have been rising. Environmental degradation is a wide- reaching problem and it is likely to influence the health of human population is great. It may be defined the deterioration of the environment through depletion of resources such as air, water, and soil. The destruction of ecosystem and extinction of wildlife. Environmental degradation has occurred due to the recent activities in the field of socio-economic, institute and technology. Poverty still remains a problem as the root of several environmental problems to create awareness among the people about the ill effect of environmental pollution. In the whole research it is clear that all factors of environmental degradation may be reduced through- Framing the new laws on environmental degradation, Environment friend policy, Controlling all the ways and means of noise, air, soil and water pollution, Through growing more and more trees and by adapting the proper sanitation policy.&nbsp

    Security Issues Threats in IoT Infrastructure

    Full text link
    IoT (Internet of Things) expands the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level.IoT today has a wide scope and researches say that IoT will definitely be a huge reason in the change of human lifestyle. But irrespective of the scope of IoT, we cannot be sure enough to implement it due to the security concerns. There is a genuine need to secure IoT, which has therefore resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper discusses about the flaws in the security structure of IoT, it is a study about the various layers of IoT and how differentattacks are possible in those layers

    Opening My Voice, Claiming My Space: Theorizing the Possibilities of Postcolonial Approaches to Autoethnography

    Get PDF
    This essay examines the ways in which postcoloniality and autoethnography can be integrated to create a space of scholarly inquiry that disrupts the colonialist enterprise prevalent in the academy. By utilizing GonzÃĄlez's four ethics of postcolonial ethnography, this essay presents an ethics for postcolonial autoethnography as a mode to build a body of scholarly research that disrupts scientific imperialism

    Minimal Models for Nonreciprocal Amplification Using Biharmonic Drives

    Get PDF
    We present a generic system of three bosonic modes coupled parametrically with a time-varying coupling modulated by a combination of two pump harmonics, and we show how this system provides the minimal platform for realizing nonreciprocal couplings that can lead to gainless photon circulation, and phase-preserving or phase-sensitive directional amplification. Explicit frequency-dependent calculations within this minimal paradigm highlight the separation of amplification and directionality bandwidths, a feature generic to such schemes. We also study the influence of counterrotating interactions that can adversely affect directionality and the associated bandwidth; we find that these effects can be mitigated by suitably designing the properties of the auxiliary mode that plays the role of an engineered reservoir to the amplification mode space.University of Massachusetts at Lowel

    Application of Quantitative Measures for Analysing Aircraft Handling Qualities

    Get PDF
    The ease and precision with which pilot is able to handle the designated task determines the aircraft’s handling qualities. Accordingly, the most common methodology for determining aircraft’s handling qualities is through pilot opinions or through questionnaires. These subjective means of analysis is not reliable as the sole source of judgments. Quantitative metrics to analyse the task difficulty based on pilot’s performance, supplemented with subjective decision, can provide better insight into pilot workload levels and in turn the aircraft’s handling qualities. The application of few objective performance measurement techniques to flight data of a high performance fighter aircraft is discussed. Pilot/aircraft’s performance under different configurations is analysed. Analysis results show that pilots usually tend to give more priority to pitch axis in case of dual axis tracking task. And pilots are therefore more aggressive in accomplishing pitch axis tracking task than in roll. Workload assessments were also performed by comparing the results of single axis tracking experiments conducted using a high fidelity flight simulator with the flight data. It is seen that pilot’s aggressiveness levels in controlling the roll control inceptor is significantly less, with improved tracking accuracy when exercised as the primary task.

    A study on the effectiveness of Guggulu based Karanja Ksharasutra in comparison with Apamarga Ksharasutra in the management of Shalyaja Nadivrana with special reference to Pilonidal Sinus

    Get PDF
    Shalyaja Nadivrana is an Agantuja variety of Vrana. Nidana Panchaka and treatment is extensively described in Sushruta Samhita - Nidhana and Chikitsa Sthana. Presence of Shalya in the tract is an obstacle to its healing. Management of Nadivrana includes Ksharasutra therapy. The pilonidal sinus is an acquired sinus that develops in young, hirsute men, usually in the intergluteal cleft caused by the intrusion of hair into the skin, causing an abscess and gradually forming a sinus. The study was conducted on 40 randomly assigned patients at SJAUM Hospital, Bengaluru by dividing them into 2 groups - Group A and Group B. These groups were treated with Guggulu-based Karanja Ksharasutra and Apamarga Ksharasutra respectively. Assessment of pain, discharge, LOT, tenderness, and induration in Group A showed 91.67%, 91.3%, 99.9%, 85.19%, 95% and 75.6% improvement and Group B showed 87.5%, 86.96%, 100%, 78.6% and 97.37% improvement respectively. Group A’s overall result was 89.5% and Group B’s overall result was 89.9%. The mean UCT of Group A was 8.3 days/cm and Group B was 7.9 cm/day with p -value <0.05 which is significant. The study showed that the trial drug was as good as the control drug in the management of Shalyaja Nadi Vrana

    Implementation of Deduplication on Encrypted Big-data using Signcryption for cloud storage applications

    Get PDF
    As Big Data Cloud storage servers are getting widespread the shortage of disc space within the cloud becomes a major concern. The elimination of duplicate or redundant data, particularly in computer data is named deduplication. Data deduplication is a method to regulate the explosive growth of information within the cloud storage, most of the storage providers are finding more secure and efficient methods for their sensitive method. Recently, a noteworthy technique referred to as signcryption has been proposed, in which both the properties of signature (ownership) and encryption are simultaneously implemented with better performance According to deduplication, we introduce a method that can eliminate redundant encrypted data owned by different users. Furthermore, we generate a tag which will be the key component of big data management. We propose a technique called digital signature for ownership verification. Convergent encryption also called for a content hash key cryptosystem. Convergent encryption is an encryption approach that supports deduplication. With this encryption technique, the encryption key is generated out of a hash of plain text. Therefore applying this technique, identical plaintexts would turn out the same ciphertext

    Role of Color Doppler in predicting perinatal outcome in preeclampsia

    Get PDF
    Background: Preeclampsia is one of the most common complications of pregnancy, which increases both fetal and maternal mortality and morbidity. Since preeclampsia is characterized by abnormal placenta formation leading to inadequate uteroplacental blood flow, Doppler ultrasonography can prove to be a useful tool to assess fetal outcome in PIH patients. Through this study, we sought to determine the perinatal outcome on the basis of Doppler changes seen in Umbilical and Middle Cerebral artery.Methods: This was a prospective study conducted from September 2014 to August 2017 in a tertiary care hospital where 150 singleton pregnant patients with preeclampsia were examined with Doppler ultrasound of the Umbilical artery and Middle cerebral Artery. Serial Doppler examination was performed and the results of the last Doppler examination within 10 days of delivery was considered. Perinatal outcome was studied in the form of perinatal death, mean APGAR at 1 and 5 minutes, birth weight and admission to Neonatal Intensive Care Unit (NICU).Results: Abnormal Doppler velocimetry of the umbilical artery (increased resistance, AEDV, REDV) were significantly associated with poor perinatal outcome in the form of low birth weight, APGAR of â‰Ī7 at five minutes of birth and NICU admission. However, S/D ratio of the Middle cerebral artery could not positively predict poor perinatal outcome in this study.Conclusions: Doppler technology has provided the best opportunity for repetitive non-invasive hemodynamic monitoring in human pregnancy. Umbilical artery Doppler findings are slight better predictor of adverse perinatal outcome than an abnormal MCA
    • â€Ķ
    corecore