499 research outputs found

    Global Symposium on Women in Fisheries

    Get PDF
    All over the world, women contribute in multiple ways to the production, processing, marketing and management of fish and other living aquatic resources. The first ever Global Symposium on Women in Fisheries, held in Kaohsiung, Taiwan on 29 November 2001 generated the present collection of papers on women in fisheries. The reader of this volume will find in it a wealth of information, albeit in a very heterogeneous form, that the authors have had to draw from many different sources. Some are primary research studies whereas most are historical reviews from first hand experience of the authors or derived from other written materials, often contained in reports of fisheries development projects, newspapers and source materials well outside the fish sectors.Women, Participation, Sustainability, Poverty, Fisheries, Development projects, Fishery technology

    Secure Single-Sit Data Sharing for Dynamic Groups in Cloud

    Get PDF
    Abstract-Cloud computing has emerged as a new type of commercial paradigm. Cloud and its services got wide popularity among the IT industry in a short span of time. With the character of low maintenance and ease of use cloud services are extended for resource sharing among cloud users. Sharing among group is still a challenging issue, due to frequent change of membership. The main issues are related to identity privacy and data privacy. Group sharing may not scale well for individual data access when sharing highly confidential and sensitive data in the group. In this paper, we propose a secure dynamic group sharing among several members of a group rather than individuals. Any user can share data with others in the group, but access available in the presence of minimum no of users only. The storage overhead and cryptography is independent of no of users in the group

    Framework for Ease Maneuver of On Road Emergency Vehicles: Using Mobile Sink

    Get PDF
    ABSTRACT:In order to make timely and correct decisions and to avoid potential accidents, moving vehicles on the road need to acquire real time traffic flow and road information directly from WSN with the help of telematics services. The concept proposed in this paper involves the use of multiple metric to promote emergency vehicle an ease of transport during their crucial hours of time. This includes a proposal of a practical and scalable approach for point-topoint routing in wireless sensor nets which aims at providing the shortest path for emergency vehicles to save time, and to enable a robust paradigm for sensor network to change the primary path of the emergency vehicle dynamically. In addition to these, this paper also indulges in the proposal of analysing real-time traffic flow parameters using image sensors and controlling the congestion on priority basis. KEYWORDS: Wireless sensor network, Routing, Dynamic, congestion control, emergency vehicle. I. INTRODUCTION Traffic management being a vast domain, WSN can be applied to gather information about the incoming flow of traffic, traffic load on a particular road, traffic load at particular period of time (peak hours) and in vehicle prioritization. Because of the recent developments in wireless networks and multifunctional sensors with digital processing, power supply and communication capabilities, WSN are being largely deployed in physical environments for fine-grain monitoring in different classes of applications [1] The proposal of an adaptive and dynamic traffic intersection system include first finding of shortest path for the emergency vehicle to reach its nearby health care zone from the accident area usinga scalable a point-to-point routing schemecalled Beacon Vector Routing or BVR method. The second module is to find a better dynamic path arrangement for emergency vehicle, because the traffic status is changed dynamically. To achieve a fault tolerant and low latency algorithm, called PEQ (Periodic, Event-Driven and Query-Based Protocol) is employed. The main purpose to adopt this algorithm than any other existing routing algorithm is that PEQuse ordinary motes, with no special hardware and a simple processing at each node by using the hop level as the main information to minimize data transmission. The next part of this paper deals with an adaptive traffic intersection system where traffic light of one intersection communicates with the traffic light of the next neighbouring intersections and controlling the congestio

    Identification and Analysis of National Airspace System Resource Constraints

    Get PDF
    This analysis is the deliverable for the Airspace Systems Program, Systems Analysis Integration and Evaluation Project Milestone for the Systems and Portfolio Analysis (SPA) focus area SPA.4.06 Identification and Analysis of National Airspace System (NAS) Resource Constraints and Mitigation Strategies. "Identify choke points in the current and future NAS. Choke points refer to any areas in the en route, terminal, oceanic, airport, and surface operations that constrain actual demand in current and projected future operations. Use the Common Scenarios based on Transportation Systems Analysis Model (TSAM) projections of future demand developed under SPA.4.04 Tools, Methods and Scenarios Development. Analyze causes, including operational and physical constraints." The NASA analysis is complementary to a NASA Research Announcement (NRA) "Development of Tools and Analysis to Evaluate Choke Points in the National Airspace System" Contract # NNA3AB95C awarded to Logistics Management Institute, Sept 2013

    Report of the 2005 Snowmass Top/QCD Working Group

    Get PDF
    This report discusses several topics in both top quark physics and QCD at an International Linear Collider (ILC). Issues such as measurements at the ttˉt\bar{t} threshold, including both theoretical and machine requirements, and the determination of electroweak top quark couplings, are reviewed. New results concerning the potential of a 500 GeV e+ee^+e^- collider for measuring WtbWtb couplings and the top quark Yukawa coupling are presented. The status of higher order QCD corrections to jet production cross sections, heavy quark form factors, and longitudinal gauge boson scattering, needed for percent-level studies at the ILC, are reviewed. A new study of the measurement of the hadronic structure of the photon at a γγ\gamma\gamma collider is presented. The effects on top quark properties from several models of new physics, including composite models, Little Higgs theories, and CPT violation, are studied.Comment: 39 pages, many figs; typos fixed and refs added. Contributed to the 2005 International Linear Collider Physics and Detector Workshop and 2nd ILC Accelerator Workshop, Snowmass, Colorado, 14-27 Aug 200

    LAYERED APPROACH FOR PERSONALIZED SEARCH ENGINE LOGS PRIVACY PRESERVING

    Get PDF
    ABSTRACT In this paper we examine the problem of defending privacy for publishing search engine logs. Search engines play a vital role in the navigation through the enormity of the Web. Privacy-preserving data publishing (PPDP) provides techniques and tools for publishing helpful information while preserving data privacy. Recently, PPDP has received significant attention in research communities, and several approaches have been proposed for different data publishing situations. In this paper we learn privacy preservation for the publication of search engine query logs. Consider a subject that even after eliminating all personal characteristics of the searcher, which can serve as associations to his identity, the magazine of such data, is still subject to privacy attacks from opponents who have partial knowledge about the set. Our tentative results show that the query log can be appropriately anonymized against the particular attack, while retaining a significant volume of helpful data. In this paper we learn about problem in search logs and why the log is not secure and how to create log secure using data mining algorithm and methods like Generalization, Suppression and Quasi identifier

    Authentication of Secret Information in Image Stenography

    Get PDF
    Abstract : In recent years, Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat Steganography by detecting the hidden information and extracting. In this paper we propose an image Steganography that can verify the reliability of the information being transmitted to the receiver. The method can verify whether the attacker has tried to edit, delete or forge the secret information in the stegoimage. The technique embeds the hidden information in the spatial domain of the cover image and uses two special AC coefficients of the Discrete Wavelet Transform domain to verify the veracity (integrity) of the secret information from the stego image. The analysis shows that the BER and PSNR are improved in the case of DWT than DCT

    A Survey of Clustering In Mobile Ad-Hoc Networks

    Get PDF
    ABSTRACT: An ad-hoc network is used to establish a connection wirelessly in a network without any routers or access points. When there is a large network, the complexity to gather the routing information increases. In such a case, the clustering techniques are much useful in reducing the complexity. This paper discusses the use of clustering and its techniques in mobile ad-hoc networks

    Efficient Allocation of Power Resource in OFDMA Systems with Diverse Modulation Techniques

    Get PDF
    ABSTRACT: Of late there is an utmost need for providing higher data rate and better Quality of Service(QoS) for ever increasing number of users in wireless communication systems. The Orthogonal Frequency Division Multiplexing (OFDM) is one of the leading candidates for future wireless communication systems. This paper gives a brief introduction about OFDMA and discusses in depth about allocation of power resource to all the active users present in a cellular network in an optimum way using the Load Matrix approach. Load Matrix approach is used to calculate the average interference within the cells based on RoT (Rise over Thermal noise) and distribute minimum required SINR to each user thereby enhancing the Quality of Service (QoS) of the network. The approach is first experimented on a single carrier communication system and then it is extended to multi-carrier systems. This paper also deals with the performance of a communication link in terms of BER for various digital modulation techniques. From simulations it is observed that performance of QAM is better than QPSK in systems implementing OFDMA
    corecore