29 research outputs found

    Optimization Water Leakage Detection using Wireless Sensor Networks (OWLD)

    Get PDF
    This paper presents a technical method to monitor the water distribution pipelines against leakage and to control the pump when the water level decreases in the tank. Water leakage is the most popular cause of water wasted in the domestic water distribution systems. Nowadays most people have their smartphone nearby them; therefore, adding an interface on the smartphone to control an automated system is a big plus. Energy saving is a benefit of the Optimization Water Leakage Detection (OWLD) system. It enables us to save energy, time and cost by having smart leakage detection in pipelines, measuring the water level in the tank and controlling the pump when the water level is low. This paper focuses mainly on two parts: The first part is an alarm based on Global System for Mobile technology (GSM) to send a Short Message Service (SMS) to the owner. This is made up of the following components: sensors, GSM Module, Arduino and relays to control the device. The second is the controlling part; it uses android application mobile to control the pump. The proposed system can effectively improve the efficiency of operation, reduce delay time and cost of maintenance pipelines after leakage detection

    Computer Numerical Control-PCB Drilling Machine with Efficient Path Planning – Case Study_2

    Get PDF
    In Printed Circuit Board (PCB) drilling machines, the location of the drill holes are fed into the machine and the PCB will be drilled at the corresponding coordinates. Some machines do not choose the optimal route when completing their tasks. Hence, this paper proposes an approach, which is based on the Algorithm Shortest Path Search Algorithm (SPSA), for finding the optimal route in PCB holes drilling process. In SPSA, when the robotic arm at the initial position, the algorithm calculates the nearest point to the initial position from all points that the wires starts or ends with. If the nearest point is a start-of-wire point, it will use SPS algorithm 1. If the nearest point is an end-of-wire point, it will use SPS algorithm 2. This process is repeated until drilling all the lines. Then, the robotic arm will drill all the holes according to the proposed Simulated Annealing Algorithm (AS) in order to determine the optimal machining parameters for milling operations. The results of the different optimization algorithms Genetic Algorithm (GA) and AS are compared and conclusions are presented. . The proposed Computer Numerical Control (CNC) machine consists of driver, drill, three stepper motors, cables and microcontroller PIC16f877A to control the movement of the machine. The SPSA algorithm optimizes the use of the motors and other mechanical paths involved in the process while reducing total time taken to traverse all the drill holes. This paper also explains the detailed problem of interest and the mathematical formulation of the problem is defined. Experimental result indicates that the proposed SPSA-based approach is capable to efficiently find the optimal route for PCB holes drilling process

    A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques

    Get PDF
    Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness, but are unsuitable in several domains due to their computational complexity. Other asymmetric encryption schemes have been proposed to provide a cloud homomorphic encryption service, where the researchers focused only on how to ensure the homomorphic property. This paper proposes a new digital signature scheme dedicated to a family of encryption techniques. The proposal consists of two parts: the first focused on the secret key, and the second focused on the public key. Signature validity checking was performed by multiplying these two parts to reform again the sender’s public key, then comparing the result with the decrypted message. The validation of the decrypted message guarantees data integrity, where the signer public key is used to ensure authenticity. The proposed scheme takes a shorter execution time for the entire signature operation, including signing and verification, compared to other modern techniques. The analysis showed its robustness against private key recovery and forgery attacks. The implementation results of the proposed scheme showed promising performance in terms of complexity and robustness. The results confirmed that the proposed scheme is efficient and effective for signature generation and verification

    A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity †

    Get PDF
    In today’s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time control/monitoring, scalability, fault tolerance, and numerous security services. Hardware and software limitations of IoT devices can be mitigated using the massive on-demand cloud resources. However, IoT cloud-based solutions pose some security and privacy concerns, specifically when an untrusted cloud is used. This calls for strong encryption schemes that allow operations on data in an encrypted format without compromising the encryption. This paper presents an asymmetric multi-key and partially homomorphic encryption scheme. The scheme provides the addition operation by encrypting each decimal digit of the given integer number separately using a special key. In addition, data integrity processes are performed when an untrusted third party performs homomorphic operations on encrypted data. The proposed work considers the most widely known issues like the encrypted data size, slow operations at the hardware level, and high computing costs at the provider level. The size of generated ciphertext is almost equal to the size of the plaintext, and order-preserving is ensured using an asymmetrical encryption version

    Development and Evaluation of an Expert System for Diagnosing Kidney Diseases

    Get PDF
    This research paper presents the development and evaluation of an expert system for diagnosing kidney diseases. The expert system utilizes a decision-making tree approach and is implemented using the CLIPS and Delphi frameworks. The system's accuracy in diagnosing kidney diseases and user satisfaction were evaluated. The results demonstrate the effectiveness of the expert system in providing accurate diagnoses and high user satisfactio

    Development and Evaluation of an Expert System for Diagnosing Tinnitus Disease

    Get PDF
    Tinnitus is a common condition characterized by the perception of sound in the absence of an external source, with potential negative physical and psychological impacts. Accurate and efficient diagnosis of tinnitus is crucial for appropriate treatment and management. Traditional diagnostic methods have limitations in terms of time, cost, and accuracy. To address these challenges, expert systems have emerged as a promising tool for tinnitus diagnosis. This paper explores the application of expert systems in tinnitus diagnosis, highlighting their potential to improve accuracy and efficiency. By incorporating a knowledge base and rule-based decision-making, expert systems can provide valuable insights for accurate diagnosis and appropriate management of tinnitus. Further research and development in this area can enhance the clinical assessment and treatment of tinnitus, ultimately improving the quality of life for affected individuals

    A Flexible Encryption Technique for the Internet of Things Environment

    Get PDF
    IoT promises a new era of connectivity that goes beyond laptops and smart connected devices to connected vehicles, smart homes, smart cities and connected healthcare. The huge volume of data that is collected from millions of IoT devices raises information security and privacy concerns for users. This paper presents a new scalable encryption technique, called Flexible encryption Technique (FlexenTech), to protect IoT data during storage and in transit. FlexenTech is suitable for resource constrained devices and networks. It offers a low encryption time, defends against common attacks such as replay attacks and defines a configurable mode, where any number of rounds or key sizes may be used. Experimental analysis of FlexenTech shows its robustness in terms of its multiple configurable confidentiality levels by allowing various configurations. This configurability provides several advantages for resource constrained devices, including reducing the encryption computation time by up to 9.7% when compared to its best rivals in the literature

    A System Dynamics Approach for Hospital Waste Management in a City in a Developing Country: The Case of Nablus, Palestine

    Get PDF
    Hospitals and health centers provide a variety of healthcare services and normally generate hazardous waste as well as general waste. General waste has a similar nature to that of municipal solid waste and therefore could be disposed of in municipal landfills. However, hazardous waste poses risks to public health, unless it is properly managed. The hospital waste management system encompasses many factors, i.e., number of beds, number of employees, level of service, population, birth rate, fertility rate, and not in my back yard (NIMBY) syndrome. Therefore, this management system requires a comprehensive analysis to determine the role of each factor and its influence on the whole system. In this research, a hospital waste management simulation model is presented based on the system dynamics technique to determine the interaction among these factors in the system using a software package, ithink. This model is used to estimate waste segregation as this is important in the hospital waste management system to minimize risk to public health. Real data has been obtained from a case study of the city of Nablus, Palestine to validate the model. The model exhibits wastes generated from three types of hospitals (private, charitable, and government) by considering the number of both inpatients and outpatients depending on the population of the city under study. The model also offers the facility to compare the total waste generated among these different types of hospitals and anticipate and predict the future generated waste both infectious and non-infectious and the treatment cost incurred

    Image feature extraction using compressive sensing

    Get PDF
    In this paper a new approach for image feature extraction is presented. We used the Compressive Sensing (CS) concept to generate the measurement matrix. The new measurement matrix is different from the measurement matrices in literature as it was constructed using both zero mean and nonzero mean rows. The image is simply projected into a new space using the measurement matrix to obtain the feature vector. Another proposed measurement matrix is a random matrix constructed from binary entries. Face recognition problem was used as an example for testing the feature extraction capability of the proposed matrices. Experiments were carried out using two well-known face databases, namely, ORL and FERET databases. System performance is very promising and comparable with the classical baseline feature extraction algorithms. © Springer International Publishing Switzerland 2014
    corecore