15,239 research outputs found

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Accounting conservatism and banking expertise on board of directors

    Get PDF
    Previous studies show mixed evidence of the role of banking expertise on the board of directors on accounting conservatism. In this paper, we add to this growing literature by providing an innovative way to measure banking expertise based on life-time working history in banks of all individual directors on the board. We find that accounting conservatism is negatively affected by banking expertise on the board. Also, the results indicate that banking expertise on the board has a more pronounced impact on accounting conservatism when firms have high bankruptcy risk and when firms have high financial leverage. The evidence has some implications for boards of directors

    Inverse Rendering of Lambertian Surfaces Using Subspace Methods

    Full text link

    Seismic Interpretation of the Nam Con Son Basin and Its Implication for the Tectonic Evolution

    Full text link
    DOI:10.17014/ijog.3.2.127-137The Nam Con Son Basin covering an area of circa 110,000 km2 is characterized by complex tectonic settings of the basin which has not fully been understood. Multiple faults allowed favourable migration passageways for hydrocarbons to go in and out of traps. Despite a large amount of newly acquired seismic and well data there is no significant update on the tectonic evolution and history of the basin development. In this study, the vast amount of seismic and well data were integrated and reinterpreted to define the key structural events in the Nam Con Son Basin. The results show that the basin has undergone two extentional phases. The first N - S extensional phase terminated at around 30 M.a. forming E - W trending grabens which are complicated by multiple half grabens filled by Lower Oligocene sediments. These grabens were reactivated during the second NW - SE extension (Middle Miocene), that resulted from the progressive propagation of NE-SW listric fault from the middle part of the grabens to the margins, and the large scale building up of roll-over structure. Further to the SW, the faults of the second extentional phase turn to NNE-SSW and ultimately N - S in the SW edge of the basin. Most of the fault systems were inactive by Upper Miocene except for the N - S fault system which is still active until recent time

    Architecture for public safety network using D2D communication

    Get PDF
    Device to Device (D2D) communication has been proposed as an underlay to Long-Term evolution (LTE) network as a means of harvesting the proximity, reuse and hop gains. However, D2D communication can also serve as a technology for providing public safety and disaster relief services. In this article, the basic concepts of D2D communications are first introduced and then existing fundamental works on disaster communication are discussed. We focus on the performance of the network architecture by utilizing the relay assisted transmission which can effectively enhance the capacity and power saving of the network. We also propose the distance based strategy to reduce the computational complexity and power transmission. Finally, simulation results are provided to verify the proposed architecture

    A Deep Learning Approach to Network Intrusion Detection

    Get PDF
    Software Defined Networking (SDN) has recently emerged to become one of the promising solutions for the future Internet. With the logical centralization of controllers and a global network overview, SDN brings us a chance to strengthen our network security. However, SDN also brings us a dangerous increase in potential threats. In this paper, we apply a deep learning approach for flow-based anomaly detection in an SDN environment. We build a Deep Neural Network (DNN) model for an intrusion detection system and train the model with the NSL-KDD Dataset. In this work, we just use six basic features (that can be easily obtained in an SDN environment) taken from the forty-one features of NSL-KDD Dataset. Through experiments, we confirm that the deep learning approach shows strong potential to be used for flow-based anomaly detection in SDN environments

    Déploiement et implantation d'une technologie de l'information aux urgences : rôle des infirmières gestionnaires

    Full text link
    Ce rapport de stage a reçu du financement, sous la forme de la bourse d'études Ginette Lemire Rodger d'un montant de 5000$ , de la Fondation des infirmières et infirmiers du Canada.Les infirmières sont connues pour constituer la plus grande force de travail dans le domaine de la santé et être le premier point de contact pour les services de santé. Elles utilisent de nombreux outils dans leur pratique quotidienne, tels que les dossiers de santé électroniques, les services de télésanté, la technologie infonuagique, et plus encore. Malgré leur nombre, les infirmières ne sont généralement pas consultées pour l'acquisition, le développement et la mise en œuvre des technologies qu'elles utilisent. Introduire une nouvelle technologie qui devrait révolutionner les soins est inutile si la main-d'œuvre ne la soutient pas. Afin d’assurer une meilleure transformation technologique et organisationnelle de soins de santé, une des solutions consiste à valoriser les gestionnaires intermédiaires, tels que les infirmières gestionnaires. Les infirmières gestionnaires occupent une position unique dans les organisations de soins de santé qui leur permettent d’accroître l'adoption et l'utilisation des technologies de soins de santé par les infirmières. Leurs compétences en communication et en leadership sont leurs atouts pour ce faire. Au cours d’un stage, le but était d’élaborer un plan de gestion de changement regroupant des stratégies et interventions basées sur des données probantes dans l’objectif de soutenir les infirmières gestionnaires à faciliter l’implantation et l’intégration d’un système d’information de laboratoire. À cette fin, une revue des écrits a été menée pour développer et planifier le projet selon le Integrated Technology Implementation Model. Des observations issues d'une revue de processus menée par la Direction des soins infirmiers de l'organisation de santé et des entretiens informels avec des parties prenantes clés ont également été incluses dans le développement du projet. Le plan de gestion du changement a été conçu afin de respecter un modèle préconisé par le Centre hospitalier de l’Université de Montréal où s’est déroulé le stage. L'expérience a également mis en évidence différents rôles et activités contribuant au succès de la gestion du changement pour la mise en œuvre de la technologie de l'information en santé (TIS) décrite dans la littérature scientifique. Des recommandations liées à la nécessité de la contribution des infirmières gestionnaires au succès de toutes les étapes de la planification de la (TIS), de la planification à la post-implantation, sont proposées.Nurses are known to be the largest workforce in healthcare and a first point of contact for health services. They use many tools in their daily practice like: electronic health records, telehealth services, cloud technology and more. Despite their numbers, nurses are generally not consulted in the acquisition, development, and implementation of the technology they use. Introducing a new technology that should revolutionize care is useless if the workforce won't support it. To ensure a better technological and organizational transformation of healthcare, one solution is to value middle managers, such as nurse managers. They are in a unique position in healthcare organizations to increase frontline nurses' adoption and use of healthcare technologies. Notably, their communication and leadership skills are their assets to do so. Over the course of an internship experience, the goal was to elaborate a change management plan with evidence-based strategies and interventions empowering nurse managers to facilitate the implementation and integration of a laboratory management system. To this end, a preliminary review of the literature was conducted to develop and plan the project according to the Integrated Technology Implementation Model. Observations from a process review conducted by the Nursing Directorate of the healthcare organization and informal interviews with key stakeholders were also included in the development of the project. The change management plan was designed to follow a model firmly recommended by the Centre hospitalier de l’Université de Montréal where the internship took place. The experience also highlighted different roles and activities contributing to the success of the change management required of health information technology (HIT) implementation described in the scientific literature. Recommendations related to the necessity of nurse managers’ contribution to the success of all stages of HIT planning to post-implementation are proposed
    • …
    corecore