893 research outputs found

    Esthetic and functional oral makeover of a 3 year old cleft palate patient suffering from early childhood caries using unconventional techniques

    Get PDF
    Cleft lip and palate (CL/P) are the most common congenital craniofacial anomalies. It has been observed that these children have a higher caries experience compared their non cleft counterparts. Early childhood caries results in early pulp involvement and gross destruction of the anterior and posterior teeth. This leads to decreased masticatory efficiency, difficulty in speech, compromised esthetics, development of abnormal tongue habits and subsequent malocclusion and psychological problems. The restoration of severely decayed deciduous teeth especially anteriors presents a special challenge to dentists, particularly in uncooperative children. The following case report documents the restoration of severely mutilated deciduous teeth in an emotionally immature cleft palate patient resulting in an improvement in not only oral and general health but also helping the patient gain more self confidence

    Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization

    Full text link
    Non-orthogonal multiple access (NOMA) has come to the fore as a spectral-efficient technique for fifth-generation and beyond communication networks. We consider the downlink of a NOMA system with untrusted users. In order to consider a more realistic scenario, imperfect successive interference cancellation is assumed at the receivers during the decoding process. Since pair outage probability (POP) ensures a minimum rate guarantee to each user, it behaves as a measure of the quality of service for the pair of users. With the objective of designing a reliable communication protocol, we derive the closed-form expression of POP. Further, we find the optimal power allocation that minimizes the POP. Lastly, numerical results have been presented which validate the exactness of the analysis, and reveal the effect of various key parameters on achieved pair outage performance. In addition, we benchmark optimal power allocation against equal and fixed power allocations with respect to POP. The results indicate that optimal power allocation results in improved communication reliability.Comment: 6 pages, 5 figures, WCNC 202

    Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users

    Full text link
    Joint resource allocation involving optimization of subcarrier allocation, subcarrier pairing (SCP), and power allocation in a cooperative secure orthogonal frequency division multiple access (OFDMA) communication system with untrusted users is considered. Both amplify and forward (AF), and decode and forward (DF) modes of operations are considered with individual power budget constraints for source and relay. After finding optimal subcarrier allocation for an AF relayed system, we prove the joint power allocation as a generalized convex problem, and solve it optimally. Compared to the conventional channel gain matching view, the optimal SCP is emphasized as a novel concept of channel gain tailoring. We prove that the optimal SCP pairs subcarriers such that the variance among the effective channel gains is minimized. For a DF relayed system, we show that depending on the power budgets of source and relay, SCP can either be in a subordinate role where it improves the energy efficiency, or in a main role where it improves the spectral efficiency of the system. In an AF relayed system we confirm that SCP plays a crucial role, and improves the spectral efficiency of the system. The channel gain tailoring property of SCP, various roles of SCP in improving the spectral and the energy efficiency of a cooperative communication system are validated with the help of simulation results

    Fault Detection and Classification in Transmission Line Using Wavelet Transform and ANN

    Get PDF
    Recent years, there is an increased interest in fault classification algorithms. The reason, behind this interest is the escalating power demand and multiple interconnections of utilities in grid. This paper presents an application of wavelet transforms to detect the faults and further to perform classification by supervised learning paradigm. Different architectures of ANN aretested with the statistical attributes of a wavelet transform of a voltage signal as input features and binary digits as outputs. The proposed supervised learning module is tested on a transmission network. It is observed that ANN architecture performs satisfactorily when it is compared with the simulation results. The transmission network is simulated on Matlab. The performance indices Mean Square Error (MSE), Mean Absolute Error (MAE), Root Mean Square Error (RMSE) and Sum Square Error (SSE) are used to determine the efficacy of the neural network

    Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices

    Full text link
    The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a nonorthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing the resources, such as decoding order and power allocated to devices. Assuming that the devices are resource-constrained for performing perfect successive interference cancellation (SIC), we characterize the residual interference at receivers with the linear model. Firstly, considering all possible decoding orders in an untrusted scenario, we obtain secure decoding orders that are feasible to obtain a positive secrecy rate for each device. Then, under the secrecy fairness criterion, we formulate a joint optimization problem of maximizing the minimum secrecy rate among devices. Since the formulated problem is non-convex and combinatorial, we first obtain the optimal secure decoding order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker points. Thus, we provide the closed-form global-optimal solution of the formulated optimization problem. Numerical results validate the analytical claims and demonstrate an interesting observation that the conventional decoding order and assigning more power allocation to the weak device, as presumed in many works on NOMA, is not an optimal strategy from the secrecy fairness viewpoint. Also, the average percentage gain of about 22.75%, 50.58%, 94.59%, and 98.16%, respectively, is achieved by jointly optimized solution over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP (optimal decoding order, fixed power allocation), FDEP (fixed decoding order, equal power allocation), and FDFP (fixed decoding order, fixed power allocation).Comment: 10 pages and 6 figure

    Analytical Study of Two Serial Channels with Priority and Reneging

    Get PDF
    Most of the studies of queuing theory, which are useful in our daily life has been investigated by many researchers. The present research is the study of pre-emptive priority queuing system consisting two serial channels in stochastic environment. The impatient behavior of customer’s will be discussed with exponential service distribution and Poisson arrivals. Higher priority customers have pre-emptive priority over the low priority customers. The G.F. technique is used to derive the performance measures of high & low priority queues and assuming FCFS discipline in busy schedule of higher priority class. Also evaluate queue behavior graphically and discussed a special case at the end which shows utilization of channels

    A study on Morphological and Mechanical Characterization of Al-4032/SiC/GP Hybrid Composites

    Get PDF
    The pattern of metal matrix composites can be enhanced by integrating the concept of hybrid metal matrix composite to produce newer engineering materials with improved properties. The morphological and mechanical characteristics of Al-4032/SiC/GP hybrid composites have been investigated. The aluminium alloy (Al-4032) based hybrid composites have been fabricated through the bottom pouring stir casting set up, by reinforcing the silicon carbide (SiC) and granite powder ceramic particles as the reinforcement material at various fraction levels i.e. 0, 3, 6, 9 weight% in equal proportion. The reinforcement particle size is up to 54μm. The microstructural characterization of the hybrid composite samples has been carried out using an optical microscope, SEM, and XRD. The study reveals that the reinforcement hybrid particles (SiC + GP) are almost uniformly distributed throughout the matrix phase. The mechanical properties (tensile strength, impact strength, and microhardness) of the hybrid composite samples have been obtained and found to be better than the unreinforced alloy.

    User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA

    Full text link
    Non-orthogonal multiple access (NOMA) has been recognized as one of the key enabling technologies for future generation wireless networks. Sharing the same time-frequency resource among users imposes secrecy challenges in NOMA in the presence of untrusted users. This paper characterizes the impact of user-pair selection on the secrecy performance of an untrusted NOMA system. In this regard, an optimization problem is formulated to maximize the secrecy rate of the strong user while satisfying the quality of service (QoS) demands of the user with poorer channel conditions. To solve this problem, we first obtain optimal power allocation in a two-user NOMA system, and then investigate the user-pair selection problem in a more generalized four user NOMA system. Extensive performance evaluations are conducted to validate the accuracy of the proposed results and present valuable insights on the impact of various system parameters on the secrecy performance of the NOMA communication system
    • …
    corecore