893 research outputs found
Esthetic and functional oral makeover of a 3 year old cleft palate patient suffering from early childhood caries using unconventional techniques
Cleft lip and palate (CL/P) are the most common congenital craniofacial anomalies. It has been observed that these
children have a higher caries experience compared their non cleft counterparts. Early childhood caries results in
early pulp involvement and gross destruction of the anterior and posterior teeth. This leads to decreased masticatory
efficiency, difficulty in speech, compromised esthetics, development of abnormal tongue habits and subsequent
malocclusion and psychological problems. The restoration of severely decayed deciduous teeth especially anteriors
presents a special challenge to dentists, particularly in uncooperative children. The following case report documents
the restoration of severely mutilated deciduous teeth in an emotionally immature cleft palate patient resulting
in an improvement in not only oral and general health but also helping the patient gain more self confidence
Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization
Non-orthogonal multiple access (NOMA) has come to the fore as a
spectral-efficient technique for fifth-generation and beyond communication
networks. We consider the downlink of a NOMA system with untrusted users. In
order to consider a more realistic scenario, imperfect successive interference
cancellation is assumed at the receivers during the decoding process. Since
pair outage probability (POP) ensures a minimum rate guarantee to each user, it
behaves as a measure of the quality of service for the pair of users. With the
objective of designing a reliable communication protocol, we derive the
closed-form expression of POP. Further, we find the optimal power allocation
that minimizes the POP. Lastly, numerical results have been presented which
validate the exactness of the analysis, and reveal the effect of various key
parameters on achieved pair outage performance. In addition, we benchmark
optimal power allocation against equal and fixed power allocations with respect
to POP. The results indicate that optimal power allocation results in improved
communication reliability.Comment: 6 pages, 5 figures, WCNC 202
Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users
Joint resource allocation involving optimization of subcarrier allocation,
subcarrier pairing (SCP), and power allocation in a cooperative secure
orthogonal frequency division multiple access (OFDMA) communication system with
untrusted users is considered. Both amplify and forward (AF), and decode and
forward (DF) modes of operations are considered with individual power budget
constraints for source and relay. After finding optimal subcarrier allocation
for an AF relayed system, we prove the joint power allocation as a generalized
convex problem, and solve it optimally. Compared to the conventional channel
gain matching view, the optimal SCP is emphasized as a novel concept of channel
gain tailoring. We prove that the optimal SCP pairs subcarriers such that the
variance among the effective channel gains is minimized. For a DF relayed
system, we show that depending on the power budgets of source and relay, SCP
can either be in a subordinate role where it improves the energy efficiency, or
in a main role where it improves the spectral efficiency of the system. In an
AF relayed system we confirm that SCP plays a crucial role, and improves the
spectral efficiency of the system. The channel gain tailoring property of SCP,
various roles of SCP in improving the spectral and the energy efficiency of a
cooperative communication system are validated with the help of simulation
results
Fault Detection and Classification in Transmission Line Using Wavelet Transform and ANN
Recent years, there is an increased interest in fault classification algorithms. The reason, behind this interest is the escalating power demand and multiple interconnections of utilities in grid. This paper presents an application of wavelet transforms to detect the faults and further to perform classification by supervised learning paradigm. Different architectures of ANN aretested with the statistical attributes of a wavelet transform of a voltage signal as input features and binary digits as outputs. The proposed supervised learning module is tested on a transmission network. It is observed that ANN architecture performs satisfactorily when it is compared with the simulation results. The transmission network is simulated on Matlab. The performance indices Mean Square Error (MSE), Mean Absolute Error (MAE), Root Mean Square Error (RMSE) and Sum Square Error (SSE) are used to determine the efficacy of the neural network
Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices
The security of confidential information associated with devices in the
industrial Internet of Things (IIoT) network is a serious concern. This article
focuses on achieving a nonorthogonal multiple access (NOMA)-enabled secure IIoT
network in the presence of untrusted devices by jointly optimizing the
resources, such as decoding order and power allocated to devices. Assuming that
the devices are resource-constrained for performing perfect successive
interference cancellation (SIC), we characterize the residual interference at
receivers with the linear model. Firstly, considering all possible decoding
orders in an untrusted scenario, we obtain secure decoding orders that are
feasible to obtain a positive secrecy rate for each device. Then, under the
secrecy fairness criterion, we formulate a joint optimization problem of
maximizing the minimum secrecy rate among devices. Since the formulated problem
is non-convex and combinatorial, we first obtain the optimal secure decoding
order and then solve it for power allocation by analyzing Karush-Kuhn-Tucker
points. Thus, we provide the closed-form global-optimal solution of the
formulated optimization problem. Numerical results validate the analytical
claims and demonstrate an interesting observation that the conventional
decoding order and assigning more power allocation to the weak device, as
presumed in many works on NOMA, is not an optimal strategy from the secrecy
fairness viewpoint. Also, the average percentage gain of about 22.75%, 50.58%,
94.59%, and 98.16%, respectively, is achieved by jointly optimized solution
over benchmarks ODEP (optimal decoding order, equal power allocation), ODFP
(optimal decoding order, fixed power allocation), FDEP (fixed decoding order,
equal power allocation), and FDFP (fixed decoding order, fixed power
allocation).Comment: 10 pages and 6 figure
Analytical Study of Two Serial Channels with Priority and Reneging
Most of the studies of queuing theory, which are useful in our daily life has been investigated by many researchers. The present research is the study of pre-emptive priority queuing system consisting two serial channels in stochastic environment. The impatient behavior of customer’s will be discussed with exponential service distribution and Poisson arrivals. Higher priority customers have pre-emptive priority over the low priority customers. The G.F. technique is used to derive the performance measures of high & low priority queues and assuming FCFS discipline in busy schedule of higher priority class. Also evaluate queue behavior graphically and discussed a special case at the end which shows utilization of channels
A study on Morphological and Mechanical Characterization of Al-4032/SiC/GP Hybrid Composites
The pattern of metal matrix composites can be enhanced by integrating the concept of hybrid metal matrix composite to produce newer engineering materials with improved properties. The morphological and mechanical characteristics of Al-4032/SiC/GP hybrid composites have been investigated. The aluminium alloy (Al-4032) based hybrid composites have been fabricated through the bottom pouring stir casting set up, by reinforcing the silicon carbide (SiC) and granite powder ceramic particles as the reinforcement material at various fraction levels i.e. 0, 3, 6, 9 weight% in equal proportion. The reinforcement particle size is up to 54μm. The microstructural characterization of the hybrid composite samples has been carried out using an optical microscope, SEM, and XRD. The study reveals that the reinforcement hybrid particles (SiC + GP) are almost uniformly distributed throughout the matrix phase. The mechanical properties (tensile strength, impact strength, and microhardness) of the hybrid composite samples have been obtained and found to be better than the unreinforced alloy.
User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA
Non-orthogonal multiple access (NOMA) has been recognized as one of the key
enabling technologies for future generation wireless networks. Sharing the same
time-frequency resource among users imposes secrecy challenges in NOMA in the
presence of untrusted users. This paper characterizes the impact of user-pair
selection on the secrecy performance of an untrusted NOMA system. In this
regard, an optimization problem is formulated to maximize the secrecy rate of
the strong user while satisfying the quality of service (QoS) demands of the
user with poorer channel conditions. To solve this problem, we first obtain
optimal power allocation in a two-user NOMA system, and then investigate the
user-pair selection problem in a more generalized four user NOMA system.
Extensive performance evaluations are conducted to validate the accuracy of the
proposed results and present valuable insights on the impact of various system
parameters on the secrecy performance of the NOMA communication system
- …