34 research outputs found

    Physiochemical and Microbial Assessment of Water Quality in the Upper Litani River Basin, Lebanon

    Get PDF
    Water resources in Lebanon are witnessing serious challenges and reached depletion. One of the major challenges is the quality deterioration, which is accompanied with uncontrolled resources management, and thus the increasing demand. There are several consumption aspects, mainly the domestic, industrial and irrigation. Yet, exploitation of water resources in Lebanon implies both the surface and groundwater. However, surface water resources are most used due to the ease of exploitation processes, and more certainly water from rivers. Typically, the Litani River is the largest one in Lebanon. The river has been lately subjected to several aspects of deterioration in its quality. This includes the major physiochemical characteristics. This study aims to assess the seasonal variations in water quality in the Upper Litani River Basin, including the Qaraaoun Lake. Samples were collected from particular sites along the river, and at several dates during the years of 2010 and 2011. The carried analysis implies the physical (pH, T°, TDS, Ec), chemicals (Na+, Ca2+, Mg2+, Cl?, SO42?, NH3+, NO3?, PO42?, K+, BOD5 and COD, Heavy metals (Fe, Ni, Zn, Cu, Cr, Al, Ba, Pb, Mn) and microbiological parameters. This resulted numeric data are being compared with WHO guidelines. In addition, PCA was applied to evaluate the data accuracy. We can conclude that the variables used are very efficient and the dry season shows the worst water quality with nitrate, metal and microbial enrichments. Keywords: Water Contamination, Human Interference, Litani River, Principal Component Analysis

    Scheduling M2M traffic over LTE uplink of a dense small cell network

    Get PDF
    We present an approach to schedule Long Term Evolution (LTE) uplink (UL) Machine-to-Machine (M2M) traffic in a densely deployed heterogeneous network, over the street lights of a big boulevard for smart city applications. The small cells operate with frequency reuse 1, and inter-cell interference (ICI) is a critical issue to manage. We consider a 3rd Generation Partnership Project (3GPP) compliant scenario, where single-carrier frequency-division multiple access (SC-FDMA) is selected as the multiple access scheme, which requires that all resource blocks (RBs) allocated to a single user have to be contiguous in the frequency within each time slot. This adjacency constraint limits the flexibility of the frequency-domain packet scheduling (FDPS) and inter-cell interference coordination (ICIC), when trying to maximize the scheduling objectives, and this makes the problem NP-hard. We aim to solve a multi-objective optimization problem, to maximize the overall throughput, maximize the radio resource usage and minimize the ICI. This can be modelled through a mixed-integer linear programming (MILP) and solved through a heuristic implementable in the standards. We propose two models. The first one allocates resources based on the three optimization criteria, while the second model is more compact and is demonstrated through numerical evaluation in CPLEX, to be equivalent in the complexity, while it performs better and executes faster. We present simulation results in a 3GPP compliant network simulator, implementing the overall protocol stack, which support the effectiveness of our algorithm, for different M2M applications, with respect to the state-of-the-art approaches

    Information flow in logic programming

    No full text
    International audienceThis paper proposes a theoretical foundation of what could be an information flow in logic programming. Several information flow definitions (based on success/failure, substitution answers, bisimulation between resolution trees of goals) are stated and compared. Decision procedures are given for each definition and complexity is studied for specific classes of logic programs

    Information flow in logic programming

    No full text
    TOULOUSE3-BU Sciences (315552104) / SudocSudocFranceF

    Dynamic Resource Allocation of eMBB-uRLLC Traffic in 5G New Radio

    No full text
    5G technology is intended to support three promising services with heterogeneous requirements: Ultra-Reliable and Low Latency Communication (uRLLC), enhanced Mobile Broadband (eMBB) and massive Machine Type Communication (mMTC). The presence of these services on the same network creates a challenging task of resource allocation to meet their requirements. Given the critical nature of uRLLC applications, uRLLC traffic will always have the highest priority which causes a negative impact on the performance of other types of applications. In this paper, the problem of uRLLC/eMBB resource allocation is formulated as an optimization problem aiming to maximize the average throughput of eMBB User Equipment (UE) while satisfying the latency demands of uRLLC applications. A dynamic programming approach is used to achieve an optimal resource allocation for uRLLC traffic on a TTI level that minimizes its impact on eMBB average throughput in addition to preserving an acceptable level of fairness among eMBB UE. This approach is applied on top of heuristic scheduling algorithms where uRLLC traffic punctures pre-allocated resources of eMBB UE upon arrival. The effectiveness of the approach is evaluated using numerical simulations and the results show how it minimizes the impact of uRLLC traffic on the performance of these algorithms in terms of data rate, spectral efficiency, and fairness. 2020 IEEE.Qatar Foundation;Qatar National Research FundScopu

    Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN

    No full text
    In remote rural areas without continuous Internet connectivity, it is hard to envisage the use of mHealth applications for remote patient monitoring. In such areas, patients need to travel long distances to reach the nearest health center. In this article, we propose an approach that solves this problem by transmitting mHealth monitoring data, collected using IoT sensors, using DTN. Thus, buses or other vehicles acting as data mules transmit the mHealth data from remote rural areas to a medical center or hospital in the nearest urban area. The proposed approach includes methods to preserve the security of the data through encryption and secure key exchange, and to authenticate the patients through appropriate hashing of selected information. It allows preserving the privacy of the patients, and it takes into account the intermittent nature of the network by adding redundancy to avoid data loss. 1986-2012 IEEE.This work was made possible by NPRP grant #10- 1205-160012 from the Qatar National Research Fund (a member of Qatar Foundation).Scopus2-s2.0-8508255309

    Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

    No full text
    In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44 billion by 2025. As a result, security-related attacks against the IoT domain are expected to increase further and their impact risks to seriously affect the underlying IoT systems, networks, devices, and applications. The adoption of standard security (counter) measures is not always effective, especially with the presence of resource-constrained IoT devices. Hence, there is a need to conduct penetration testing at the level of IoT systems. However, the main issue is the fact that IoT consists of a large variety of IoT devices, firmware, hardware, software, application/web-servers, networks, and communication protocols. Therefore, to reduce the effect of these attacks on IoT systems, periodic penetration testing and ethical hacking simulations are highly recommended at different levels (end-devices, infrastructure, and users) for IoT, and can be considered as a suitable solution. Therefore, the focus of this paper is to explain, analyze and assess both technical and non-technical aspects of security vulnerabilities within IoT systems via ethical hacking methods and tools. This would offer practical security solutions that can be adopted based on the assessed risks. This process can be considered as a simulated attack(s) with the goal of identifying any exploitable vulnerability or/and a security gap in any IoT entity (end devices, gateway, or servers) or firmware
    corecore