25 research outputs found

    Assessment of Wireless Technologies for deployment in Intelligent Transportation System based on Internet of Things

    Get PDF
    Use of Internet of Things (IoT) with modern wireless network is a trend of the emerging technologies for different systems which can be deployed in various kinds of environment to monitor, communicate with or control the associated elements in the system. The activities e.g., monitoring and communication by IoT can play an important role to design an Intelligent Transportation System (ITS). In this paper, we assess the suitability of IoT enabled wireless technology to be used for ITS. We performed some comparative study to find the best wireless technology that provides reliability, low cost, less power consumption and less data latency for next generation ITS.This technology will reduce energy consumption of the deployed IoT devices as well as ensure safety, efficiency and convenient for transportation systems

    Modeling lung functionality in volume-controlled ventilation for critical care patients

    Get PDF
    Mechanical ventilators are the instruments that assist breathing of the patients having respiratory diseases e.g., pneumonia and coronavirus disease 2019 (COVID-19). This paper presents a modified lung model under volume-controlled ventilation to describe the lung volume and air flow in terms of air pressure signal from the ventilator. A negative feedback is incorporated in the model to balance the lung volume that is influenced by a lung parameter called positive end expiration pressure. We partially solved the lung model equation which takes the form of a first-order differential equation and then unknown parameters associated with the model were computed using a nonlinear least-squares method. Experimental data required for parameter identification and validation of the lung model were obtained by running a volume-controlled ventilator connected to a reference device and an artificial lung. The proposed model considering negative feedback achieves a better accuracy than that without feedback as demonstrated by test results. The developed model can be used in intensive care units (ICU) to evaluate mechanical ventilation performance and lung functionality in real-time

    Data Protection Laws

    Get PDF
    Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of privacy, and the political as well as legal roots surrounding that data. Therefore, data protection laws aim to provide a balance between the individual’s privacy rights and the proper use of data

    Introduction

    Get PDF
    Authentication is central to any security issue, involving the verification process of the identity of a person or a process to access a secured system. Therefore, authentication is extremely important to guarantee the smooth flow of information without troubles. Authentication process is implemented for data in storage and data in-transit with communication network. Critical systems, e.g., energy, banking and finance, defense, transportation, business process, manufacturing, water system, and emergency services heavily rely on information systems and networks. Authentication has become an integrated part of modern computing and communication technologies, e.g., Internet of Things (IoT), cloud computing, and connected vehicles. This chapter provides an overview of the book, its theme, and purpose by introducing the topics of the book that presents the current technological advances and the new trends in authentication in information security

    Conclusion

    Get PDF
    The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. All these chapters include research challenges and future research directions with the evolution of technologies

    Quran search engines: challenges and design requirements

    No full text

    Computational Investigation of Hydromagnetic Thermo-Solutal Nanofluid Slip Flow in a Darcian Porous Medium With Zero Mass Flux Boundary Condition Using Stretching Group Transformations

    Get PDF
    In this paper, hydromagnetic thermo-solutal nanofluid flow past a flat plate embedded in a Darcy porous medium has been investigated considering zero mass flux with velocity and thermal slips boundary conditions. The nanofluid flow is considered as 2D, steady state, incompressible, and laminar. We used a generalized stretching group of transformations to develop the similarity solutions of the model. Using these transformations, the transport equations of the nanofluid flow model are reduced to a system of nonlinear ordinary differential equations (ODEs). Finally, the transformed ODEs are computationally solved using MATLAB nonlinear equation solver "fsolve" and ODE solver "ode15s". Solutions are compared with previously available results and the comparison shows good correlation. Furthermore, the computational results are provided to demonstrate the influence of the dimensionless velocity slip parameter, thermal slip parameter, magnetic field parameter, Brownian motion parameter, thermophoresis parameter, and Darcy number on the dimensionless velocity, temperature, and nanoparticle volume fraction (concentration) fields, as well as on the heat transfer rate and skin friction. It was found that the skin friction factor decreases (increases) while the heat transfer rate increases (decreases) with the velocity (thermal) slip parameter. Both the heat transfer rate and the friction factor increase with the magnetic field and Darcy number

    Lie Group Analysis and Numerical Solution of Magnetohydrodynamic Free Convective Slip Flow of Micropolar Fluid Over a Moving Plate With Heat Transfer

    Get PDF
    In this paper, we investigate magnetohydrodynamic free convective flow of micropolar fluid over a moving flat plate using the Lie group transformations and numerical methods. Instead of using conventional no-slip boundary conditions, we used both the velocity and thermal slip boundary conditions to achieve physically realistic and practically useful results. The governing boundary layer equations are non-dimensionalized and transformed into a set of coupled ordinary differential equations (ODEs) using similarity transformations generated by the Lie group, before being solved numerically using Matlab stiff ODE solver ode15s and Matlab trust-region-reflective algorithm lsqnonlin. The effects of governing parameters on the dimensionless velocity, angular velocity, temperature, skin friction and heat transfer rate are investigated. Our analysis revealed that the dimensionless velocity and angular velocity decrease whilst the dimensionless temperature increases with the velocity slip parameter. Thermal slip reduces the dimensionless velocity and temperature but raises the dimensionless angular velocity. Magnetic field suppresses the velocity but elevates the temperature and angular velocity. Results reported in this paper are in good agreement with the ones reported by the previous authors

    Simulation of Building Evacuation: Performance Analysis and Simplified Model

    Get PDF
    rowd evacuation from industrial buildings, factories, theatres, protest areas, festivals, exhibitions and religious/sports gatherings is very crucial in many dangerous scenarios, such as fire, earthquakes, threat and attacks. Simulation of crowd evacuation is an integral part of planning for emergency situations and training staff for crow management. In this paper, simulation of crowd evacuation for a large building-hall is studied using a popular crowd-simulation software BuildingEXODUS. Evacuation of the fully occupied hall is simulated with eleven test cases using the different experimental setups in the software. The results of the different evacuation scenarios are analysed to check the effect of various parameters involved in the evacuation performance. Finally, using the evacuation test results, simplified models are developed. It is found that the model outputs are in good agreement with the simulation results. Therefore, the models can readily be used for fast computation of the evacuation results without running the actual simulation

    Authentication technologies for cloud technology, IoT, and big data

    No full text
    This book covers the state-of-art global research on authentication technologies for security and privacy in information systems, including applications, research challenges and future research directions
    corecore