62 research outputs found

    Stochastic Techniques for the Solution of Electrostatic Problems With Applications to Electron Optics.

    Get PDF
    We apply stochastic techniques towards the solution of the two-dimensional Laplace\u27s equation in boundary value problems encountered in the calculation of electrostatic potentials in electron lenses and deflectors. The justification of these techniques arises from an astonishingly simple but far-reaching principle, which has been known for a long time but has been rarely used: the potential at any point in the interior of a charge-free region can be calculated by performing random walks starting at this point and terminating at the boundary of the region--the potential is then the average of the potential boundary values (assumed known) over the random walks. By an optimal combination of the stochastic Monte-Carlo and deterministic Relaxation methods, we show the advantages and competitiveness of our hybrid Monte-Carlo-Relaxation (MCR) technique compared to the conventional numerical techniques used in the previously mentioned problem. In order to enhance the performance of our method, we investigate the convergence, speed and accuracy of MCR versus traditional techniques. We also develop optimized computational techniques that we believe increase MCR\u27s appeal to problems not previously considered amenable to Monte-Carlo type simulations as well as demonstrate its applicability in problems that are intractable by traditional relaxation or analytical techniques. We use MCR to simulate electrostatic lenses and detectors previously presented in the literature. Finally, we demonstrate the application of MCR towards the numerical solution of general elliptic problems in arbitrary domains and we present the generalization of the stochastic method to solve problems with space charge, namely Poisson\u27s equation

    FlexiChain 2.0: NodeChain Assisting Integrated Decentralized Vault for Effective Data Authentication and Device Integrity in Complex Cyber-Physical Systems

    Full text link
    Distributed Ledger Technology (DLT) has been introduced using the most common consensus algorithm either for an electronic cash system or a decentralized programmable assets platform which provides general services. Most established reliable networks are unsuitable for all applications such as smart cities applications, and, in particular, Internet of Things (IoT) and Cyber Physical Systems (CPS) applications. The purpose of this paper is to provide a suitable DLT for IoT and CPS that could satisfy their requirements. The proposed work has been designed based on the requirements of Cyber Physical Systems. FlexiChain is proposed as a layer zero network that could be formed from independent blockchains. Also, NodeChain has been introduced to be a distributed (Unique ID) UID aggregation vault to secure all nodes' UIDs. Moreover, NodeChain is proposed to serve mainly FlexiChain for all node security requirements. NodeChain targets the security and integrity of each node. Also, the linked UIDs create a chain of narration that keeps track not merely for assets but also for who authenticated the assets. The security results present a higher resistance against four types of attacks. Furthermore, the strength of the network is presented from the early stages compared to blockchain and central authority. FlexiChain technology has been introduced to be a layer zero network for all CPS decentralized applications taking into accounts their requirements. FlexiChain relies on lightweight processing mechanisms and creates other methods to increase security

    Consensus Algorithms of Distributed Ledger Technology -- A Comprehensive Analysis

    Full text link
    The most essential component of every Distributed Ledger Technology (DLT) is the Consensus Algorithm (CA), which enables users to reach a consensus in a decentralized and distributed manner. Numerous CA exist, but their viability for particular applications varies, making their trade-offs a crucial factor to consider when implementing DLT in a specific field. This article provided a comprehensive analysis of the various consensus algorithms used in distributed ledger technologies (DLT) and blockchain networks. We cover an extensive array of thirty consensus algorithms. Eleven attributes including hardware requirements, pre-trust level, tolerance level, and more, were used to generate a series of comparison tables evaluating these consensus algorithms. In addition, we discuss DLT classifications, the categories of certain consensus algorithms, and provide examples of authentication-focused and data-storage-focused DLTs. In addition, we analyze the pros and cons of particular consensus algorithms, such as Nominated Proof of Stake (NPoS), Bonded Proof of Stake (BPoS), and Avalanche. In conclusion, we discuss the applicability of these consensus algorithms to various Cyber Physical System (CPS) use cases, including supply chain management, intelligent transportation systems, and smart healthcare.Comment: 50 pages, 20 figure

    G-DaM: A Distributed Data Storage with Blockchain Framework for Management of Groundwater Quality Data

    Get PDF
    Groundwater overuse in different domains will eventually lead to global freshwater scarcity. To meet the anticipated demands, many governments worldwide are employing innovative and traditional techniques for forecasting groundwater availability by conducting research and studies. One challenging step for this type of study is collecting groundwater data from different sites and securely sending it to the nearby edges without exposure to hacking and data tampering. In the current paper, we send raw data formats from the Internet of Things to the Distributed Data Storage (DDS) and Blockchain (BC) edges. We use a distributed and decentralized architecture to store the statistics, perform double hashing, and implement access control through smart contracts. This work demonstrates a modern and innovative approach combining DDS and BC technologies to overcome traditional data sharing, and centralized storage, while addressing blockchain limitations. We have shown performance improvements with increased data quality and integrity

    agroString: Visibility and Provenance through a Private Blockchain Platform for Agricultural Dispense towards Consumers

    Get PDF
    It is a known fact that large quantities of farm and meat products rot and are wasted if correct actions are not taken, which may lead to serious health issues if consumed. There is no proper system for tracking and communicating the status of the goods to their respective stakeholders in a secure way. Consumers have every right to know the quality of the products they consume. Using monitoring tools, such as the Internet of Agricultural Things (IoAT), and modern data protection techniques for storing and sharing, will help mitigate data integrity issues during the transmission of sensor records, increasing the data quality. The visibility state at the customer end is also improved, and they are aware of the agricultural product’s conditions throughout the real-time distribution process. In this paper, we developed and implemented a CorDapp application to manage the data for the supply chain, called “agroString”. We collected the temperature and humidity data using IoAT-Edge devices and various datasets from multiple sources. We then sent those readings to the CorDapp agroString and successfully shared them among the relevant parties. With the help of a Corda private blockchain, we attempted to increase data integrity, trust, visibility, provenance, and quality at each logistic step, while decreasing blockchain and central system limitations

    EZcap: a novel wearable for real-time automated seizure detection from EEG signals

    Get PDF
    Epileptic seizures present a serious danger to the lives of their victims, rendering them unconscious, lacking control, and may even result in death only a few seconds after onset. This gives rise to a crucial need for an effective seizure detection method that is fast, accurate, and has the potential for mass market adoption. Kriging methods have a good reputation for high accuracy in spatial prediction, hence, their extensive use in geostatistics. This paper demonstrates the successful application of Kriging methods for an effective seizure detection device in an edge computing environment by modeling the brain as a spatial panorama. We hereby propose a novel wearable for real-time automated seizure detection from EEG signals using three different types of Kriging, namely, Simple Kriging, Ordinary Kriging and Universal Kriging. After multiple experiments with electroencephalogram (EEG) signals obtained from seizure patients as well as those from their healthy counterparts, the results reveal that the three Kriging methods performed very well in accuracy, sensitivity and latency of detection. It was found however, that Simple Kriging outperforms the other Kriging methods with a mean seizure detection latency of 0.81 sec, a perfect specificity, an accuracy of 97.50% and a sensitivity of 94.74%. The results in this paper compare well with other seizure detection models in the literature but their excellent seizure detection latency surpasses the performance of most existing works in seizure detection
    • …
    corecore