1,155 research outputs found
Modeling and Implementation of Wireless Sensor Networks for Logistics Applications
Logistics has experienced a long time of developments and improvements based on the advanced vehicle technologies, transportation systems, traffic network extension and logistics processes. In the last decades, the complexity has increased significantly and this has created complex logistics networks over multiple continents. Because of the close cooperation, these logistics networks are highly dependent on each other in sharing and processing the logistics information. Every customer has many suppliers and vice versa. The conventional centralized control continues but reaches some limitations such as the different distribution of suppliers, the complexity and flexibility of processing orders or the dynamics of the logistic objects. In order to overcome these disadvantages, the paradigm of autonomous logistics is proposed and promises a better technical solution for current logistics systems. In autonomous logistics, the decision making is shifted toward the logistic objects which are defined as material items (e.g., vehicles, containers) or immaterial items (e.g., customer orders) of a networked logistics system. These objects have the ability to interact with each other and make decisions according to their own objectives. In the technical aspect, with the rapid development of innovative sensor technology, namely Wireless Sensor Networks (WSNs), each element in the network can self-organize and interact with other elements for information transmission. The attachment of an electronic sensor element into a logistic object will create an autonomous environment in both the communication and the logistic domain. With this idea, the requirements of logistics can be fulfilled; for example, the monitoring data can be precise, comprehensive and timely. In addition, the goods flow management can be transferred to the information logistic object management, which is easier by the help of information technologies. However, in order to transmit information between these logistic objects, one requirement is that a routing protocol is necessary. The Opportunistic relative Distance-Enabled Uni-cast Routing (ODEUR ) protocol which is proposed and investigated in this thesis shows that it can be used in autonomous environments like autonomous logistics. Moreover, the support of mobility, multiple sinks and auto-connection in this protocol enhances the dynamics of logistic objects. With a general model which covers a range from low-level issues to high-level protocols, many services such as real time monitoring of environmental conditions, context-aware applications and localization make the logistic objects (embedded with sensor equipment) more advanced in information communication and data processing. The distributed management service in each sensor node allows the flexible configuration of logistic items at any time during the transportation. All of these integrated features introduce a new technical solution for smart logistic items and intelligent transportation systems. In parallel, a management system, WSN data Collection and Management System (WiSeCoMaSys), is designed to interact with the deployed Wireless Sensor Networks. This tool allows the user to easily manipulate the sensor networks remotely. With its rich set of features such as real time data monitoring, data analysis and visualization, per-node management, and alerts, this tool helps both developers and users in the design and deployment of a sensor network. In addition, an analytical model is developed for comparison with the results from simulations and experiments. Focusing on the use of probability theory to model the network links, this model considers several important factors such as packet reception rate and network traffic which are used in the simulation and experiment parts. Moreover, the comparison between simulation, experiment and analytical results is also carried out to estimate the accuracy of the design and make several improvements of the simulation accuracy. Finally, all of the above parts are integrated in one unique system. This system is verified by both simulations in logistic scenarios (e.g., harbors, warehouses and containers) and experiments. The results show that the proposed model and protocol have a good packet delivery rate, little memory requirements and low delay. Accordingly, this system design is practical and applicable in logistics
A Conceptualisation of innovative organisation of an ICT company: A focus on the impact of ‘innovative milieu’
Purpose: This paper investigates key elements for supporting strategic management behaviour with
actionable implications for multinational corporations in the ICT business sector.
Design/methodology/approach: Samsung was chosen as a research case. A qualitative approach was
applied to this study to develop a discussion framework with key elements which support innovative
organisational behaviour.
Findings: From an analysis of secondary data of academic discussions relating with business behaviour of
Samsung, five key themes were developed (e.g., Direction and driving force; Understanding the market;
Management system; Organisational strategies; Review & evaluation). Further discussions were expanded
from the framework with five key themes revealed a catalytic factor to foster an innovative behaviour of
the organisation.
Discussions: It has been found that close communications with stakeholders and the impact of innovative
milieu should be a catalytic factor to enhance dynamic innovative actions within the organisation.
Especially in the competitive ICT business sector, it has been suggested that the inter-organisational and
internal learning attitudes covering both individuals and organisational proactiveness should be focused
to sustain the businesses. Moreover, organisational innovation can be achieved from the collaborative
‘innovative milieu’ which enhances the proactive innovations
On the Interference Alignment Designs for Secure Multiuser MIMO Systems
In this paper, we propose two secure multiuser multiple-input multiple-output
transmission approaches based on interference alignment (IA) in the presence of
an eavesdropper. To deal with the information leakage to the eavesdropper as
well as the interference signals from undesired transmitters (Txs) at desired
receivers (Rxs), our approaches aim to design the transmit precoding and
receive subspace matrices to minimize both the total inter-main-link
interference and the wiretapped signals (WSs). The first proposed IA scheme
focuses on aligning the WSs into proper subspaces while the second one imposes
a new structure on the precoding matrices to force the WSs to zero. When the
channel state information is perfectly known at all Txs, in each proposed IA
scheme, the precoding matrices at Txs and the receive subspaces at Rxs or the
eavesdropper are alternatively selected to minimize the cost function of an
convex optimization problem for every iteration. We provide the feasible
conditions and the proofs of convergence for both IA approaches. The simulation
results indicate that our two IA approaches outperform the conventional IA
algorithm in terms of average secrecy sum rate.Comment: Updated version, updated author list, accepted to be appear in IEICE
Transaction
Structural features of geostrophic circulation in open region of the South China Sea
On the basis of observation data of water temperature and salinity the mean seasonal geostrophic circulation in open region of the South China Sea (SCS) was computed by the dynamic method relative to the 800 decibar reference surface. The results of computation let go to following notices:
In both main monsoons (winter and summer) there are two main geostrophic eddies: the anticlockwise eddy in the northern and northwestern part, and the clockwise eddy in the southern part of the SCS with corresponding divergent and convergent zones. The main frontal zones go along the middle latitudes of the sea from the southern continental shelf of Vietnam to the area west of Luzon Island. The strength and stability of the current in winter are higher than in summer. The Kuroshio has an enough strong branch intruding into the SCS through Bashi Strait in winter creating in the sea the water structure similar to that of the Northwest Pacific subtropical and tropical regions. In summer the Kuroshio water can intrude directly only into the area southwest of Taiwan
Monitoring quantity and quality of pangasius pond effluent : report of a monitoring program and recommendations for certification
The quantity and quality of pangasius pond effluent was monitored by means of monthly sampling during a study conducted on four striped catfish farms located in the Mekong Delta, Vietnam. The study was undertaken to test the practical implications of the standards and guidelines with regard to catfish pond effluent that are at present developed by various certification programs for striped catfish production in Vietnam. The results showed a great variability twelve pangasius pond within the samples that were taken during one period of partial pond draining and refilling. The consequences of such variability with regard to the certification standards and guidelines are discussed and recommendations are given
VFFINDER: A Graph-based Approach for Automated Silent Vulnerability-Fix Identification
The increasing reliance of software projects on third-party libraries has
raised concerns about the security of these libraries due to hidden
vulnerabilities. Managing these vulnerabilities is challenging due to the time
gap between fixes and public disclosures. Moreover, a significant portion of
open-source projects silently fix vulnerabilities without disclosure, impacting
vulnerability management. Existing tools like OWASP heavily rely on public
disclosures, hindering their effectiveness in detecting unknown
vulnerabilities. To tackle this problem, automated identification of
vulnerability-fixing commits has emerged. However, identifying silent
vulnerability fixes remains challenging. This paper presents VFFINDER, a novel
graph-based approach for automated silent vulnerability fix identification.
VFFINDER captures structural changes using Abstract Syntax Trees (ASTs) and
represents them in annotated ASTs. VFFINDER distinguishes vulnerability-fixing
commits from non-fixing ones using attention-based graph neural network models
to extract structural features. We conducted experiments to evaluate VFFINDER
on a dataset of 36K+ fixing and non-fixing commits in 507 real-world C/C++
projects. Our results show that VFFINDER significantly improves the
state-of-the-art methods by 39-83% in Precision, 19-148% in Recall, and 30-109%
in F1. Especially, VFFINDER speeds up the silent fix identification process by
up to 47% with the same review effort of 5% compared to the existing
approaches.Comment: Accepted by IEEE KSE 202
Postbuckling analysis of functionally graded nanoplates based on nonlocal theory and isogeometric analysis
This study aims to investigate the postbuckling response of functionally graded (FG) nanoplates by using the nonlocal elasticity theory of Eringen to capture the size effect. In addition, Reddy’s third-order shear deformation theory is adopted to describe the kinematic relations, while von Kaman’s assumptions are used to account for the geometrical nonlinearity. In order to calculate the effective
material properties, the Mori-Tanaka scheme is adopted. Governing equations are derived based on the principle of virtual work. Isogeometric analysis (IGA) is employed as a discretization tool, which is able to satisfy the C1-continuity demand efficiently. The Newton-Raphson iterative technique with imperfection is employed to trace the postbuckling paths. Various numerical studies are carried out to examine the influences of gradient index, nonlocal effect, ratio of compressive loads, boundary condition, thickness ratio and aspect ratio on the postbuckling behaviour of FG nanoplates
- …