1,155 research outputs found

    Modeling and Implementation of Wireless Sensor Networks for Logistics Applications

    Get PDF
    Logistics has experienced a long time of developments and improvements based on the advanced vehicle technologies, transportation systems, traffic network extension and logistics processes. In the last decades, the complexity has increased significantly and this has created complex logistics networks over multiple continents. Because of the close cooperation, these logistics networks are highly dependent on each other in sharing and processing the logistics information. Every customer has many suppliers and vice versa. The conventional centralized control continues but reaches some limitations such as the different distribution of suppliers, the complexity and flexibility of processing orders or the dynamics of the logistic objects. In order to overcome these disadvantages, the paradigm of autonomous logistics is proposed and promises a better technical solution for current logistics systems. In autonomous logistics, the decision making is shifted toward the logistic objects which are defined as material items (e.g., vehicles, containers) or immaterial items (e.g., customer orders) of a networked logistics system. These objects have the ability to interact with each other and make decisions according to their own objectives. In the technical aspect, with the rapid development of innovative sensor technology, namely Wireless Sensor Networks (WSNs), each element in the network can self-organize and interact with other elements for information transmission. The attachment of an electronic sensor element into a logistic object will create an autonomous environment in both the communication and the logistic domain. With this idea, the requirements of logistics can be fulfilled; for example, the monitoring data can be precise, comprehensive and timely. In addition, the goods flow management can be transferred to the information logistic object management, which is easier by the help of information technologies. However, in order to transmit information between these logistic objects, one requirement is that a routing protocol is necessary. The Opportunistic relative Distance-Enabled Uni-cast Routing (ODEUR ) protocol which is proposed and investigated in this thesis shows that it can be used in autonomous environments like autonomous logistics. Moreover, the support of mobility, multiple sinks and auto-connection in this protocol enhances the dynamics of logistic objects. With a general model which covers a range from low-level issues to high-level protocols, many services such as real time monitoring of environmental conditions, context-aware applications and localization make the logistic objects (embedded with sensor equipment) more advanced in information communication and data processing. The distributed management service in each sensor node allows the flexible configuration of logistic items at any time during the transportation. All of these integrated features introduce a new technical solution for smart logistic items and intelligent transportation systems. In parallel, a management system, WSN data Collection and Management System (WiSeCoMaSys), is designed to interact with the deployed Wireless Sensor Networks. This tool allows the user to easily manipulate the sensor networks remotely. With its rich set of features such as real time data monitoring, data analysis and visualization, per-node management, and alerts, this tool helps both developers and users in the design and deployment of a sensor network. In addition, an analytical model is developed for comparison with the results from simulations and experiments. Focusing on the use of probability theory to model the network links, this model considers several important factors such as packet reception rate and network traffic which are used in the simulation and experiment parts. Moreover, the comparison between simulation, experiment and analytical results is also carried out to estimate the accuracy of the design and make several improvements of the simulation accuracy. Finally, all of the above parts are integrated in one unique system. This system is verified by both simulations in logistic scenarios (e.g., harbors, warehouses and containers) and experiments. The results show that the proposed model and protocol have a good packet delivery rate, little memory requirements and low delay. Accordingly, this system design is practical and applicable in logistics

    A Conceptualisation of innovative organisation of an ICT company: A focus on the impact of ‘innovative milieu’

    Get PDF
    Purpose: This paper investigates key elements for supporting strategic management behaviour with actionable implications for multinational corporations in the ICT business sector. Design/methodology/approach: Samsung was chosen as a research case. A qualitative approach was applied to this study to develop a discussion framework with key elements which support innovative organisational behaviour. Findings: From an analysis of secondary data of academic discussions relating with business behaviour of Samsung, five key themes were developed (e.g., Direction and driving force; Understanding the market; Management system; Organisational strategies; Review & evaluation). Further discussions were expanded from the framework with five key themes revealed a catalytic factor to foster an innovative behaviour of the organisation. Discussions: It has been found that close communications with stakeholders and the impact of innovative milieu should be a catalytic factor to enhance dynamic innovative actions within the organisation. Especially in the competitive ICT business sector, it has been suggested that the inter-organisational and internal learning attitudes covering both individuals and organisational proactiveness should be focused to sustain the businesses. Moreover, organisational innovation can be achieved from the collaborative ‘innovative milieu’ which enhances the proactive innovations

    On the Interference Alignment Designs for Secure Multiuser MIMO Systems

    Full text link
    In this paper, we propose two secure multiuser multiple-input multiple-output transmission approaches based on interference alignment (IA) in the presence of an eavesdropper. To deal with the information leakage to the eavesdropper as well as the interference signals from undesired transmitters (Txs) at desired receivers (Rxs), our approaches aim to design the transmit precoding and receive subspace matrices to minimize both the total inter-main-link interference and the wiretapped signals (WSs). The first proposed IA scheme focuses on aligning the WSs into proper subspaces while the second one imposes a new structure on the precoding matrices to force the WSs to zero. When the channel state information is perfectly known at all Txs, in each proposed IA scheme, the precoding matrices at Txs and the receive subspaces at Rxs or the eavesdropper are alternatively selected to minimize the cost function of an convex optimization problem for every iteration. We provide the feasible conditions and the proofs of convergence for both IA approaches. The simulation results indicate that our two IA approaches outperform the conventional IA algorithm in terms of average secrecy sum rate.Comment: Updated version, updated author list, accepted to be appear in IEICE Transaction

    Structural features of geostrophic circulation in open region of the South China Sea

    Get PDF
    On the basis of observation data of water temperature and salinity the mean seasonal geostrophic circulation in open region of the South China Sea (SCS) was computed by the dynamic method relative to the 800 decibar reference surface. The results of computation let go to following notices: In both main monsoons (winter and summer) there are two main geostrophic eddies: the anticlockwise eddy in the northern and northwestern part, and the clockwise eddy in the southern part of the SCS with corresponding divergent and convergent zones. The main frontal zones go along the middle latitudes of the sea from the southern continental shelf of Vietnam to the area west of Luzon Island. The strength and stability of the current in winter are higher than in summer. The Kuroshio has an enough strong branch intruding into the SCS through Bashi Strait in winter creating in the sea the water structure similar to that of the Northwest Pacific subtropical and tropical regions. In summer the Kuroshio water can intrude directly only into the area southwest of Taiwan

    Monitoring quantity and quality of pangasius pond effluent : report of a monitoring program and recommendations for certification

    Get PDF
    The quantity and quality of pangasius pond effluent was monitored by means of monthly sampling during a study conducted on four striped catfish farms located in the Mekong Delta, Vietnam. The study was undertaken to test the practical implications of the standards and guidelines with regard to catfish pond effluent that are at present developed by various certification programs for striped catfish production in Vietnam. The results showed a great variability twelve pangasius pond within the samples that were taken during one period of partial pond draining and refilling. The consequences of such variability with regard to the certification standards and guidelines are discussed and recommendations are given

    VFFINDER: A Graph-based Approach for Automated Silent Vulnerability-Fix Identification

    Full text link
    The increasing reliance of software projects on third-party libraries has raised concerns about the security of these libraries due to hidden vulnerabilities. Managing these vulnerabilities is challenging due to the time gap between fixes and public disclosures. Moreover, a significant portion of open-source projects silently fix vulnerabilities without disclosure, impacting vulnerability management. Existing tools like OWASP heavily rely on public disclosures, hindering their effectiveness in detecting unknown vulnerabilities. To tackle this problem, automated identification of vulnerability-fixing commits has emerged. However, identifying silent vulnerability fixes remains challenging. This paper presents VFFINDER, a novel graph-based approach for automated silent vulnerability fix identification. VFFINDER captures structural changes using Abstract Syntax Trees (ASTs) and represents them in annotated ASTs. VFFINDER distinguishes vulnerability-fixing commits from non-fixing ones using attention-based graph neural network models to extract structural features. We conducted experiments to evaluate VFFINDER on a dataset of 36K+ fixing and non-fixing commits in 507 real-world C/C++ projects. Our results show that VFFINDER significantly improves the state-of-the-art methods by 39-83% in Precision, 19-148% in Recall, and 30-109% in F1. Especially, VFFINDER speeds up the silent fix identification process by up to 47% with the same review effort of 5% compared to the existing approaches.Comment: Accepted by IEEE KSE 202

    Postbuckling analysis of functionally graded nanoplates based on nonlocal theory and isogeometric analysis

    Get PDF
    This study aims to investigate the postbuckling response of functionally graded (FG) nanoplates by using the nonlocal elasticity theory of Eringen to capture the size effect. In addition, Reddy’s third-order shear deformation theory is adopted to describe the kinematic relations, while von Kaman’s assumptions are used to account for the geometrical nonlinearity. In order to calculate the effective material properties, the Mori-Tanaka scheme is adopted. Governing equations are derived based on the principle of virtual work. Isogeometric analysis (IGA) is employed as a discretization tool, which is able to satisfy the C1-continuity demand efficiently. The Newton-Raphson iterative technique with imperfection is employed to trace the postbuckling paths. Various numerical studies are carried out to examine the influences of gradient index, nonlocal effect, ratio of compressive loads, boundary condition, thickness ratio and aspect ratio on the postbuckling behaviour of FG nanoplates
    • …
    corecore