Discussion on “Assessment of speech communication links” and “Rating of speech links and performance of telephone networks” before the Radio and Telecommunication Section, 27th October, 1958

1959 ◽  
Vol 106 (26) ◽  
pp. 90-92
1997 ◽  
Vol 37 (1) ◽  
pp. 682
Author(s):  
M.A. Thackray

This paper deals with the efforts and results of a Management driven campaign to improve contractor safety performance in WAPET's operations.WAPET Management identified Contractor safety performance as one of four key safety focus areas in their 1995 Business Plan. The other focus areas were Hazard Analysis, Training and Audit and Review.Strategies adopted for achieving improvements in contractor safety included:aligning Contractor Goals and Objectives with WAPET's by involving major contractors in 'Best Practices' workshops. The workshops specifically addressed the Business Plan focus areas and the identification and measurement of performance indicators. The workshops provided contractors with an open forum to express their views and efforts in these areas;holding follow-up meetings with individual contractors and contractor groups with common areas of work. Both contractors and WAPET management detailed the status and efforts being put into these areas. These meetings identified improvement opportunities and opened up communication links both with WAPET personnel and between contractors; andimplementing the results of the workshop and meetings by upgrading WAPET's Safety Management System particularly in the areas of pre-qualification, contracting philosophies and contractor management philosophies.Feedback on each stage of the 1995 program was used to determine the strategies for the 1996 program. The workshops and meetings highlighted process improvement opportunities particularly in areas of industry standardisation, development of contractor Safety Management Systems, lines of communication/accountability, employee involvement and performance indicators. These opportunities were documented in a 'Contractor Best Practice* manual of which over 350 have been distributed.Conventional safety measures indicate a 50 per cent improvement in both LTI and Total Reportable frequency rates for WAPET's contractors in the past 12 months. The success of the program was also demonstrated by other indicators such as greater openness in communications, greater participation in safety meetings and a closer working relationship with WAPET.


Wireless networks enable wireless-nodes to develop and broadcast messages in an attempt to reinforce congestion protection and performance. Meanwhile, due to distrust environments, it’s mile tough for the wireless-nodes to assess in reliability of the acquired messages. In this work, we advise the decentralized control machine in Wireless networks situated on the blockchain techniques. During this machine, wireless-nodes must be verifying obtained messages from the neighboring Wi-Fi nodes by using Bayesian Inference Model. On the idea of this validation outcome, Wi-Fi node is going to be generated the rating for every message source of wireless-node. With this ranking uploaded from Wi-Fi nodes, Roadside Units are often calculated the trust cost offsets of worried wireless nodes, p.C. This statistic right into the block. Then, to every of the Roadside Unit are going to be attempt for adding their “blocks” to be consider block chain that's maintain with aid of all Roadside Units. Make the utilization of the joint Proof-of-Work and Proof-of-Stake consensus the system, extra overall fee of the offset (stake) is within a block, more easy the Roadside Unit are often located the nonce for their hash feature (evidence-of-paintings).During this manner, all the Roadside Unit collaboratively preserve an up to the date, dependable, and steady believe blockchain. Clone results can display that the proposed gadget be powerful also a possible in accumulating, computing, and storing agrees with values in Wireless networks.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Junsong Zhang ◽  
Qikun Zhang ◽  
Xianling Lu ◽  
Yong Gan

With the rapid development of communication and microelectronic technology, the vehicular ad hoc network (VANET) has received extensive attention. However, due to the open nature of wireless communication links, it will cause VANET to generate many network security issues such as data leakage, network hijacking, and eavesdropping. To solve the above problem, this paper proposes a new authentication protocol which uses bilinear pairings and temporary pseudonyms. The proposed authentication protocol can realize functions such as the identity authentication of the vehicle and the verification of the message sent by the vehicle. Moreover, the proposed authentication protocol is capable of preventing any party (peer vehicles, service providers, etc.) from tracking the vehicle. To improve the efficiency of message verification, this paper also presents a batch authentication method for the vehicle to verify all messages received within a certain period of time. Finally, through security and performance analysis, it is actually easy to find that the proposed authentication protocol can not only resist various security threats but also have good computing and communication performance in the VANET environment.


2021 ◽  
Vol 12 (4) ◽  
pp. 1-29
Author(s):  
Marco Bozzano ◽  
Alessandro Cimatti ◽  
Marco Roveri

Deep space missions are characterized by severely constrained communication links. To meet the needs of future missions and increase their scientific return, future space systems will require an increased level of autonomy on-board. In this work, we propose a comprehensive approach to on-board autonomy. We rely on model-based reasoning, and we consider many important (on-line and off-line) reasoning capabilities such as plan generation, validation, execution and monitoring, runtime diagnosis, and fault detection, identification, and recovery. The controlled platform is represented symbolically, and the reasoning capabilities are seen as symbolic manipulation of such formal model. We have developed a prototype of our framework, and we have integrated it within an on-board Autonomous Reasoning Engine. Finally, we have evaluated our approach on three case-studies inspired by real-world projects and characterized it in terms of reliability, availability, and performance.


2015 ◽  
Vol 16 (3) ◽  
pp. 439
Author(s):  
Sajad Samadinasab ◽  
Farhad Namdari ◽  
Nader Shojaei

Usually coordination of overcurrent relays is done by taking into account the specific structure of the system which does not show the real state of the system. On the other hand, dynamic changes in network can occur due to short circuit conditions, the malfunctioning relays, development, operation and repairs on any part of the power system. Also the most of the new protective schemes are based on a communication channel, which cannot be guaranteed in practice. Therefore, solving the problem of relay coordination is extremely difficult in case of dynamic changes in the network structure and the absence of communication links between some relays. In this article, a novel protective logic based on phasor measurement units (PMUs) data is proposed for optimal coordination of overcurrent relays. In this method, by using the PMU measurements, phasor information can be obtained continuously at any node where PMUs are installed in the power grid. For this purpose, in the first the Optimal PMU placement is determined for full network observability. Then, the dynamic changes of network will be observe by using wide area measurements based on PMUs data. Finally this information is sent via communication links PMUs for the optimal coordination of overcurrent relays. The use of PMU for the coordination of overcurrent relays improve the decision making capability and performance of protective relays and help them to form a reliable and robust protection system. The proposed method is tested on IEEE 8-bus and 14-bus standard networks.


Sign in / Sign up

Export Citation Format

Share Document