A New Algorithm on Application of Blockchain Technology in Live Stream Video Transmissions and Telecommunications

2020 ◽  
Vol 16 (1) ◽  
pp. 16-32 ◽  
Author(s):  
Osamah Ibrahim Khalaf ◽  
Ghaida Muttashar Abdulsahib ◽  
Hamed Daei Kasmaei ◽  
Kingsley A. Ogudo

This article develops and defines Blockchain technology in its classic format. New suggested proposed algorithms are then analyzed in order to introduce new and modified versions of Blockchain technology. After that, fundamental infrastructure is presented in order to represent its application in new generation of telecommunications. In addition, this article interrogates these algorithms and their efficiency to make secure connections that transfer data packets in any format (boxes or packets of information) in a secure and encrypted method at which sender and receiver of information remain anonymous. Then, this research describes applications of the novel approach in new format of making live stream technology in real world communications. Moreover, according to this new approach, new concepts can be predicted in the new generation of social media based on live communications. Meanwhile, the compatibility is justified for consistency, reliability and flexibility of this new proposed technology with other existing and defined format of technology in today's world. At last, conclusions of this new emerging technology and its superiority compared to other designed technologies in the field of live streaming and telecommunications are discussed.

Author(s):  
Mirjam Minor ◽  
Alexander Tartakovski ◽  
Daniel Schmalen ◽  
Ralph Bergmann

The increasing dynamics of today’s work impacts the business processes. Agile workflow technology is a means for the automation of adaptable processes. However, the modification of workflows is a difficult task that is performed by human experts. This chapter discusses the novel approach of agile workflow technology for dynamic, long-term scenarios and on change reuse. First, it introduces new concepts for a workflow modelling language and enactment service, which enable an interlocked modelling and execution of workflows by means of a sophisticated suspension mechanism. Second, it provides new process-oriented methods of case-based reasoning in order to support the reuse of change experience. The results from an experimental evaluation in a real-world scenario highlight the usefulness and the practical impact of this work.


Author(s):  
Giulio Rosati ◽  
Damiano Zanotto

This paper deals with a novel approach to the design of cable-driven systems. This kind of robots possesses several desirable features that distinguish them from common manipulators, such as: low-inertia, cost-effectiveness, safety, easy reconfiguration and transportability. One key-issue that arises from the unilateral actuation is the design for workspace optimization. Most previous researches on cable-driven systems design focused their attention on workspace analysis for existing devices. Conversely, we introduce a new approach for improving workspace by design, introducing movable pulley-blocks rather than increasing the number of cables. By properly moving the pulley-blocks, the end-effector can be always maintained in the best part of the working space, thus enhancing robot capabilities without the need for additional cables. Furthermore, the eventuality of cable interference is strongly reduced. In this paper, the novel design concept is applied to different planar point-mass cable-driven robots, with one or more translating pulley-blocks. The maximum feasible isotropic force, along with the power dissipation and the effective mass at the end-effector are employed to compare the performances of different configurations.


2017 ◽  
Vol 7 (1.3) ◽  
pp. 66
Author(s):  
S. Angel Latha Mary ◽  
R. Divya ◽  
K. Uma Maheswari

Information extracted by using data mining in earlier days. Now a day’s, the most talked about technology is Big Data. Utility Mining is the most crucial task in the real time application where the customers prefer to choose the item set which can yield more profit. Handling of large volume of transactional patterns becomes the complex issue in every application which is resolved in the existing work introducing the parallel utility mining process which will process the candidate item sets in the paralyzed manner by dividing the entire tasks into sub partition. Each sub partition would be processed in individual mapper and then be resulted with the final output value. The time complexity would be more when processing an unnecessary candidate item sets. This problem is resolved in the proposed methodology by introducing the novel approach called UP-Growth and UP-Growth+ which will prune the candidate item sets to reduce the dimension of the candidate item sets. The time complexity is further reduced by representing the candidate item sets in the tree layout. The test results prove that the proposed new approach provides better result than the existing work in terms of accuracy.


2018 ◽  
Vol 27 (02) ◽  
pp. 246-259
Author(s):  
Milos Milosavljević ◽  
Marina Dobrota ◽  
Nemanja Milanović

Public procurements have been high on the agenda of policy makers, decision makers, scholars, and other interested parties in Europe in the last few decades, as such procurements make up nearly one-fifth of Europe’s total gross domestic product. Nevertheless, not many attempts have been made to measure the efficiency of public procurement systems and accordingly rank European countries. The most important measurement that highlights this issue is the Single Market Scoreboard for Public Procurements. However, this scoreboard is subject to bias and numerous omissions, which significantly decreases its operational usage and deteriorates the real efficiency of public procurements. This article aims to rank European countries in an unambiguous, objective, and impartial manner by using the Composite I-distance Indicator (CIDI) methodology. Instead of using biased weights for individual indicators, assigned by experts, the CIDI method creates new weights in an objective manner. The study analysed 30 European countries. The results of the study are, to some extent, different from current practice for public procurement efficiency measurement. The novel approach to ranking provides an opportunity to interested parties to improve the performance of their public procurements by reviewing them on a multidimensional basis.


Author(s):  
Iman Avazpour ◽  
John Grundy ◽  
Hai L. Vu

Visual notations are a key aspect of visual languages. They provide a direct mapping between the intended information and set of graphical symbols. Visual notations are most often implemented using the low level syntax of programming languages which is time consuming, error prone, difficult to maintain and hardly human-centric. In this paper we describe an alternative approach to generating visual notations using by-example model transformations. In our new approach, a semantic mapping between model and view is implemented using model transformations. The notations resulting from this approach can be reused by mapping varieties of input data to their model and can be composed into different visualizations. Our approach is implemented in the CONVErT framework and has been applied to many visualization examples. Three case studies for visualizing statistical charts, visualization of traffic data, and reuse of a Minard's map visualization's components, are presented in this paper. A detailed user study of our approach for reusing notations and generating visualizations has been provided. 80% of the participants in this user study agreed that the novel approach to visualization was easy and 87% stated that they quickly learned to use the tool support.


2014 ◽  
Vol 11 (4) ◽  
pp. 1337-1359
Author(s):  
Jakub Křoustek ◽  
Fridolín Pokorný ◽  
Dusan Kolář

Retargetable executable-code decompilation is a one of the most complicated reverse-engineering tasks. Among others, it involves de-optimization of compiler-optimized code. One type of such an optimization is usage of so-called instruction idioms. These idioms are used to produce faster or even smaller executable files. On the other hand, decompilation of instruction idioms without any advanced analysis produces almost unreadable high-level language code that may confuse the user of the decompiler. In this paper, we revisit and extend the previous approach of instruction-idioms detection used in a retargetable decompiler developed within the Lissom project. The previous approach was based on detection of instruction idioms in a very-early phase of decompilation (a front-end part) and it was inaccurate for architectures with a complex instruction set (e.g. Intel x86). The novel approach is based on delaying detection of idioms and reconstruction of code to the later phase (a middleend part). For this purpose, we use the LLVM optimizer and we implement this analysis as a new pass in this tool. According to experimental results, this new approach significantly outperforms the previous approach as well as the other commercial solutions.


Cancers ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 240
Author(s):  
Giacomo Feliciani ◽  
Salvatore Roberto Bellia ◽  
Massimo Del Duca ◽  
Giorgio Mazzotti ◽  
Manuela Monti ◽  
...  

The purpose of this study is to discuss how to use an external radio-opaque template in the Diffusing Alpha-emitters Radiation Therapy (DaRT) technique’s pre-planning and treatment stages. This device would help to determine the proper number of sources for tumour coverage, accounting for subcutaneous invasion and augmenting DaRT safety. The procedure will be carried out in a first phase on a phantom and then applied to a clinical case. A typical DaRT procedure workflow comprises steps like tumour measurements and delineation, source number assessment, and therapy administration. As a first step, an adhesive fiberglass mesh (spaced by 2 mm) tape was applied on the skin of the patient and employed as frame of reference. A physician contoured the lesion and marked the entrance points for the needles with a radio opaque ink marker. According to the radio opaque marks and metabolic uptake the clinical target volume was defined, and with a commercial brachytherapy treatment planning system (TPS) it was possible to simulate and adjust the spatial seeds distribution. After the implant procedure a CT was again performed to check the agreement between simulations and seeds positions. With the procedure described above it was possible to simulate a DaRT procedure on a phantom in order to train physicians and subsequently apply the novel approach on patients, outlining the major issues involved in the technique. The present work innovates and supports DaRT technique for the treatment of cutaneous cancers, improving its efficacy and safety.


Author(s):  
Chi Minh Pham

In recent years, big data analytics has become widely applied in cybersecurity, leading to the novel approach of big data cybersecurity analytics. While some organizations have been adopting this new approach in tackling cybercrime, there are limited guidelines to which companies can refer. Therefore, the renowned maturity model concept, which offers a systematic approach for an organization to measure and improve its maturity level, is applied in this study. On the basis of a comprehensive literature review, this chapter proposes a maturity framework for big data cybersecurity analytics. This synthesized comprehensive maturity framework comprises seven dimensions across five stage levels—namely organization, human, infrastructure, data management, analytics application, governance, and security dimensions. Knowing which dimensions need to be improved and which pathway to follow ensures the successful implementation of big data cybersecurity analytics within organizations.


2016 ◽  
Vol 32 (1) ◽  
pp. 101-106 ◽  
Author(s):  
Bernd J. Stetter ◽  
Erica Buckeridge ◽  
Vinzenz von Tscharner ◽  
Sandro R. Nigg ◽  
Benno M. Nigg

This study presents a new approach for automated identification of ice hockey skating strides and a method to detect ice contact and swing phases of individual strides by quantifying vibrations in 3D acceleration data during the blade–ice interaction. The strides of a 30-m forward sprinting task, performed by 6 ice hockey players, were evaluated using a 3D accelerometer fixed to a hockey skate. Synchronized plantar pressure data were recorded as reference data. To determine the accuracy of the new method on a range of forward stride patterns for temporal skating events, estimated contact times and stride times for a sequence of 5 consecutive strides was validated. Bland-Altman limits of agreement (95%) between accelerometer and plantar pressure derived data were less than 0.019 s. Mean differences between the 2 capture methods were shown to be less than 1 ms for contact and stride time. These results demonstrate the validity of the novel approach to determine strides, ice contact, and swing phases during ice hockey skating. This technology is accurate, simple, effective, and allows for in-field ice hockey testing.


2015 ◽  
Vol 828-829 ◽  
pp. 389-394 ◽  
Author(s):  
Josephin Enz ◽  
Stefan Riekehr ◽  
Volker Ventzke ◽  
Nikolai Kashaev

Weld defects - such as porosity and hot cracking - occur especially during the laser beam welding of high-alloyed Al-Zn alloys. This significantly limits the application range of these promising high-strength alloys. In the present study the laser weldability of different Al-Zn alloys was investigated regarding the used welding parameters and the chemical composition of the alloys. In addition, the novel approach of the Helmholtz-Zentrum Geesthacht for overcoming the weldability problems was applied to the different Al-Zn alloys in order to assess its capability. It was shown that the laser weldability of Al-Zn alloys deteriorates with an increasing amount of Zn, Mg and Cu. The variation of laser beam welding parameters did not lead to any improvement of weldability. Only the use of the new approach resulted in promising welding results even for the high-alloyed Al-Zn alloys.


Sign in / Sign up

Export Citation Format

Share Document