transmission method
Recently Published Documents


TOTAL DOCUMENTS

807
(FIVE YEARS 225)

H-INDEX

28
(FIVE YEARS 4)

2022 ◽  
Vol 13 (2) ◽  
pp. 0-0

Due to the absence of routing initiation, the routing protocol requires a secure message transition. The key downside is that there are many current routing protocols. The big downside is the inability of the node to give a message when the attackers are routing. The key attack in the proposed routing model is Distributed Denial of Service (DDOS). The Protected Geographic Routing Protocol (SGRP) is the assured routing carried out in the proposed work. The Protected Geographic Routing Protocol (SGRP) will improve the efficiency of the transmission method by choosing a specific source node. The paper suggested that the Protected Spatial Routing Protocol (PSRP) would recognize and isolate such threats. Several modeling time estimation studies have been carried out to analyze the simulation time and the efficiency of the proposed routing technique. The proposed routing technique demonstrates the performance by calculating the Packets Delivery Ratio(PDR) and Energy consumption. The Routing protocol is used in many applications such as the Industrial Internet of Things (IoT)


2021 ◽  
Vol 5 (6) ◽  
pp. 1137-1142
Author(s):  
Hamdi Alchudri ◽  
Zaini

The incidence of fire and theft is very threatening and causes disruption to people's lifestyles, both due to natural and human factors resulting in loss of life, damage to the environment, loss of property and property, and psychological impacts. The purpose of this study is to create a building security system using Kinect Xbox 360 which can be used to detect fires and loss of valuable objects. The data transmission method uses the Internet of Things (IoT) and skeletal tracking. Skeletal detection uses Arduino Uno which is connected to a fire sensor and Kinect to detect suspicious movements connected to a PC. Kinect uses biometric authentication to automatically enter user data by recognizing objects and detecting skeletons including height, facial features and shoulder length. The ADC (Analog to Digital Converter) value of the fire sensor reading has a range between 200-300. The fire sensor detects the presence of fire through optical data analysis containing ultraviolet, infrared or visual images of fire. The data generated by Kinect by detecting the recognition of the skeleton of the main point of the human body known as the skeleton, where the reading point is authenticated by Kinect from a range of 1.5-3 meters which is declared the optimal measurement, and if a fire occurs, the pump motor will spray water randomly. to extinguish the fire that is connected to the internet via the wifi module. The data displayed is in the form of a graph on the Thingspeak cloud server service. Notification of fire and theft information using the delivery system from input to database


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Tongyi Zheng ◽  
Lei Ning ◽  
Qingsong Ye ◽  
Fan Jin

Massive machine-type communications (mMTCs) for Internet of things are being developed thanks to the fifth-generation (5G) wireless systems. Narrowband Internet of things (NB-IoT) is an important communication technology for machine-type communications. It supports many different protocols for communication. The reliability and performance of application layer communication protocols are greatly affected by the retransmission time-out (RTO) algorithm. In order to improve the reliability and performance of machine-type communications, this study proposes a novel RTO algorithm UDP-XGB based on the user datagram protocol (UDP) and NB-IoT. It combines traditional algorithms with machine learning. The simulation results show that real round-trip time (RTT) is close to the RTO, which is obtained by this algorithm, and the reliability and performance of machine-type communications have improved.


2021 ◽  
Author(s):  
Rui Ma ◽  
Dongge Zhu ◽  
Jiangbo Sha ◽  
Jia Liu ◽  
Qingping Zhang

2021 ◽  
Vol 11 (24) ◽  
pp. 11984
Author(s):  
Yu-Lin Song ◽  
Manoj Kumar Reddy ◽  
Hung-Yi Lin ◽  
Luh-Maan Chang

There are many high-power electrical cables around and within semiconductor foundries. These cables are the source of extremely low-frequency (ELF < 300 Hz) magnetic fields that affect the tools which operate by the function of electronic beams. Miss operation (MO) happens because the ELF magnetic fields induce beam shift during the measurement or process for cutting-edge chips below 40 nm. We present the optimal permutation of power transmission lines to reduce electromagnetic influence in high-technology nano fabs. In this study, the magnetic field was reduced using a mirror array power cable system, and simulation results predicted the best permutations to decrease the electromagnetic interference (EMI) value to below 0.4 mG in a working space without any shielding. Furthermore, this innovative method will lower the cost of high-technology nano fabs, especially for the 28 nm process. The motivation behind this paper is to find the ideal permutation of power transmission lines with a three-phase, four-cable framework to decrease the EMI in high-technology nano fabs. In this study, the electromagnetic interference was diminished using the ideal-permutation methodology without investing or using additional energy, labor, or apparatus. Moreover, this advanced methodology will help increase the effectiveness and reduce the costs of nano fabs. The mathematical and experimental results of the study are presented with analysis.


2021 ◽  
Vol 11 (24) ◽  
pp. 11866
Author(s):  
Khaled Ali ◽  
Heishun Zen ◽  
Hideaki Ohgaki ◽  
Toshiteru Kii ◽  
Takehito Hayakawa ◽  
...  

One of the most noteworthy aspects of computed tomography (CT) based on the nuclear resonance fluorescence (NRF) transmission method is the isotope selectivity that makes it possible to discern an isotope of interest from other isotopes within a sample. We experimentally obtained a three-dimensional (3D) isotope-selective CT image based on the NRF transmission method (3D NRF-CT) for the enriched lead isotope distribution of 208Pb in a cylindrical holder in a previous study. The cylindrical holder’s diameter and height are 25 mm and 20 mm, respectively. The NRF-CT imaging technique requires a considerable data accumulation time. It took 48 h to obtain an image with a resolution of 4 mm/pixel in the horizontal plane and 8 mm/pixel in the vertical plane using a laser Compton scattering (LCS) gamma-ray beam with a beam size of 2 mm and a flux density of 10 photons/s/eV. Improving the NRF-CT image resolution with the existing hardware is challenging. Therefore, we proposed an alternative method to improve the NRF-CT image resolution using the fusion visualization (FV) technique by combining the NRF-CT image including isotopic information with a gamma-CT image, which provides better pixel resolution. The 3D gamma-CT image for the same sample was measured at the same beamline BL1U in the ultraviolet synchrotron orbital radiation-III (UVSOR-III) synchrotron radiation facility at the Institute of Molecular Science at the National Institutes of Natural Sciences in Japan under similar experimental conditions except for the LCS gamma-ray beam flux and beam size. Obtaining a 3D gamma-CT image with a resolution of 1 mm/pixel took 5 h using an LCS gamma-ray beam with a beam size of 1 mm and a flux density of 0.7 photons/s/eV. The data processing of the FV technique has been developed, and the 3D NRF-CT image quality was improved.


Author(s):  
Diana W. Dawoud ◽  
Fabien Heliot ◽  
Muhammad Ali Imran ◽  
Rahim Tafazolli

2021 ◽  
Vol 2108 (1) ◽  
pp. 012070
Author(s):  
Haijiang Wu ◽  
Jinrong Chen ◽  
Feng Liao ◽  
Yonghao Li ◽  
Shaoheng Zhong ◽  
...  

Abstract This paper proposes an Ethernet transmission method based on modified format, which is applied to the distribution domain protection system. By tagging Ethernet data new identifications, the data has unique identity information in transmission. The switch replicates data and transmit it in two directions. When the ring network is destroyed, there is no data loss caused by switching the transmission direction. The distribution domain protection system realizes ring network with seamless redundancy.


Sign in / Sign up

Export Citation Format

Share Document