期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Graphene electronic fibres with touch-sensing and lightemitting functionalities for smart textiles 被引量:4
1
作者 Elias Torres Alonso Daniela p.rodrigues +9 位作者 Mukond Khetani Dong-Wook Shin Adolfo De Sanctis Hugo Joulie Isabel de Schrijver Anna Baldycheva Helena Alves Ana I.S.Neves Saverio Russo Monica F.Craciun 《npj Flexible Electronics》 SCIE 2018年第1期231-236,共6页
The true integration of electronics into textiles requires the fabrication of devices directly on the fibre itself using high-performance materials that allow seamless incorporation into fabrics.Woven electronics and ... The true integration of electronics into textiles requires the fabrication of devices directly on the fibre itself using high-performance materials that allow seamless incorporation into fabrics.Woven electronics and opto-electronics,attained by intertwined fibres with complementary functions are the emerging and most ambitious technological and scientific frontier.Here we demonstrate graphene-enabled functional devices directly fabricated on textile fibres and attained by weaving graphene electronic fibres in a fabric.Capacitive touch-sensors and light-emitting devices were produced using a roll-to-roll-compatible patterning technique,opening new avenues for woven textile electronics.Finally,the demonstration of fabric-enabled pixels for displays and position sensitive functions is a gateway for novel electronic skin,wearable electronic and smart textile applications. 展开更多
关键词 TEXTILES smart FUNCTIONAL
原文传递
The CASTOR-K Code,Recent Developments and Applications
2
作者 F.NABAIS D.BORBA +4 位作者 R.COELHO A.FIGUEIREDO J.FERREIRA N.LOUREIRO p.rodrigues 《Plasma Science and Technology》 SCIE EI CAS CSCD 2015年第2期89-96,共8页
The CASTOR-K code is a hybrid magnetohydrodynamic (MHD)-drift kinetic code developed for the study of MHD modes in the presence of energetic ion populations. It allows a fast assessment of the linear stability of th... The CASTOR-K code is a hybrid magnetohydrodynamic (MHD)-drift kinetic code developed for the study of MHD modes in the presence of energetic ion populations. It allows a fast assessment of the linear stability of the modes, as well as an accurate calculation of damping due to thermal species (Landau damping). These capabilities make the code an invaluable tool for parametric studies and data analysis. In recent years, CASTOR-K has been mostly used to analyze JET data, including the identification of mechanisms involved in the expulsion of energetic ions from the plasma. However, in order to prepare the code to be used for a wider range of tokamaks including ITER, the code is being subject to a series of important improvements. These improvements aim not only to introduce new physics in the code but also to make it capable of exchanging data with other codes through its integration in modelling infrastructures. In this paper a description of the CASTOR-K code is presented, as well as a summary of the most important results obtained with this code and a description of the new improvements being implemented. 展开更多
关键词 controlled fusion TOKAMAKS plasma instabilities magnetohydrodynamics(MHD) Alfven waves energetic particles
下载PDF
Three Tier Fog Networks: Enabling IoT/5G for Latency Sensitive Applications 被引量:6
3
作者 Romana Shahzadi Ambreen Niaz +4 位作者 Mudassar Ali Muhammad Naeem Joel J.p.C.rodrigues Farhan Qamar Syed Muhammad Anwar 《China Communications》 SCIE CSCD 2019年第3期1-11,共11页
Following the progression in Internet of Things(IoT) and 5G communication networks, the traditional cloud computing model have shifted to fog computing. Fog computing provides mobile computing, network control and sto... Following the progression in Internet of Things(IoT) and 5G communication networks, the traditional cloud computing model have shifted to fog computing. Fog computing provides mobile computing, network control and storage to the network edges to assist latency critical and computation-intensive applications. Moreover, security features are improved in fog paradigm by processing critical data on edge devices instead of data centres outside the control plane of users. However, fog network deployment imposes many challenges including resource allocation, privacy of users, non-availability of programming model and testing software and support for the heterogenous networks. This article highlights these challenges and their potential solutions in detail. This article also discusses threetier fog network architecture, its standardization and benefits in detail. The proposed resource allocation mechanism for three tier fog networks based on swap matching is described. Results show that by practicing the proposed resource allocation mechanism, maximum throughput with reduced latency is achieved. 展开更多
关键词 CLOUD computing FOG NETWORKS MATCHING GAMES internet of THINGS
下载PDF
Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack 被引量:3
4
作者 Muhammad Reazul Haque Saw Chin Tan +11 位作者 Zulfadzli Yusoff Kashif Nisar Rizaludin Kaspin Iram Haider Sana Nisar J.p.C.rodrigues Bhawani Shankar Chowdhry Muhammad AslamUqaili Satya prasad Majumder Danda B.Rawat Richard Etengu Rajkumar Buyya 《Computers, Materials & Continua》 SCIE EI 2022年第1期875-894,共20页
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th... In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire network.Nevertheless,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack straightforwardly.Furthermore,recently a Distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been detected.However,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem.Moreover,recently the high frequencies of DDoS attacks have increased dramatically.In this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed.Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence.The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN. 展开更多
关键词 SDN smart algorithm RTZLK-DAASCP DDoS attack DRDOS
下载PDF
New Modified Controlled Bat Algorithm for Numerical Optimization Problem 被引量:3
5
作者 Waqas Haider Bangyal Abdul Hameed +7 位作者 Jamil Ahmad Kashif Nisar Muhammad Reazul Haque Ag.Asri Ag.Ibrahim Joel J.p.C.rodrigues M.Adil Khan Danda B.Rawat Richard Etengu 《Computers, Materials & Continua》 SCIE EI 2022年第2期2241-2259,共19页
Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching... Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching behavior.BA faces premature convergence due to its local search capability.Instead of using the standard uniform walk,the Torus walk is viewed as a promising alternative to improve the local search capability.In this work,we proposed an improved variation of BA by applying torus walk to improve diversity and convergence.The proposed.Modern Computerized Bat Algorithm(MCBA)approach has been examined for fifteen well-known benchmark test problems.The finding of our technique shows promising performance as compared to the standard PSO and standard BA.The proposed MCBA,BPA,Standard PSO,and Standard BA have been examined for well-known benchmark test problems and training of the artificial neural network(ANN).We have performed experiments using eight benchmark datasets applied from the worldwide famous machine-learning(ML)repository of UCI.Simulation results have shown that the training of an ANN with MCBA-NN algorithm tops the list considering exactness,with more superiority compared to the traditional methodologies.The MCBA-NN algorithm may be used effectively for data classification and statistical problems in the future. 展开更多
关键词 Bat algorithm MCBA ANN ML Torus walk
下载PDF
Aggregator Based RPL for an IoT-Fog Based Power Distribution System with 6LoWPAN 被引量:3
6
作者 Rijo Jackson Tom Suresh Sankaranarayanan +1 位作者 Victor Hugo C.de Albuquerque Joel J.p.C.rodrigues 《China Communications》 SCIE CSCD 2020年第1期104-117,共14页
Advanced Metering Infrastructure(AMI)forms an important part in Smart Grids.Routing the data effectively from smart meters to the Edge/Fog node requires an efficient routing protocol.Routing Protocol for Low Power Los... Advanced Metering Infrastructure(AMI)forms an important part in Smart Grids.Routing the data effectively from smart meters to the Edge/Fog node requires an efficient routing protocol.Routing Protocol for Low Power Lossy Area Network(RPL)is a standard routing protocol for IPv6 over Low Power Personal Area Network(6LoWPAN).In a Power Distribution system all the smart meters together form 6LoWPAN network.They communicate with the fog router,which acts as the 6LoWPAN gateway.ContikiRPL was evaluated using Cooja Network simulator for a power distribution network topology.The nodes which were far away from the fog node gave low Packet Delivery Ratio(PDR)and large End to End delay.This paper proposes an aggregation RPL scheme by modifying the existing Contiki RPL.The smart meter nodes communicate to the aggregator,which communicates to the fog node.The results show that the aggregation scheme has 35.6%increase in PDR,lesser hop count and 13.24%decrease in End to End delay on an average compared to existing RPL. 展开更多
关键词 IOT 6LoWPAN RPL ROUTING distribution automation smart grid fog computing
下载PDF
提高肉鸡饲料转化率的营养措施 被引量:1
7
作者 S.Salguero L.F.T.Albino +2 位作者 p.B.rodrigues H.S.Rostagno 曹玉娟 《中国家禽》 北大核心 2013年第12期42-44,共3页
饲料成本占肉鸡总生产成本的70%,因而减少饲料成本一直是肉鸡生产者所面临的问题。NRC、FEDNA、INRA及巴西家禽饲料成分与营养需求表为全世界的家禽营养工作者提供统一的营养参考标准,本文利用巴西家禽饲料成分与营养需求表中的公式及... 饲料成本占肉鸡总生产成本的70%,因而减少饲料成本一直是肉鸡生产者所面临的问题。NRC、FEDNA、INRA及巴西家禽饲料成分与营养需求表为全世界的家禽营养工作者提供统一的营养参考标准,本文利用巴西家禽饲料成分与营养需求表中的公式及推荐量,参考最新相关数据和方法来提高肉鸡的饲料转化率。 展开更多
关键词 肉鸡 饲料转化率 营养
下载PDF
On the design of an AI-driven secure communication scheme for internet of medical things environment
8
作者 Neha Garg Rajat petwal +3 位作者 Mohammad Wazid D.p.Singh Ashok Kumar Das Joel J.p.C.rodrigues 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1080-1089,共10页
The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via ... The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters. 展开更多
关键词 Internet of Medical Things(IoMT) Security Authentication and key agreement Artificial Intelligence(AI) Big data analytics
下载PDF
Guest editorial: Network architectures and communication protocols for smart industrial IoT applications
9
作者 Fazlullah Khan Joel J.p.C.rodrigues Mian Ahmad Jan 《Digital Communications and Networks》 SCIE CSCD 2023年第2期293-295,共3页
The rapid growth in hardware technologies and the fourth industrial revolution-Industry 4.0 have enabled the Internet of Things(IoT)to be smarter.One of the main drivers in Industry 4.0 is smart and secured Industrial... The rapid growth in hardware technologies and the fourth industrial revolution-Industry 4.0 have enabled the Internet of Things(IoT)to be smarter.One of the main drivers in Industry 4.0 is smart and secured Industrial IoT(IIoT)[1].The IIoT results from the widespread use of computers and the interconnectedness of machines.It has made software a crucial tool for almost every industry,from bakeries and arts to manufacturing facilities and healthcare systems[2].The IIoT devices can be mobile and geographically distributed over a long distance,which exposes them to network disturbances,Quality of Service(QoS)degradation,and security vulnerabilities.In addition,the IIoT is a complex network at a large scale,and there is a dire need for network architecture and protocol design to accommodate these diverse domains and competencies and handle the increasing levels of complexity.Therefore,in this special issue,we aim to focus on the challenges of network architectures and communication protocol design in the context of the smart industry.This special issue has attracted numerous high-quality research articles and has accepted fourteen research papers[3–16]. 展开更多
关键词 IOT network COMMUNICATION
下载PDF
Fuzzy Aggregator Based Energy Aware RPL Routing for IoT Enabled Forest Environment
10
作者 S.Srividhya Suresh Sankaranarayanan +1 位作者 Sergei A.Kozlov Joel J.p.C.rodrigues 《Computers, Materials & Continua》 SCIE EI 2022年第8期4039-4055,共17页
Forested areas are extremely vulnerable to disasters leading to environmental destruction.Forest Fire is one among them which requires immediate attention.There are lot of works done by authors where Wireless Sensors ... Forested areas are extremely vulnerable to disasters leading to environmental destruction.Forest Fire is one among them which requires immediate attention.There are lot of works done by authors where Wireless Sensors and IoT have been used for forest fire monitoring.So,towards monitoring the forest fire and managing the energy efficiently in IoT,Energy Efficient Routing Protocol for Low power lossy networks(E-RPL)was developed.There were challenges about the scalability of the network resulting in a large end-to-end delay and less packet delivery which led to the development of Aggregator-based Energy Efficient RPL with Data Compression(CAAERPL).Though CAA-ERPL proved effective in terms of reduced packet delivery,less energy consumption,and increased packet delivery ratio for varying number of nodes,there is still challenge in the selection of aggregator which is based purely on probability percentage of nodes.There has been research work where fuzzy logic been employed for Mobile Ad-hoc Routing,RPL routing and cluster head selection in Wireless Sensor.There has been no work where fuzzy logic is employed for aggregator selection in Energy Efficient RPL.So accordingly,we here have proposed Fuzzy Based Aggregator selection in Energy-efficient RPL for region thereby forming DODAG for communicating to Fog/Edge.We here have developed fuzzy inference rules for selecting the aggregator based on strength which takes residual power,Node degree,and Expected Transmission Count(ETX)as input metrics.The Fuzzy Aggregator Energy Efficient RPL(FA-ERPL)based on fuzzy inference rules were analysed against E-RPL in terms of scalability(First and Half Node die),Energy Consumption,and aggregator node energy deviation.From the analysis,it was found that FA-ERPL performed better than E-RPL.These were simulated using MATLAB and results. 展开更多
关键词 Fuzzy logic aggregator IOT RPL ROUTING wireless sensor network
下载PDF
Selective Cluster-Based Temperature Monitoring System for Homogeneous Wireless Sensor Networks
11
作者 Sudhanshu Tyagi Sudeep Tanwar +2 位作者 Sumit Kumar Gupta Neeraj Kumar Joel J.p.C.rodrigues 《ZTE Communications》 2014年第3期22-29,共8页
Over the past few decades, there has been a revolution in ICT, and this has led to the evolution of wireless sensor networks (WSN), in particular, wireless body area networks. Such networks comprise a specialized co... Over the past few decades, there has been a revolution in ICT, and this has led to the evolution of wireless sensor networks (WSN), in particular, wireless body area networks. Such networks comprise a specialized collection of sensor nodes (SNs) that may be deployed randomly in a body area network to collect data from the human body. In a health monitoring system, it may be es-sential to maintain constant environmental conditions within a specific area in the hospital. In this paper, we propose a tempera-ture-monitoring system and describe a case study of a health-monitoring system for patents critically ill with the same disease and in the same environment. We propose Enhanced LEACH Selective Cluster (E-LEACH-SC) routing protocol for monitoring the tem-perature of an area in a hospital. We modified existing Selective Cluster LEACH protocol by using a fixed-distance-based thresh-old to divide the coverage region in two subregions. Direct data transmission and selective cluster-based data transmission ap-proaches were used to provide short-range and long-distance coverage for the collection of data from the body of ill patients. Ex-tensive simulations were run by varying the ratio of node densities of the two subregions in the health-monitoring system. Last Node Alive (LNA), which is a measure of network lifespan, was the parameter for evaluating the performance of the proposed scheme. The simulation results show that the proposed scheme significantly increases network lifespan compared with traditional LEACH and LEACH-SC protocols, which by themselves improve the overall performance of the health-monitoring system. 展开更多
关键词 network lifespan sensor node LEACH LNA
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部