scholarly journals A Reliable System for JXTA-Overlay P2P Platform Considering Number of Authentic Files, Security and QoS Parameters

Author(s):  
Yi Liu ◽  
Donald Elmazi ◽  
Shinji Sakamoto ◽  
Leonard Barolli ◽  
Fatos Xhafa ◽  
...  
Author(s):  
R. C. Moretz ◽  
G. G. Hausner ◽  
D. F. Parsons

Electron microscopy and diffraction of biological materials in the hydrated state requires the construction of a chamber in which the water vapor pressure can be maintained at saturation for a given specimen temperature, while minimally affecting the normal vacuum of the remainder of the microscope column. Initial studies with chambers closed by thin membrane windows showed that at the film thicknesses required for electron diffraction at 100 KV the window failure rate was too high to give a reliable system. A single stage, differentially pumped specimen hydration chamber was constructed, consisting of two apertures (70-100μ), which eliminated the necessity of thin membrane windows. This system was used to obtain electron diffraction and electron microscopy of water droplets and thin water films. However, a period of dehydration occurred during initial pumping of the microscope column. Although rehydration occurred within five minutes, biological materials were irreversibly damaged. Another limitation of this system was that the specimen grid was clamped between the apertures, thus limiting the yield of view to the aperture opening.


Author(s):  
Esra Musbah Mohammed Musbah ◽  
Khalid Hamed Bilal ◽  
Amin Babiker A. Nabi Mustafa

VoIP stands for voice over internet protocol. It is one of the most widely used technologies. It enables users to send and transmit media over IP network. The transition from IPv4 to IPv6 provides many benefits for internet IPv6 is more efficient than IPv4. This paper presents a performance analysis of VoIP over WLAN using IPv4 and IPv6 and OPNET software program to simulate the protocols and to investigate the QoS parameters such as jitter, delay variation, packet send, and packet received and throughputs for IP4 and IP6 and compare between them.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 563
Author(s):  
Babu Rajendiran ◽  
Jayashree Kanniappan

Nowadays, many business organizations are operating on the cloud environment in order to diminish their operating costs and to select the best service from many cloud providers. The increasing number of Cloud Services available on the market encourages the cloud consumer to be conscious in selecting the most apt Cloud Service Provider that satisfies functionality, as well as QoS parameters. Many disciplines of computer-based applications use standardized ontology to represent information in their fields that indicate the necessity of an ontology-based representation. The proposed generic model can help service consumers to identify QoS parameters interrelations in the cloud services selection ontology during run-time, and for service providers to enhance their business by interpreting the various relations. The ontology has been developed using the intended attributes of QoS from various service providers. A generic model has been developed and it is tested with the developed ontology.


Author(s):  
Yi-Chun Chen ◽  
Bo-Huei He ◽  
Shih-Sung Lin ◽  
Jonathan Hans Soeseno ◽  
Daniel Stanley Tan ◽  
...  

In this article, we discuss the backgrounds and technical details about several smart manufacturing projects in a tier-one electronics manufacturing facility. We devise a process to manage logistic forecast and inventory preparation for electronic parts using historical data and a recurrent neural network to achieve significant improvement over current methods. We present a system for automatically qualifying laptop software for mass production through computer vision and automation technology. The result is a reliable system that can save hundreds of man-years in the qualification process. Finally, we create a deep learning-based algorithm for visual inspection of product appearances, which requires significantly less defect training data compared to traditional approaches. For production needs, we design an automatic optical inspection machine suitable for our algorithm and process. We also discuss the issues for data collection and enabling smart manufacturing projects in a factory setting, where the projects operate on a delicate balance between process innovations and cost-saving measures.


2018 ◽  
Vol 5 (2) ◽  
pp. 139
Author(s):  
Salman Al Farisi ◽  
Rukmi Sari Hartati ◽  
I Wayan Sukerayasa

The need for electricity in this global era is increasing, so that a more reliable electrical system is needed. A reliable system cannot be separated from interference, so there needs to be a system reliability analysis and power loss to the feeder by configuring the network. This research was conducted to find the reliability index value in the form of interference frequency and duration of interference (SAIFI and SAIDI). In one Tabanan feeder the results obtained exceed the standard so reconfiguration is performed Based on the analysis obtained before reconfiguration, the reliability index for SAIFI is 6,7456 (failure / year) and SAIDI is 11,4767 (hour / year) and power loss by 6,27 %. After reconfiguration of Tabanan feeder, the reliability index was better, for SAIFI is 5.2475 (disturbance / year) and SAIDI is 9,8798 (hour / year), the power loss was 2.82%. Sanggulan feeder is a new feeder reconfiguration result from Tabanan feeder, where the analysis was carried out to find out the reliability index of Sanggulan feeder, it was obtained the SAIFI value of 4.5753 (disturbance / year) and SAIDI of 9.5297 (hour / year) and power loss of 4,80%.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


Sign in / Sign up

Export Citation Format

Share Document