Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 15
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

In this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating a model of the sensor network node, the same software is used in real sensor network nodes and in the simulation framework. Operation of the framework is illustrated with examples of simulations of selected transactions in the sensor network.
Go to article

Authors and Affiliations

Marek Wójcikowski
Download PDF Download RIS Download Bibtex

Abstract

The rapid development of the Internet of Things (IoT) and the wide area of application rise the IoT concept to be the future of the internet. Indeed, IoT environment has a special nature with a lot of constraints in term of resource consumption. Moreover, the data exchanged between things and the internet is big data. In order to achieve efficiency in IoT communication, many technologies and new protocols based on these technologies have been developed. This paper aims to study the performance of Message Queuing Telemetry Transport (MQTT) by implementing this protocol on test-bed network infrastructure and analyzing the performance properties such as delay, jitter, packet loss and throughput for real time and non-real time scenarios. Finally, future research issues in MQTT protocol are suggested.
Go to article

Bibliography

[1] I. T. S. Sector, Recommendation ITU-T Y. 2060, “Overview of the Internet of things. Series Y: Global information infrastructure, internet protocol aspects and next-generation networks-Frameworks and functional architecture models,” 2012. Retrieved from https://www. itu. int/rec/T-REC-Y, 2060-201206.
[2] D. Bandyopadhyay, and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization,” Wireless Pers Commun, vol. 58(1), pp. 49-69, 2011. http://dx.doi.org/10.1007/s11277-011-0288-5
[3] MQTT Version 5.0. Edited by Andrew Banks, Ed Briggs, Ken Borgendale, and Rahul Gupta. 07 March 2019. OASIS Standard. https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html.
[4] Postscapes.com, Internet of Things Examples – Postscapes, 2020. Retrieved 20 April 2020, from http://postscapes.com/internet-of-things-examples/
[5] S. Schneider, Understanding The Protocols Behind The Internet Of Things. Electronicdesign.com, 2013. Retrieved 20 April 2020, from http://electronicdesign.com/iot/understanding-protocols-behind-internet-things
[6] C. Karasiewicz, Why HTTP is not enough for the Internet of Things (The Mobile Frontier). Ibm.com, 2013. Retrieved 20 April 2020, from https://www.ibm.com/developerworks/community/blogs/mobileblog/date/201309?lang=en
[7] IoT Analytics - Market Insights for the Internet Of Things, The 10 most popular Internet of Things applications right now, 2015. Retrieved 20 April 2020, from http://iot-analytics.com/10-internet-of-things-applications/
[8] Mqtt.org, FAQ - Frequently Asked Questions | MQTT, 2020. Retrieved 20 April 2020, from http://mqtt.org/faq
[9] U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks,” In 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE'08), Jan. 2008, pp. 791-798, IEEE. https://doi.org/10.1109/COMSWA.2008.4554519
[10] R. Webb, A Brief, but Practical Introduction to the MQTT Protocol and its Application to IoT | Zoetrope, 2016. Retrieved 20 April 2020, from https://zoetrope.io/tech-blog/brief-practical-introduction-mqtt-protocol-and-its-application-iot

Go to article

Authors and Affiliations

Ghofran Hijazi
1
Mohamed Hadi Habaebi
1
Ahmed Al-Haddad
1
Alhareth Mohammed Zyoud
2

  1. Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  2. Department of Electrical and Computer Engineering, Faculty of Engineering and Technology, Birzeit University, Birzeit, Ramallah, Palestine
Download PDF Download RIS Download Bibtex

Abstract

One of the most recent challenges in communication system and network system is the privacy and security of information and communication session. Blockchain is one of technologies that use in sensing application in different important environments such as healthcare. In healthcare the patient privacy should be protected use high security system. Key agreement protocol based on lattice ensure the authentication and high protection against different types of attack especially impersonation and man in the middle attack where the latticebased protocol is quantum-withstand protocol. Proposed improved framework using lattice based key agreement protocol for application of block chain, with security analysis of many literatures that proposed different protocols has been presented with comparative study. The resultant new framework based on lattice overcome the latency limitation of block chain in the old framework and lowered the computation cost that depend on Elliptic curve Diffie-Hellman. Also, it ensures high privacy and protection of patient’s information.
Go to article

Authors and Affiliations

Zahraa Ch. Oleiwi
1
Rasha Ail Dihin
2
Ali H. Alwan
3

  1. College of Computer Science and InformationTechnology, University Al-Qadisiyah, Iraq
  2. Faculty of Education for Girls, University of Kufa, Najaf, Iraq
  3. Alkafeel University, Najaf, Iraq
Download PDF Download RIS Download Bibtex

Abstract

Electric energy systems need constant modernization and updating to solve such problems as distributed management, self-sealing, improving the quality of electricity, demand management, and integration of renewable energy systems. Currently, energy systems need advanced and intelligent technologies to perform various system-level tasks. The purpose of this research is to analyze the existing control systems of electric energy systems, as well as to consider the possibility of using multi-agent systems to control electric energy systems. To achieve the aim of the research, the following scientific approaches were implemented: method of direct research, experimental method, questioning, comparative method, analysis method, and method of observation. The primary value of the research is in the novelty of the work and the fact, that functional components in multi-agent systems act as independent agents, which can interact with each other through a message communication system. This provides a simple connection between the components, which can benefit complex systems designed for an intelligent network. The intelligent network provides an efficient energy management system, and the modernization of the existing power system using a multi-agent system provides solutions to many problems. The best implementation of a multi-agent system can be achieved through the employment of fast and protected communication protocols. The authors of the research have conducted research and presented key statistical data on electricity usage in Kazakhstan over the past few years. The practical significance of the research is determined by the applied results, and their scientific significance, which is conditioned upon the use of deep, modern mathematical results and the development of an optimal control system. This research is a part of a universal model and optimal system of emergency quick response, conducting a quick preliminary prognosis as well as ensuring more lasting planning in electricity consumption.
Go to article

Authors and Affiliations

Saltanat Bitimanova
1
Aliya Shukirova
1

  1. Department of Systems Analysis and Management, L.N. Gumilyov Eurasian National University, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

Background: Studies on the effect of root canal rinsing protocols on fiber post bonding to dentin are inconclusive. This study reports investigation of this topic. Objectives: to determine effects of irrigation protocol by means of a push-out test on the strength of adhesion between the post and dentin in an in vitro study.
Materials and Method: Thirty human single-rooted teeth were prepared using hand instruments and the step-back technique, filled with gutta-percha, sealed with AH Plus (Dentsply), and divided into three groups: A: rinsed with NaCl; B: rinsed with 2% chlorhexidine (CHX); C: not rinsed before cementa-tion of posts. The fiber posts were set using RelyX and Built-it. The tooth roots were sliced and the push- out test was performed. The area of contact between the post and dentin was calculated and the destroying force was established. The results were statistically analyzed.
Results: The mean adhesive strength was 10.69 MPa in group A, 16.33 MPa in group B, and 16.72 MPa in C. The adhesive strength in group B and C was statistically significantly higher than in group A (p = 0.0016, ANOVA).
Conclusion: Rinsing root canals with CHX seems to be the most effective method prior to setting a fiber post.
Go to article

Bibliography

1. Asmussen E., Peutzfeldt A., Heitmann T.: Stiffness, elastic limit, and strength of newer types of endodontic posts. Journal of Dentistry. 1999; 27: 275–278.
2. Bateman G., Ricketts D.N., Saunders W.P.: Fibre-based post systems: a review. Br Dent J. 2003; 195: 43–48.
3. Schwartz R.S., Robbins J.W.: Post placement and restoration of endodontically treated teeth: a literature review. J Endod. 2004; 30: 289–301.
4. Skupien A., Sarkis-Onofre R., Cenci S., Morales R., Pereira-Cenci T.: A sys.ematic review of factors associated with the retention of glass fiber posts. Braz Oral Res. 2015; 29: 1–8.
5. Ryniewicz W., Ryniewicz A.M., Bojko Ł.: The effect of a prosthetic crown’s design on the accuracy of mapping an abutment teeth’s shape. Meas. 2016; 91: 620–627.
6. Bitter K., Aschendorff L., Neumann K., Blunck U., Sterzenbach G.: Do chlorhexidine and ethanol improve bond strength and durability of adhesion of fiber posts inside the root canal? Clin Oral Investig. 2014; 18: 927–934.
7. Haragushiku G.A., Back E.D., Tomazinho P.H., Baratto Filho F., Furuse A.Y.: Influence of antimicrobial solutions in the decontamination and adhesion of glass-fiber posts to root canals. J Appl Oral Sci. 2015; 23: 436–441.
8. Stape T.H.S., de Souza Menezes M., Aguiar F.H.B., Quagliatto P.S., Soares C.J., Martins L.R.M.: Long- term effect of chlorhexidine on the dentin microtensile bond strength of conventional and self- adhesive resin cements: A two-year in vitro study. Int J Adhes Adhes. 2014; 50: 228–234.
9. Toman M., Toksavul S., Tamac E., Sarikanat M., Karagozoglu I.: Effect of chlorhexidine on bond strength between glass-fiber post and root canal dentine after six month of water storage. Eur J Prosthodont Restor Dent. 2014; 22: 29–34.
10. Cecchin D., Farina A.P., Souza M.A., Da Cunha Pereira C.: Effect of root-canal sealer on the bond strength of fiberglass post to root dentin. Acta Odontol Scand. 2011; 69: 95–100.
11. Cecchin D., de Almeida J.F., Gomes B.P., Zaia A.A., Ferraz C.C.: Influence of chlorhexidine and ethanol on the bond strength and durability of the adhesion of the fiber posts to root dentin using a total etching adhesive system. J Endod. 2011; 37: 1310–1315.
12. Cecchin D., Farina A.P., Giacomin M., Vidal C. de M., Carlini-Junior B., Ferraz C.C.: Influence of chlorhexidine application time on the bond strength between fiber posts and dentin. J Endod. 2014; 40: 2045–2048.
13. Cecchin D., Giacomin M., Farina A.P., Bhering C.L., Mesquita M.F., Ferraz C.C.: Effect of chlorhexidine and ethanol on push-out bond strength of fiber posts under cyclic loading. J Adhes Dent. 2014; 16: 87–92.
14. Ekambaram M., Yiu C.K., Matinlinna J.P., Chang J.W., Tay F.R., King N.M.: Effect of chlorhexidine and ethanol-wet bonding with a hydrophobic adhesive to intraradicular dentine. J Dent. 2014; 42: 872–882.
15. Gomes Franca F.M., Vaneli R.C., Conti C. de M., Basting R.T., do Amaral F.L., Turssi C.P.: Effect of Chlorhexidine and Ethanol Application on Long-term Push-out Bond Strength of Fiber Posts to Dentin. J Contemp Dent Pract. 2015; 16: 547–553.
16. Leitune V.C., Collares F.M., Werner Samuel S.M.: Influence of chlorhexidine application at longitudinal push-out bond strength of fiber posts. Oral Surg Oral Med Oral Pathol Oral Radiol Endod. 2010; 110: e77–81.
17. Lindblad R.M., Lassila L.V., Salo V., Vallittu P.K., Tjaderhane L.: Effect of chlorhexidine on initial adhesion of fiber-reinforced post to root canal. J Dent. 2010; 38: 796–801.
18. Kang H.-J., Moon H.-J., Shin D.-H.: Effect of different chlorhexidine application times on microtensile bond strength to dentin in Class I cavities. Restor Dent Endod. 2012; 37: 9–15.
19. Goracci C., Grandini S., Bossu M., Bertelli E., Ferrari M.: Laboratory assessment of the retentive potential of adhesive posts: a review. J Dent. 2007; 35: 827–835.
20. Baldea B., Furtos G., Antal M., Nagy K., Popescu D., Nica L.: Push-out bond strength and SEM analysis of two self-adhesive resin cements: An in vitro study. J Dental Sci. 2013; 8: 296–305.
21. Bitter K., Hambarayan A., Neumann K., Blunck U., Sterzenbach G.: Various irrigation protocols for final rinse to improve bond strengths of fiber posts inside the root canal. Eur J Oral Sci. 2013; 121: 349–354.
22. Casselli D.S., Borges M.G., Menezes M.S., Faria-e-Silva A.L.: Effect of cementation protocol on push- out bond strength of fiber posts to root canal. Appl Adhes Sci. 2014; 2: 15.
23. Cecchin D., de Almeida J.F., Gomes B.P., Zaia A.A., Ferraz C.C.: Effect of chlorhexidine and ethanol on the durability of the adhesion of the fiber post relined with resin composite to the root canal. J Endod 2011; 37: 678–683.
24. Kim Y.H., Shin D.H.: Effect of chlorhexidine application on the bond strength of resin core to axial dentin in endodontic cavity. Restor Dent Endod. 2012; 37: 207–214.
25. Lima J.F., Lima A.F., Humel M.M., Paulillo L.A., Marchi G.M., Ferraz C.C.: Influence of irrigation protocols on the bond strength of fiber posts cemented with a self-adhesive luting agent 24 hours after endodontic treatment. Gen Dent. 2015; 63: 22–26.
26. Wang L., Pinto T.A., Silva L.M., et al.: Effect of 2% chlorhexidine digluconate on bond strength of a glass-fibre post to root dentine. Int Endod J. 2013; 46: 847–854.
27. de Araujo D.F., Chaves L.P., Bim O. Jr., et al.: Influence of 2% chlorhexidine digluconate on bond strength of a glass-fibre post luted with resin or glass-ionomer based cement. J Dent. 2014; 42: 735– 741.
28. Sahinkesen G., Erdemir U., Oktay E.A., Sancakli H.S.: The effect of post surface silanization and luting agents on the push-out bond strengths of adhesively inserted fiber reinforced posts. Int J Adhes Adhes 2011; 31: 265–270.
29. Lindblad R.M., Lassila L.V., Salo V., Vallittu P.K., Tjaderhane L.: One year effect of chlorhexidine on bonding of fibre-reinforced composite root canal post to dentine. J Dent. 2012; 40: 718–722.


Go to article

Authors and Affiliations

Bartosz Ciapała
1
Krzysztof Górowski
2
Wojciech I. Ryniewicz
2
Andrzej Gala
2
Jolanta E. Loster
2

  1. Department of Integrated Dentistry, Institute of Dentistry, Jagiellonian University Medical College, Kraków, Poland
  2. Department of Dental Prosthetics and Orthodontics, Institute of Dentistry, Jagiellonian University Medical College, Kraków, Poland
Download PDF Download RIS Download Bibtex

Abstract

Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of Image, Video and Audio Steganography but very little work has been done in Network Steganography. A Network Steganography technique hides data in a Network Data Unit, i.e., a Network Protocol Packet. In this paper we present an algorithm ARPNetSteg that implements Network Steganography using the Address resolution protocol. Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.

Go to article

Authors and Affiliations

Punam Bedi
Arti Dua
Download PDF Download RIS Download Bibtex

Abstract

Compared with traditional cellular networks, wireless ad hoc networks do not have trusted entities such as routers, since every node in the network is expected to participate in the routing function. Therefore, routing protocols need to be specifically designed for wireless ad hoc networks. In this work, we propose an authenticated routing protocol based on small world model (ARSW). With the idea originating from the small world theory, the operation of the protocol we proposed is simple and flexible. Our simulation results show the proposed ARSW not only increases packet delivery ratio, but also reduces packet delivery delay. In particularly, Using authentication theory, the proposed ARSW improves communication security.
Go to article

Bibliography

[1] Elizabeth M. Royer, Chai-Keong Toh. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications, 6(2): 46-55, 1999.
[2] Jorge E. O. T., Molina J. L. B., Miguel A. S. L. Simulation and evaluation of ad hoc networks under different mobility models. Ingeniería E Investigación, 23(3): 44-50, 2003.
[3] Tianbo L., Hao C. Anonymous routing protocols for mobile ad-hoc networks. International Journal of Security and its Applications, 10(4): 229-240, 2016.
[4] Banala R., Sakthivel M. A review on delay-minimized routing protocol in mobile cognitive ad hoc networks. International Journal of Computer Sciences & Engineering, 6(7): 991-996, 2018.
[5] Prabhavat S. , Narongkhachavana W. , Thongthavorn T. , et al. Low Overhead Localized Routing in Mobile Ad Hoc Networks. Wireless Communications & Mobile Computing, 2019, 6(4): 1-15.
[6] Shanmugasundaram D. , Shanavas A. R. M. Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol [J]. International Journal of Computer Sciences & Engineering, 2019, 7(4): 995-1005.
[7] Kothandaraman D., Chellappan C., . Energy Efficient Node Rank-Based Routing Algorithm in Mobile Ad-Hoc Networks. International Journal of Computer Networks & Communications, 2019, 11(1):45-61.
[8] Shanmugasundaram D., Shanavas A. R. M. . Avoidance Cosmic Dust implementing in Ad Hoc on-demand Distance Vector (CDA AODV) Routing Protocol. International Journal of Computer Sciences & Engineering, 2019, 7(4):995-1005.
[9] Kim, C., Talipov, E., & Ahn, B. A reverse aodv routing protocol in ad hoc mobile networks. Lecture Notes in Computer Science, pp. 522-531. 2016.
[10] Navjot K., Ashok K., & Daviet J. (2011). Comparison and analysis of RREQ and RREP for dynamic wireless network. Indian Journal of Computer Science & Engineering, 2(3), 73-78, 2011.
[11] Kargl F., Schlott S. & Weber M. (2004). Securing ad hoc routing protocols, Proceedings. 30th Euromicro Conference, 2004., Rennes, France, pp. 514-519.
[12] Kumar S., Dhull K., Sharma D., et al. Evaluation of AODV and DYMO Routing Protocol using Generic, Micaz and Micamotes Energy Conservation Models in AWSN with Static and Mobile Scenario [J]. Scalable Computing, 2019, 20(4):653-661.
[13] Watts D.J. & Strogatz S.H. (1998), Collective dynamics of ‘small-world’ networks, Nature, 1998, 393(6684): 440–442.
[14] Qin Y , Guo D , Luo L , et al. Design and optimization of VLC based small-world data centers [J]. Frontiers of Computer Science in China, 2019, 13(5):1034-1047.
[15] Qiu T.p, Liu X., Li K., et al. Community-Aware Data Propagation with Small World Feature for Internet of Vehicles [J]. IEEE Communications Magazine, 2018, 56(1):86-91.
[16] Reka A., Hawoong J., & Albert-Laszlo B. Error and attack tolerance of complex networks. Nature. 406(6794):378-382, 2004.
[17] Guidoni, D. L. , Mini, R. A. F. , & Loureiro, A. A. F. On the design of resilient heterogeneous wireless sensor networks based on small world concepts. Computer Networks, 54(8):1266-1281, 2009.
[18] Zhang, J. & Elkashlan M., A small world network model for energy efficient wireless networks, IEEE Communication. Lett., 17(10): 1928–1931, 2013.
[19] Zarepour, M., Universal and non-universal neural dynamics on small world connectomes: A finite-size scaling analysis. Physical Review E. 100 (5): 52138, 2019.
[20] Tefan G. Small directed strongly regular graphs. Algebra Colloquium, 27(1), 11-30, 2020.
[21] Zhang L. & Tang Y. Research on the method of improving network security based on small world model. 40(13):136-139, 2005.
[22] Oscar P. Sarmiento, F. G. Guerrero, D. R.(2008) Basic security measures for IEEE 802.11 wireless networks. Ingenieria E Investigación, 28(2):89-96. 2008.
[23] Wu J. &Yang S. Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks. IEEE Trans. on Parallel and Distributed Systems, 18(6): 735-748, 2007.
[24] Anhong Zhong. Research on Mobile Ad Hoc Network Routing Protocol Based on Small World Theory [D]. Xidian University, 2011.
[25] Li Yong, Li Wei, Zhao Weiquan, Optimization for Dynamic Source Routing Based on the Small-world Theory [J], Computer Engineering, 2005 (9):102-104.
Go to article

Authors and Affiliations

Daxing Wang
1
Leying Xu
1

  1. College of Mathematics and Finance, Chuzhou University
Download PDF Download RIS Download Bibtex

Abstract

In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices.
Go to article

Authors and Affiliations

Bartosz Kościug
1
Piotr Bilski
1
ORCID: ORCID

  1. The Faculty of Electronics and Information Technology on Warsaw University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

This paper aims at designing, building, and simulating a secured routing protocol to defend against packet dropping attacks in mobile WSNs (MWSNs). This research addresses the gap in the literature by proposing Configurable Secured Adaptive Routing Protocol (CSARP). CSARP has four levels of protection to allow suitability for different types of network applications. The protocol allows the network admin to configure the required protection level and the ratio of cluster heads to all nodes. The protocol has an adaptive feature, which allows for better protection and preventing the spread of the threats in the network. The conducted CSARP simulations with different conditions showed the ability of CSARP to identify all malicious nodes and remove them from the network. CSARP provided more than 99.97% packets delivery rate with 0% data packet loss in the existence of 3 malicious nodes in comparison with 3.17% data packet loss without using CSARP. When compared with LEACH, CSARP showed an improvement in extending the lifetime of the network by up to 39.5%. The proposed protocol has proven to be better than the available security solutions in terms of configurability, adaptability, optimization for MWSNs, energy consumption optimization, and the suitability for different MWSNs applications and conditions.
Go to article

Authors and Affiliations

Ahmed Alnaser
1
Hessa Al-Junaid
1
Reham Almesaeed
1

  1. University of Bahrain, College of Information Technology, Kingdom of Bahrain
Download PDF Download RIS Download Bibtex

Abstract

Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.

Go to article

Authors and Affiliations

Ł. Apiecionek
J.M. Czerniak
M. Romantowski
D. Ewald
B. Tsizh
H. Zarzycki
W.T. Dobrosielski
Download PDF Download RIS Download Bibtex

Abstract

The article has presented the assumptions underlying the organization of emissions trading of greenhouse gases with a particular emphasis on CO2 emission allowances. Through the analysis of the literature, international activities were undertaken aimed at reducing greenhouse gas emissions into the atmosphere, starting from the First World Climate Conference organized in 1979. The origins and guidelines of the Kyoto Protocol were also given considerable attention. In addition to the description of the key assumptions of the Protocol and its main components, the characteristics of international trade in Kyoto units were also included. The mechanisms involved in international trade and the types of units traded in a detailed manner are described. In the next part of the article, emission trading systems operating in the world are characterized. In the second part of the paper special attention was paid to the conditionings of the European market, i.e. European Emissions Trading System – EU ETS. Historical events were presented that gave rise to the creation of the EU ETS. In the next steps, the types of units that are tradable were described. Furthermore, the trade commodity exchanges on which trade is conducted, the key factors determining the price of individual allowances are also indicated. In the last part of the article, relatively recent issues – the IED Directive and the BAT conclusions have been pointed out. Referring to the applicable regulations, the impact of their implementation on the situation of entities obliged to limit greenhouse gas emissions was analyzed. In the final phase, an attempt was made to assess the impact of IED and BAT to electricity prices.

Go to article

Authors and Affiliations

Dawid Ciężki
Download PDF Download RIS Download Bibtex

Abstract

Clinical records of dogs with spontaneous degenerative mitral valve disease (DMVD) with clinical signs related to congestive heart failure (CHF) recruited during routine clinical practice between 2001 and 2018 at the Cardiology Unit of the Veterinary Teaching Hospital (University of Milan) were included in this retrospective cohort study. Baseline echocardiographic data were evaluated. Median survival time (MST) was calculated. Data on therapeutic treatment, ISACHC (International Small Animal Cardiac Health Council) or ACVIM (American College of Veterinary Internal Medicine) classes were reviewed based on the inclusion period and type of endpoint (i.e. cardiac death or death for other causes). A univocal classification was needed, and the patients classified in ISACHC classes II, IIIa and IIIb, visited before 2009, were reallocated to ACVIM class C. The main goal of this data review was to retrospectively evaluate 259 clinical records of subjects belonging to ACVIM C class examined between 2001 to 2018 and 202 dogs examined between 2010 to 2018. In this way, in the second group, the bias of the reclassification was avoided. The MST (median survival time) of these subjects was 531 d (2001-2018) and 335.5 d (2010-2018), respectively. Univariate survival regression analysis for subjects included from 2010 to 2018 showed as significantly related to cardiac death (CD): left atrium to aorta ratio (LA/Ao) (HR 2.754, p=0.000), E wave (HR 2.961, p=0.000), E/A ratio (HR 1.372, p=0.000), end-diastolic (HR 1.007, p=0.000) (EDVI) and end-systolic (HR 1.012, p=0.026) (ESVI) volume indexes, allometric diastolic (HR 4.018, p=0.000) (LVIDdN) and systolic (HR 2.674, p=0.049) (LVIDsN) left ventricular internal diameters, age (HR 1.006, p=0.009) and pulmonary hypertension severity (HR=1.309, p=0.012) (PH). Multivariate analysis, adjusted for age, showed that the only variable that determined a statistically significant difference in MST was PH severity (HR 1.334, p=0.033). The type of therapeutic treatment within this class was not significant for the MST of the subjects.
Go to article

Authors and Affiliations

M. Bagardi
1
C. Locatelli
1
A. Zanaboni
2
A. Galizzi
1
D. Malchiodi
2
P.G. Brambilla
1

  1. University of Milan, University Veterinary Teaching Hospital, Via dell’Università n. 6, 26900 Lodi (LO), Italy
  2. University of Milan, Informatic Department, Via Giovanni Celoria n. 18, 20133 Milan (MI), Italy
Download PDF Download RIS Download Bibtex

Abstract

Energy consumed by the sensor nodes are more sporadic in a sensor networks. A skilled way to bring down energy consumption and extend maximum life-time of any sensor present can be of evenly and unevenly distributed random area networks. Cluster heads are more responsible for the links between the source and destination. Energy consumption are much compare to member nodes of the network. Re-clustering will take place if the connectivity in the distributed network failure occurs in between the cluster networks that will affects redundancy in the network efficiency. Hence, we propose pragmatic distribution based routing cluster lifetime using fitness function (PDBRC) prototype is better than the existing protocol using MATLAB 2021a simulation tool.
Go to article

Authors and Affiliations

Harish SV
1
Archana NV
2

  1. NIE Institute of Technology, India Visvesvaraya Technological University, India
  2. University of Mysuru, India
Download PDF Download RIS Download Bibtex

Abstract

This article provides a comparison of various wireless data transmission protocols, such as Wireless M-Bus, Lo- RaWAN, Sigfox, NB-IoT and a newly developed proprietary protocol, studying their performance in the application of batterypowered residential water meters. Key aspects of the comparison include energy consumption, which is analyzed through comparing unitary amount of charge required to conduct a single, bidirectional data transaction between the meter and base station, and maximum coupling loss which effectively defines the range and coverage in the system. For completeness, the study includes also a brief cost analysis and ends with a conclusion, stating when each of the particular standards should be favored.
Go to article

Authors and Affiliations

Łukasz Krzak
1
Jan Macheta
1
Mateusz Kubaszek
1
Cezary Worek
1

  1. Institute of Electronics, Faculty of Computer Science, Electronics and Telecommunications, AGH University of Krakow, Krakow, Poland
Download PDF Download RIS Download Bibtex

Abstract

Nodes' aware-mobility in the Internet of Things (IoTs) stills open defy for researchers, due to the dynamic changing of routing path and networks’ resource limitations. Therefore, in this study a new method is proposed called Mobility Aware - “Routing Protocol for Low power and Lossy Networks” (MARPL), that consists of two phases: in the first phase splitting the entire network into sub areas based on reference nodes with “Time Difference of Arrival” (TDoA) technique. While, the second phase, is about managing mobile nodes (MNs) in RPL according to the sub areas' ID. The Cooja simulator software has been used to implement and assess MA-RPL method performance, according to the data packet metrics (lost packet, packet delivery ratio PDR), latency and nodes' power usage in comparison with two methods: Corona (Co-RPL) and Mobility Enhanced (ME-RPL). The simulation results have been shown that the MA-RPL method consumes less nodes' energy usage, gives less latency with minimum data packet loss in comparison with Co-RPL and MERPL.
Go to article

Authors and Affiliations

Ahmed R. Zarzoor
1

  1. Directorate of Inspection, Ministry of Health, Baghdad, Iraq

This page uses 'cookies'. Learn more