Abstract: A mobile ad hoc network (MANET) is a wireless communication network where nodes that are not within direct transmission range establish their communication via the help of other nodes to forward data. Routing protocols in MANETs are usually categorized as proactive. Tree Based Opportunistic Routing (TBOR) finds a multipath link based on maximum probability of the throughput. The simulation results show that the presented method is performed very well compared to the existing methods in terms of throughput, delay and routing overhead.
Abstract: Selection of suppliers is a crucial problem in the supply chain management. On top of that, sustainable supplier selection is the biggest challenge for the organizations. Environment protection and social problems have been of concern to society in recent years, and the traditional supplier selection does not consider about this factor; therefore, this research work focuses on introducing sustainable criteria into the structure of supplier selection criteria. Sustainable Supply Chain Management (SSCM) is the management and administration of material, information, and money flows, as well as coordination among business along the supply chain. All three dimensions - economic, environmental, and social - of sustainable development needs to be taken care of. Purpose of this research is to maximize supply chain profitability, maximize social wellbeing of supply chain and minimize environmental impacts. Problem statement is selection of suppliers in a sustainable supply chain network by ranking the suppliers against sustainable criteria identified. The aim of this research is twofold: To find out what are the sustainable parameters that can be applied to the supply chain, and to determine how these parameters can effectively be used in supplier selection. Multicriteria decision making tools will be used to rank both criteria and suppliers. AHP Analysis will be used to find out ratings for the criteria identified. It is a technique used for efficient decision making. TOPSIS will be used to find out rating for suppliers and then ranking them. TOPSIS is a MCDM problem solving method which is based on the principle that the chosen option should have the maximum distance from the negative ideal solution (NIS) and the minimum distance from the ideal solution.
Abstract: The majority of the urban areas in Latin America face the challenges associated with city planning and development problems, attributed to human, technical, and economical factors; therefore, we cannot ignore the issues related to climate change because the city modifies the natural landscape in a significant way transforming the radiation balance and heat content in the urbanized areas. These modifications provoke changes in the temperature distribution known as “the heat island effect”. According to this phenomenon, we have the need to conceive the urban planning based on climatological patterns that will assure its sustainable functioning, including the particularities of the climate variability. In the present study, it is identified the Local Climate Zones (LCZ) in the Metropolitan Area of the Aburrá Valley (Colombia) with the objective of relocate the air quality monitoring stations as a partial solution to the problem of how to measure representative air quality levels in a city for a local scale, but with instruments that measure in the microscale.
Abstract: A mobile ad hoc network (MANET) represents a system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Unlike a wired network, wireless network interface has limited transmission range. Routing is the task of forwarding data packets from source to a given destination. Ad-hoc On Demand Distance Vector (AODV) routing protocol creates a path for a destination only when it required. This paper describes the implementation of AODV routing protocol using MATLAB-based Truetime simulator. In MANET's node movements are not fixed while they are random in nature. Hence intelligent techniques i.e. fuzzy and ANFIS are used to optimize the transmission range. In this paper, we compared the transmission range of AODV, fuzzy AODV and ANFIS AODV. For soft computing AODV, we have taken transmitted power and received threshold as input and transmission range as output. ANFIS gives better results as compared to fuzzy AODV.
Abstract: With the advancement of information technology and development of group commerce, people have obviously changed in their lifestyle. However, group commerce faces some challenging problems. The products or services provided by vendors do not satisfactorily reflect customers’ opinions, so that the sale and revenue of group commerce gradually become lower. On the other hand, the process for a formed customer group to reach group-purchasing consensus is time-consuming and the final decision is not the best choice for each group members. In this paper, we design a social decision support mechanism, by using group discussion message to recommend suitable options for group members and we consider social influence and personal preference to generate option ranking list. The proposed mechanism can enhance the group purchasing decision making efficiently and effectively and venders can provide group products or services according to the group option ranking list.
Abstract: The decreasing use of fossil fuel power stations has
a negative effect on the stability of the electricity systems in many
countries. Nuclear power stations have traditionally provided minimal
ancillary services to support the system but this must change in the
future as they replace fossil fuel generators. This paper explains the
development of the four most popular reactor types still in regular
operation across the world which have formed the basis for most
reactor development since their commercialisation in the 1950s. The
use of nuclear power in four countries with varying levels of capacity
provided by nuclear generators is investigated, using the primary
frequency response provided by generators as a measure for the
electricity networks stability, to assess the need for nuclear generators
to provide additional support as their share of the generation capacity
increases.
Abstract: Over the past three decades, free and open source software (FOSS) programmers have developed new, innovative and legally binding licences that have in turn enabled the creation of innumerable pieces of everyday software, including Linux, Mozilla Firefox and Open Office. That FOSS has been highly successful in competing with 'closed source software' (e.g. Microsoft Office) is now undeniable, but in noting this success, it is important to examine in detail why this system of FOSS has been so successful. One key reason is the existence of networks or communities of programmers, who are bound together by a key shared social norm of 'reciprocity'. At the same time, these FOSS networks are not unitary – they are highly diverse and there are large divergences of opinion between members regarding which licences are generally preferable: some members favour the flexible ‘free’ or 'no copyleft' licences, such as BSD and MIT, while other members favour the ‘strong open’ or 'strong copyleft' licences such as GPL. This paper argues that without both the existence of the shared norm of reciprocity and the diversity of licences, it is unlikely that the innovative legal framework provided by FOSS would have succeeded to the extent that it has.
Abstract: Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.
Abstract: Metabolomics has become a rising field of research
for various diseases, particularly cancer. Increases or decreases in
metabolite concentrations in the human body are indicative of various
cancers. Further elucidation of metabolic pathways and their
significance in cancer research may greatly spur medicinal discovery.
We analyzed the metabolomics profiles of lung cancer. Thirty-three
metabolites were selected as significant. These metabolites are
involved in 37 metabolic pathways delivered by MetaboAnalyst
software. The top pathways are glyoxylate and dicarboxylate
pathway (its hubs are formic acid and glyoxylic acid) along with
Citrate cycle pathway followed by Taurine and hypotaurine pathway
(the hubs in the latter are taurine and sulfoacetaldehyde) and Glycine,
serine, and threonine pathway (the hubs are glycine and L-serine). We
studied interactions of the metabolites with the proteins involved in
cancer-related signaling networks, and developed an approach to
metabolomics biomarker use in cancer diagnostics. Our analysis
showed that a significant part of lung-cancer-related metabolites
interacts with main cancer-related signaling pathways present in this
network: PI3K–mTOR–AKT pathway, RAS–RAF–ERK1/2 pathway,
and NFKB pathway. These results can be employed for use of
metabolomics profiles in elucidation of the related cancer proteins
signaling networks.
Abstract: Recent advancement in wireless internetworking has presented a number of dynamic routing protocols based on sensor networks. At present, a number of revisions are made based on their energy efficiency, lifetime and mobility. However, to the best of our knowledge no extensive survey of this special type has been prepared. At present, review is needed in this area where cluster-based structures for dynamic wireless networks are to be discussed. In this paper, we examine and compare several aspects and characteristics of some extensively explored hierarchical dynamic clustering protocols in wireless sensor networks. This document also presents a discussion on the future research topics and the challenges of dynamic hierarchical clustering in wireless sensor networks.
Abstract: We consider a network design problem which has
shortest routing restriction based on the values determined by the
installed facilities on each arc. In conventional multicommodity
network design problem, a commodity can be routed through any
possible path when the capacity is available. But, we consider
a problem in which the commodity between two nodes must be
routed on a path which has shortest metric value and the link
metric value is determined by the installed facilities on the link.
By this routing restriction, the problem has a distinct characteristic.
We present an integer programming formulation containing the
primal-dual optimality conditions to the shortest path routing. We
give some computational results for the model.
Abstract: In a conventional network, most network devices, such as routers, are dedicated devices that do not have much variation in capacity. In recent years, a new concept of network functions virtualisation (NFV) has come into use. The intention is to implement a variety of network functions with software on general-purpose servers and this allows the network operator to select their capacities and locations without any constraints. This paper focuses on the allocation of NFV-based routing functions which are one of critical network functions, and presents the virtual routing function allocation algorithm that minimizes the total power consumption. In addition, this study presents the useful allocation policy of virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy takes the ratio of the power consumption of a routing function to that of a circuit and traffic distribution between areas into consideration. Furthermore, the present paper shows that there are cases where the use of NFV-based routing functions makes it possible to reduce the total power consumption dramatically, in comparison to a conventional network, in which it is not economically viable to distribute small-capacity routing functions.
Abstract: Vehicle is one of the most influential and complex
product worldwide, which affects people’s life, state of the
environment and condition of the economy (all aspects of sustainable
development concept) during each stage of lifecycle. With the
increase of vehicles’ number, there is growing potential for
management of End of Life Vehicle (ELV), which is hazardous
waste. From one point of view, the ELV should be managed to ensure
risk elimination, but from another point, it should be treated as a
source of valuable materials and spare parts. In order to obtain
materials and spare parts, there are established recycling networks,
which are an example of sustainable policy realization at the national
level. The basic object in the polish recycling network is dismantling
facility. The output material streams in dismantling stations include
waste, which very often generate costs and spare parts, that have the
biggest potential for revenues creation. Both outputs are stored into
warehouses, according to the law. In accordance to the revenue
creation and sustainability potential, it has been placed a strong
emphasis on storage process. We present the concept of storage
method, which takes into account the specific of the dismantling
facility in order to support decision-making process with regard to the
principles of sustainable development. The method was developed on
the basis of case study of one of the greatest dismantling facility in
Poland.
Abstract: Mobile ad hoc network (MANET) is a self-configuring network of mobile node connected without wires. A Fuzzy Logic Based Collaborative watchdog approach is used to reduce the detection time of misbehaved nodes and increase the overall truthfulness. This methodology will increase the secure efficient routing by detecting the Black Holes attacks. The simulation results proved that this method improved the energy, reduced the delay and also improved the overall performance of the detecting black hole attacks in MANET.
Abstract: This paper describes an approach to detect the
transmitted signals for 2×2 Multiple Input Multiple Output (MIMO)
setup using roulette wheel based ant colony optimization technique.
The results obtained are compared with classical zero forcing and
least mean square techniques. The detection rates achieved using
this technique are consistently larger than the one achieved using
classical methods for 50 number of attempts with two different
antennas transmitting the input stream from a user. This paves the
path to use alternative techniques to improve the throughput achieved
in advanced networks like Long Term Evolution (LTE) networks.
Abstract: A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.
Abstract: Construction defects are major components that result in negative impacts on project performance including schedule delays and cost overruns. Since construction defects generally occur when a few associated causes combine, a thorough understanding of defect causality is required in order to more systematically prevent construction defects. To address this issue, this paper uses association rule mining (ARM) to quantify the causality between defect causes, and social network analysis (SNA) to find indirect causality among them. The suggested approach is validated with 350 defect instances from concrete works in 32 projects in Korea. The results show that the interrelationships revealed by the approach reflect the characteristics of the concrete task and the important causes that should be prevented.
Abstract: Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.
Abstract: Prediction of perturbations after genetic manipulation
(especially gene knockout) is one of the important challenges in
systems biology. In this paper, a new algorithm is introduced that
integrates microarray data into the metabolic model. The algorithm
was used to study the change in the cell phenotype after knockout of
Gss gene in Escherichia coli BW25113. Algorithm implementation
indicated that gene deletion resulted in more activation of the
metabolic network. Growth yield was more and less regulating gene
were identified for mutant in comparison with the wild-type strain.
Abstract: Wireless Sensor Networks (WSNs) are suitable for many scenarios in the real world. The retrieval of data is made efficient by the data aggregation techniques. Many techniques for the data aggregation are offered and most of the existing schemes are not energy efficient and secure. However, the existing techniques use the traditional clustering approach where there is a delay during the packet transmission since there is no proper scheduling. The presented system uses the Velocity Energy-efficient and Link-aware Cluster-Tree (VELCT) scheme in which there is a Data Collection Tree (DCT) which improves the lifetime of the network. The VELCT scheme and the construction of DCT reduce the delay and traffic. The network lifetime can be increased by avoiding the frequent change in cluster topology. Secure and Efficient Transmission of Aggregated data (SETA) improves the security of the data transmission via the trust value of the nodes prior the aggregation of data. Since SETA considers the data only from the trustworthy nodes for aggregation, it is more secure in transmitting the data thereby improving the accuracy of aggregated data.