Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 35
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The paper presents a method of how the nonlinear boundary condition [1] may be applied in nonlinear problems of electromagnetic field theory. It is introduced for problems with nonlinear conductivity. An analytical procedure has been constructed, which seeks to reduce calculations related with the nonlinear region. In order to verify the proposed solutions, two problems have been formulated: one of linear and the other of cylindrical symmetry. These have been additionally solved by the authors’ modification of the perturbation method that has been described in previous papers [7, 8, 10]. The electromagnetic field distribution obtained thereby has served as a referential result since it can obtain very accurate solutions [10]. Relative errors of electric and magnetic field strength are introduced to verify the results.

Go to article

Authors and Affiliations

Marcin Sowa
Dariusz Spałek
Download PDF Download RIS Download Bibtex

Abstract

Parasitosis in horses may be uncontrolled and expose breeders and owners to serious financial losses or, possibly, to the loss of animals. Therefore, the prevention and monitoring of the development of parasitic diseases should play an important role in the breeding process. The aim of this study was to confirm the influence of factors such as age, breed, herd size, deworming program, and type of anthelmintics, on the prevalence and intensity of parasites (helminths) in domestic horses in Lower Silesia. The study was carried out between August and November of 2020. The samples of horse feces were collected from 50 different stables in the area of Lower Silesia, Poland. A total of 286 individuals from various breeds were examined. Detailed analysis revealed that the mean age of infected horses was significantly lower than in uninfected horses. The mean time since the last deworming procedure was almost twice as low in uninfected horses than in infected ones. Additionally, the deworming agent affects the prevalence of infection. The analysis was also performed for the same factors in reference to quantitative data. The mean EPG was four-fold higher in juvenile horses than in adults and three-fold higher when the horses were dewormed with the use of fenbendazole instead of ivermectin or ivermectin with praziquantel combined.
Go to article

Bibliography


  1. Francisco I, Arias M, Cortinas FJ, Francisco R, Mochales E, Dacal V, Suárez JL, Uriarte J, Morrondo P, Sánchez-Andrade R, Díez-Banos P, Paz-Silva A (2009) Intrinsic factors influencing the infection by helminth parasites in horses under an oceanic climate area (NW Spain). J Parasitol Res 2009: 616173.
  2. Gawor J (1995) The prevalence and abundance of internal parasites in working horses autopsied in Poland. Vet Parasitol 58: 99-108.
  3. Gawor J, Kornaś S, Kharchenko V, Nowosad B, Skalska M (2006) Intestinal parasites and health problems in horses in different breeding systems (in Polish). Med Weter 62: 331-334.
  4. Kaplan RM (2002) Anthelmintic resistance in nematodes of horses. Vet Res 33: 491-507.
  5. Kaplan RM, Nielsen MK (2010) An evidence-based approach to equine parasite control: it ain’t the 60s anymore. Equine Vet Educ 22: 306-316.
  6. Kaplan RM, Vidyashankar AN (2012) An inconvenient truth: global worming and anthelmintic resistance. Vet Parasitol 186: 70-78.
  7. Kornaś S, Nowosad B, Skalska M (2004) Intestinal parasite infections in horses from different types of environments (in Polish). Med Weter 60: 853-856.
  8. Kornaś S, Cabaret J, Skalska M, Nowosad B (2010). Horse infection with intestinal helminths in relation to age, sex, access to grass and farm system. Vet Parasitol 174: 285-291.
  9. Kuzmina T, Kornaś S, Basiaga M, Kharchenko V, Vyniarska A (2011) Biodiversity of strongylids (Nematoda: Strongylidae) communities in domestic horses from Poland and Ukraine. Helminthologia 48: 77-84.
  10. Kuzmina TA. Dzeverin I, Kharchenko VA (2016) Strongylids in domestic horses: Influence of horse age, breed and deworming programs on the strongyle parasite community. Vet Parasitol 227: 56-63.
  11. Kuzmina TA, Kharchenko VO (2008) Anthelmintic resistance in cyathostomins of brood horses in Ukraine and influence of anthelmintic treatments on strongylid community structure. Vet Parasitol 154: 277-288.
  12. Lichtenfels JR, Kharchenko VA, Dvojnos GM. (2008) Illustrated identification keys to strongylid parasites (Strongylidae: Nematoda) of horses, zebras and asses (Equidae). Vet Parasitol 156: 4-161.
  13. Love S, Murphy D, Mellor D (1999) Pathogenicity of cyathostome infection. Vet Parasitol 85: 113-121.
  14. Lyons ET, Tolliver SC, Drudge JH (1999) Historical perspective of cyathostomes: prevalence, treatment and control programs. Vet Parasitol 85: 97-112.
  15. Martin F, Svansson V, Eydal M, Oddsdóttir C, Ernback M, Persson I, Tydén E (2021) First report of resistance to ivermectin in Parascaris univalens in Iceland. J Parasitol 107: 16-22.
  16. Osterman Lind E, Hoglund J, Ljungstrom BL, Nilson O, Uggla A (1999) A field survey on the distribution of strongyle infections of horses in Sweden and factors affecting faecal egg counts. Equine Vet J 31: 68-72.
  17. Petney TN, Andrews RM (1998) Multiparasite communities in animals and humans: frequency: structure and pathogenic significance. Int J Parasitol 28: 377-393.
  18. Roepstorff A, Nansen P (1998) Epidemiology, diagnosis and control of helminth parasites of swine. FAO Animal health manual. Food and Agriculture Organization of the United Nations, Rome, p 161.
  19. Saeed K, Qadir Z, Ashraf K, Ahmad N (2010) Role of intrinsic and extrinsic epidemiological factors on strongylosis in horses. J Anim Plant Sci 20: 277-280.
  20. Sallé G, Kornaś S, Basiaga M (2018) Equine strongyle communities are constrained by horse sex and species dipersal-fecundity trade-off. Parasit Vectors 11: 279.
  21. Selzer PM, Epe C (2021) Antiparasitics in animal health: Quo Vadis? Trends Parasitol 37(1): 77-89.
  22. Slivinska K, Kharchenko V, Wroblewski Z, Gawor J, Kuzmina T (2016) Parasitological survey of Polish primitive horses (Equus caballus gmelini Ant.): influence of age, sex and management strategies on the parasite community. Helminthologia 53: 233-242.
  23. Studzińska MB, Demkowska-Kutrzepa M, Bogucki J, Roczeń-Karczmarz M, Tomczuk K (2017) Influence of horse management systems in south-western Poland on the prevalence and intensity of gastrointestinal parasites (in Polish). Med Weter 73: 721-725.
  24. Vadlejch J, Petrtýl M, Zaichenko I, Čadková Z, Jankovská I, Langrová I, Moravec M (2011) Which McMaster egg counting technique is the most reliable. Parasitol Res 109: 1387-1394.
  25. Zak A, Siwinska N, Slowikowska M, Borowicz H, Kubiak K, Hildebrand J, Popiolek M, Niedzwiedz A (2017) Searching for ivermectin resistance in a Strongylidae population of horses stabled in Poland. BMC Vet Res 13: 210.
  26. Zeileis A, Kleiber C, Jackman S (2008) Regression Models for Count Data in R. J Stat Soft 27: 1-25.
Go to article

Authors and Affiliations

W. Hildebrand
1
P. Zielińska
2
J. Hildebrand
3
G. Zaleśny
4

  1. Hirszfeld Institute of Immunology and Experimental Therapy, Polish Academy of Sciences, Rudolfa Weigla 12, 53-114 Wroclaw, Poland
  2. Department of Surgery, Faculty of Veterinary Medicine, Wroclaw University of Environmental and Life Sciences, Plac Grunwaldzki 51, 50-366 Wroclaw, Poland
  3. Department of Parasitology, Faculty of Biological Sciences, University of Wrocław, Przybyszewskiego 63, Wrocław, 51-148, Poland
  4. Department of Invertebrate Systematics and Ecology, Institute of Environmental Biology, Wroclaw University of Environmental and Life Sciences, Kożuchowska 5B, 51-631 Wroclaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

This paper concerns an approach to model the ledger-stand joints of modular scaffolds. Based on the analysis of the working range of the ledger (represented by a linear relationship between load and displacement), two models of the ledger-stand joint are analysed: first – with flexibility joints and second – with rigid joints and with a transition part of lower stiffness. Parameters are selected based on displacement measurements and numerical analyses of joints, then they are verified. On the basis of performed research, it can be stated that both methods of joint modelling recommended in this paper, can be applied in engineering practices.

Go to article

Authors and Affiliations

E. Błazik-Borowa
M. Pieńko
A. Robak
A. Borowa
P. Jamińska-Gadomska
Download PDF Download RIS Download Bibtex

Abstract

The article deals with the automated control of the catalytic cracking process of vacuum gas oil. A functional scheme of automation is proposed, and a computer-integrated control system for the reactor of nanocatalytic petroleum products refining is developed.
Go to article

Authors and Affiliations

K. Alahmad Almou
Download PDF Download RIS Download Bibtex

Abstract

In this paper a mathematical model enabling the analysis of the heat-flow phenomena occurring in the waterwalls of the combustion chambers of the boilers for supercritical parameters is proposed. It is a one-dimensional model with distributed parameters based on the solution of equations describing the conservation laws of mass, momentum, and energy. The purpose of the numerical calculations is to determine the distributions of the fluid enthalpy and the temperature of the waterwall pipes. This temperature should not exceed the calculation temperature for particular category of steel. The derived differential equations are solved using two methods: with the use of the implicit difference scheme, in which the mesh with regular nodes was applied, and using the Runge-Kutta method. The temperature distribution of the waterwall pipes is determined using the CFD. All thermophysical properties of the fluid and waterwall pipes are computed in real-time. The time-spatial heat transfer coefficient distribution is also computed in the on-line mode. The heat calculations for the combustion chamber are carried out with the use of the zone method, thus the thermal load distribution of the waterwalls is known. The time needed for the computations is of great importance when taking into consideration calculations carried out in the on-line mode. A correctly solved one-dimensional model ensures the appropriately short computational time.

Go to article

Authors and Affiliations

Wiesław Zima
Sławomir Grądziel
Artur Cebula
Download PDF Download RIS Download Bibtex

Abstract

This paper aims to present a new equivalent scheme of multi-windings traction transformers, based on multiport purely inductive circuit. The mathematical background of this equivalent scheme is described. The determination of the different scheme elements is made through a finite-elements calculation of both main and leakage inductances, for the case of a four-winding transformer. A procedure is defined, which allows to estimate the values of these elements from some measurements on the transformer at no-load and short-circuit operations. A specific strategy of short-circuit tests is described, allowing to determine all parameters in a rather simple way.

Go to article

Authors and Affiliations

Tadeusz J. Sobczyk
Joseph El Hayek
Download PDF Download RIS Download Bibtex

Abstract

This paper presents a concept of an NxM Matrix Converter (MC) modeling under periodic control strategy patented in Poland. This strategy allows to change an Nphase input system of voltages and current with the frequency fi to the M-phase output system with the frequency fo, maintaining both systems symmetrical and providing small distortions of voltage and current waveforms at rather high frequencies. In this paper the control strategy is extended for dynamic states when one of the frequencies is changed. Matrix converter equations have been derived using the constrain matrix, which is determined by the switch states. The equations have the hybrid form of a multi-port circuit. To simplify these equations the symmetrical components of input and output voltages and currents have been applied. As a result, rather simple equations have been found. They can be interpreted to an equivalent scheme. All considerations are illustrated using an exemplary 6H3 matrix converter.
Go to article

Authors and Affiliations

Tomasz Sieńko
Tadeusz J. Sobczyk
Download PDF Download RIS Download Bibtex

Abstract

In this paper we propose right-angled Artin groups as a platform for secret sharing schemes based on the efficiency (linear time) of the word problem. Inspired by previous work of Grigoriev-Shpilrain in the context of graphs, we define two new problems: Subgroup Isomorphism Problem and Group Homomorphism Problem. Based on them, we also propose two new authentication schemes. For right-angled Artin groups, the Group Homomorphism and Graph Homomorphism problems are equivalent, and the later is known to be NP-complete. In the case of the Subgroup Isomorphism problem, we bring some results due to Bridson who shows there are right-angled Artin groups in which this problem is unsolvable.

Go to article

Authors and Affiliations

Ramón Flores
Delaram Kahrobaei
Download PDF Download RIS Download Bibtex

Abstract

We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
Go to article

Bibliography

[1] A. Boldyreva, ”Threshold signatures, multi-signatures and blind signatures based on the Gap Diffie-Hellman Group signature scheme”, LNCS, vol. 2567, pp. 31-44, 2003.
[2] D. Boneh, C. Gentry, H. Shacham, B. Lynn, ”Short signatures from the Weil pairing”, Journal of Cryptology, vol. 17, no. 4, pp. 297-319, 2004.
[3] D. Boneh, C. Gentry, H. Shacham, B. Lynn, ”Aggregate and verifiably encrypted signatures from bilinear pairing”, Proceedings of Eurocrypt 2003, LNCS 2656, pp. 416-432, 2003.
[4] Y. Desmedt, ”Society and group oriented cryptography”, Crypto 87, pp. 120-127, 1987.
[5] Y. Desmedt, Y. Frankel, ”Threshold cryptosystems”, LNCS, vol. 718, pp. 1-14, 1993.
[6] D. E. Kouicem, A. Bouabdallah, H. Lakhlef, ”Internet of things security: A top-down survey”, 2018
[7] W. Gao, G. Wang, X. Wang, Z. Yang, ”One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings”, Informatica, Vol. 20, No. 4, pp. 461-476, 2009.
[8] K. Itakura, K. Nakamura, ”A public key cryptosystem suitable for digital multisignatures”, NEC Research and Development, pp. 1-8, vol. 71, 1983.
[9] A. Joux, ”A one-round protocol for tripartite Diffie-Hellman”, Journal of Cryptology, vol. 17, no. 4, pp. 263-276, 2004.
[10] S. Kim, S. Park, D. Won, ”Proxy signatures, revisited”, LNCS, vol. 1334, pp. 223-232, 1997.
[11] A. Lysyanskaya, ”Unique signatures and verifiable random functions from the DH-DDH separation”, Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pp. 597-612, 2002.
[12] M. Mambo, K. Usuda, E. Okamoto, ”Proxy signatures for delegating signing operation”, ACM Conference on Computer and Communications Security, pp. 48-57, 1996.
[13] A. Manzoor, M. Liyanagey, A. Braekenz, S. Kanherex, M. Ylianttila, ”Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing”, 2018.
[14] B.C. Neuman, ”Proxy-based authorization and accounting for distributed systems”, Proceedings of the 13th International Conference on Distributed Computing Systems, pp. 283-291, 1993.
[15] K.G. Paterson, ”ID-based signatures from pairings on elliptic curves”, Journals and Magazines, Electronics Letters, Volume: 38 Issue: 18, pp. 1025 - 1026, 2002.
[16] J. Pomykała and T Warchoł, ”Threshold signatures in dynamic groups”, Proceedings of Future Generation Communication and Networking, IEEE Computer Science, pp. 32-37, 2007.
[17] J. Pomykała, B. ´ Zrałek, ”A model of ID-based proxy signature scheme”, Proc. of 6-th Collecter Iberoamerica, pp. 1-8, 2008.
[18] A. Shamir, ”How to share a secret”, Communications of the ACM, 22:612-613, 1979.
[19] N. Suryadevara and S. Mukhopadhyay, ”Internet of things: A review and future perspective” Reliance, 2018.
[20] R. Taylor, D. Baron, and D. Schmidt, ”The world in 2025-predictions for the next ten years”, Microsystems, Packaging, Assembly and Circuits Technology Conference (IMPACT), 2015 10th International. IEEE, pp. 192–195, 2015.
[21] V. Varadharajan, P. Allen, S. Black, ”An analysis of the proxy problem in distributed systems”, Proc. IEEE Computer Society Symposium on Research in Security and Privacy, pp. 255-275, 1991.
[22] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami, ”Blockchain contract: Securing a blockchain applied to smart contracts”, Consumer Electronics (ICCE), 2016 IEEE International Conference on. IEEE, pp. 467–468, 2016.
[23] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, ”An overview of blockchain technology: Architecture, consensus, and future trends”, Big Data (BigData Congress), 2017 IEEE International Congress IEEE, pp. 557–564, 2017.
Go to article

Authors and Affiliations

Jacek Pomykała
1
Henryk Kułakowski
1
Piotr Sapiecha
2
Błażej Grela
1

  1. Warsaw University of Technology, Poland
  2. National Institute of Telecommunications in Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The concept of a hybrid scheme with connection of SIDH and ECDH is nowadays very popular. In hardware implementations it is convenient to use a classical key exchange algorithm, which is based on the same finite field as SIDH. Most frequently used hybrid scheme is SIDH-ECDH. On the other hand, using the same field as in SIDH, one can construct schemes over Fpn, like Diffie-Hellman or XTR scheme, whose security is based on the discrete logarithm problem. In this paper, idea of such schemes will be presented. The security of schemes, which are based on the discrete logarithm problem over fields Fp; Fp2 ; Fp4 ; Fp6 and Fp8 , for primes p used in SIDH, will be analyzed. At the end, the propositions of practical applications of these schemes will be presented.

Go to article

Authors and Affiliations

Michał Wroński
Elżbieta Burek
Łukasz Dzierzkowski
Download PDF Download RIS Download Bibtex

Abstract

The successful application of a multi-clusteringbased neighborhood approach to recommender systems has led to increased recommendation accuracy and the elimination of divergence related to differences in clustering methods traditionally used. The Multi-Clustering Collaborative Filtering algorithm was developed to achieve this, as described in the author’s previous papers. However, utilizing multiple clusters poses challenges regarding memory consumption and scalability. Not all partitionings are equally advantageous, making selecting clusters for the recommender system’s input crucial without compromising recommendation accuracy. This article presents a solution for selecting clustering schemes based on internal indices evaluation. This method can be employed for preparing input data in collaborative filtering recommender systems. The study’s results confirm the positive impact of scheme selection on the overall recommendation performance, as it typically improves after the selection process. Furthermore, a smaller number of clustering schemes used as input for the recommender system enhances scalability and reduces memory consumption. The findings are compared with baseline recommenders’ outcomes to validate the effectiveness of the proposed approach.
Go to article

Authors and Affiliations

Urszula Kużelewska
1

  1. Faculty of Computer Science, Bialystok Uni-versity of Technology, Wiejska 45a, 15-351 Bialystok, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article is devoted to research into the systematization of the structural and semantic types of partially phraseologized sentences. Partially phraseologized sentences have been ascertained to have their functional and communicative purpose in language and speech. The formal and semantic principles of the typology of partially phraseologized sentences have been determined. Structural typologies of partially phraseologized sentences are based on quantitative and morphological criteria. Analyzed have been the structural types of partly phraseologized sentences. Partially phraseologized sentences are formed by two‑, three‑, four‑, and five‑part phrase‑complexes. The semantic types of partially phraseologized sentences are based on the type of syntactic relations between their two parts, depending on which we can single out: 1) sentences with temporal relations; 2) sentences with relations of generalized condition; 3) sentences with explanatory relations; 4) sentences with applicative relations.
Go to article

Authors and Affiliations

Mariia Lychuk
1
ORCID: ORCID

  1. Kyiv, National University of Life and Environmental Sciences of Ukraine
Download PDF Download RIS Download Bibtex

Abstract

Assumptions of the major political and legal documents of the European Union, dedicated to energy efficiency and energy performance of buildings provide the Member States with relevant instruments supporting improvement of the ambient air qualityby dissemination of measures reducing energy demand and promotion of renewable energysources. Mainstreaming EU legislation into national regulations constitutes initial stage of the long term process of supporting implementation of energy efficiency measures. Experience in the improvement of energy performance of the residential buildings revealslimited efficiency of the measures implemented up to date, which results in significantair pollution of Polish cities. The national Action Plans had adopted a limited scope of recommendations included in the EU directives, hence the process meets significant challenges.The article describes adaptation of the relevant EU directives as well as the National Urban Policy in terms of the potential to effectively address faced challenges.

Go to article

Authors and Affiliations

Marcin Włodarski
Download PDF Download RIS Download Bibtex

Abstract

In early 2021, over 5 million European Union (EU) citizens had applied for settled status to secure their right to continue to live, work and study in the United Kingdom (UK) after the country’s withdrawal from the EU (Brexit). In 2018, the Home Office launched a Statement of Intent to implement an application process for EU citizens through its EU Settlement Scheme. In the period leading up to Brexit, the UK gov-ernment assured EU migrants that their existing rights under EU law would remain essentially un-changed and that applying for settled status would be smooth, transparent and simple. However, the application process has resulted in some long-term residents failing to obtain settled status, despite providing the required information. Based on qualitative in-depth interviews with 20 EU migrants living in two major metropolitan areas in Northern England, this article discusses the significant barriers which EU citizens face in the application process. This situation particularly affects the most vulnerable EU mi-grants with limited English-language skills and/or low literacy levels as well as those who are digitally excluded. The study contributes to the growing body of research on the consequences of Brexit for vulner-able EU migrants in the UK, focusing specifically on Central and Eastern European migrants.
Go to article

Authors and Affiliations

Sanna Elfving
1
ORCID: ORCID
Aleksandra Marcinkowska
1
ORCID: ORCID

  1. University of Bradford, the UK
Download PDF Download RIS Download Bibtex

Abstract

The objective of this study is to examine the implementation of a combined scheme involving payment environment services (PES) and non-payment environment services (non-PES) in the management of the Cidanau River Basin. This study used exploratory research to analyse the structure and mechanism of PES and non-PES schemes for the governance system. The Cidanau Watershed governance is a pioneer in sustainable integrated water resources management in Indonesia and has persisted until the present time. The governance of the Cidanau Watershed is dynamic, resilient, and evolving in response to various changes in social and ecological systems. A bridging organisation like the Cidanau Watershed Communication Forum (Ind.: Forum Komunikasi DAS Cidanau – FKDC) requires legal standing to be visible and gain the trust of the public, especially when implementing a PES approach like the Cidanau River Basin, where service buyers utilise non-direct payment mechanisms. The challenging aspect of developing a PES scheme is empowering knowledge regarding the importance of soil and water preservation among upstream communities, particularly in developing countries like Indonesia, where upstream communities are predominantly composed of low-income farmers whose livelihoods depend on nature. The non-PES scheme represents the government’s mandatory responsibility, whereas the PES scheme presents public participation in active collaboration through the FKDC as an ad hoc institution. A combination of the non-PES and PES scheme approach can serve as a model and reference for similar river basin governance frameworks. Further research is needed regarding social networks and institutional development of sustainable watershed governance in the Cidanau River Basin.
Go to article

Authors and Affiliations

Muh. S. Budiarto
1 3
ORCID: ORCID
Ida Widianingsih
2
ORCID: ORCID
Entang A. Muhtar
1
ORCID: ORCID
Raden A. Buchari
2
ORCID: ORCID
Herie Saksono
4
ORCID: ORCID

  1. Universitas Padjadjaran, Faculty of Social and Political Sciences, Jl. Bukit Dago Utara No. 25, 40135, Bandung, Indonesia
  2. Universitas Padjadjaran, Faculty of Social and Political Sciences, Center for Decentralisation and Participatory Development Research, Bandung, Indonesia
  3. Regional Development Planning Agency, Jl. Syeh Nawawi Al Banteni No. 1, 42171, Serang City, Indonesia
  4. National Research and Innovation Agency, Jakarta, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

Multicarrier modulation (MCM) based schemes have been a major contributing factor in revolutionizing cellular networks due to their ability to overcome fading. One of the popular scheme orthogonal frequency division multiple access (OFDMA), having been part of 4G, is also adapted as part of 5G enhanced mobile broadband (eMBB). Though it has several advantages, spectral efficiency (SE) and peak to average power ratio (PAPR) have been two major concerns which have attracted lot of attention resulting in proposals of several other MCM schemes. But most of these studies have treated the two issues independently. This paper in particular studies the subcarrier filtering approach to improve the spectral efficiency of MCM scheme and its impact on the overall PAPR of such schemes. The analysis shows that the PAPR improvement is also achieved by such filters meant for spectral confinement and the simulation results validate the same provoking.
Go to article

Authors and Affiliations

Kiran V. Shanbhag
1
Dayakshini Sathish
2

  1. Dept. of ECE, Anjuman Institute of Technology and Management, Bhatkal and Visvesvaraya Technological University, India
  2. Dept. of ECE, St Joseph Engineering Collegee, Mangaluru and Visvesvaraya Technological University, India
Download PDF Download RIS Download Bibtex

Abstract

In this paper we present a family of transforms that map existentially unforgeable signature schemes to signature schemes being strongly unforgeable. In spite of rising security, the transforms let us make a signature on a union of messages at once. The number of elements in this union depends on the signing algorithm of a scheme being transformed. In addition to that we define an existentially unforgeable signature scheme based on pairings, which satisfies all assumptions of the first part and is able to be subjected to transformation.

Go to article

Authors and Affiliations

Mariusz Jurkiewicz
Download PDF Download RIS Download Bibtex

Abstract

The basic characteristics of debris flows in the Shiwei river basin are summarized through the field investigation on debris flows in the Shiwei river basin and analysis on formation conditions of debris flows from three aspects, i.e. geological environment, geological structure and neotectonic movement, as well as seismic action. Based on this, the stability of landslide in the Shiwei river basin is analyzed and calculated, and the stability coefficient of landslide is obtained. The debris flows in the Shiwei river basin will directly damage and threaten the county town, while other geological disasters such as landslide, collapse, slope sliding & collapse and potentially unstable slopes will indirectly damage and threaten the county town. The landslide form is clear, and the landslide stability calculation shows that the landslide body is generally stable – basically stable, but partially unstable – less stable. The “blocking + discharging” comprehensive control scheme is proposed according to the formation conditions and development characteristics of debris flows in the Shiwei river basin, and the study findings can be used as a reference for similar projects.
Go to article

Authors and Affiliations

Hanhui Wu
1
ORCID: ORCID

  1. Civil Engineering, School of Civil Engineering, Chongqing Chemical Industry Vocational College, 400020 Chongqing, China
Download PDF Download RIS Download Bibtex

Abstract

Due to space limitations during installation, reducing low-frequency noise has always been a challenging area. Sub-wavelength structures are typically favored in such scenarios for noise reduction. This paper explores the potential of micro-slit panels (MSP) for low-frequency sound absorption. To further optimize the panel thickness, coupled MSPs (CMSP) with a distance between two MSPs of less than 1 mm are proposed. Firstly, the low-frequency absorption performances of a single MSP based on two optimized schemes – the cavity-depth optimal scheme (COS) and the panel thickness optimal scheme (TOS) – are examined and compared with those of existing ultrathin metamaterials. The results demonstrate that MSP has significant potential for low frequency sound absorption, and COS allows for a smaller overall structural thickness but a larger panel thickness than TOS. Secondly, to reduce the panel thickness, the CMSP is developed and the theoretical model of its acoustic impedance is established and validated by experiments. Then, based on the theoretical model, the low-frequency absorption potential of CMSP is optimized using COS. The results show that both the overall thickness and the panel thickness of the CMSP absorber are reduced while maintaining better performance. Furthermore, the proposed absorber achieves a subwavelength scale since its total thickness can be as small as 0.138λ.
Go to article

Authors and Affiliations

Yujie Qian
1
Zhengyuan Gao
1
Jie Zhang
1

  1. College of Information Science and Engineering, Hohai University Changzhou, China
Download PDF Download RIS Download Bibtex

Abstract

This paper deals with some aspects of formulation and implementation of a broadband algorithm with build-in analysis of some dispersive media. The construction of the finite element method (FEM) based on direct integration of Maxwell’s equations and solution of some additional convolution integrals is presented. The broadband, fractional model of permittivity is approximated by a set of some relaxation sub-models. The properties of the 3D time-dependent formulation of the FEM algorithm are determined using a benchmark problem with the Cole-Cole and the Davidson-Cole models. Several issues associated with the implementation and some constraints of the broadband finite element algorithm are presented.

Go to article

Authors and Affiliations

Bogusław Butryło
Download PDF Download RIS Download Bibtex

Abstract

This article investigates and evaluates a handover exchange scheme between two secondary users (SUs) moving in different directions across the handover region of neighboring cell in a cognitive radio network. More specifically, this investigation compares the performance of SUs in a cellular cognitive radio network with and without channel exchange scheme. The investigation shows reduced handover failure, blocking, forced and access probabilities respectively, for handover exchange scheme with buffer as compared to exchange scheme without buffer. It also shows transaction within two cognitive nodes within a network region. The system setup is evaluated through system simulation.

Go to article

Authors and Affiliations

Ebenezer Esenogho
Elie N. Mambou
Hendrik C. Ferreira
Download PDF Download RIS Download Bibtex

Abstract

A robust Kalman filter improved with IGG (Institute of Geodesy and Geophysics) scheme is proposed and used to resist the harmful effect of gross error from GPS observation in PPP/INS (precise point positioning/inertial navigation system) tightly coupled positioning. A new robust filter factor is constructed as a three-section function to increase the computational efficiency based on the IGG principle. The results of simulation analysis show that the robust Kalman filter with IGG scheme is able to reduce the filter iteration number and increase efficiency. The effectiveness of new robust filter is demonstrated by a real experiment. The results support our conclusion that the improved robust Kalman filter with IGG scheme used in PPP/INS tightly coupled positioning is able to remove the ill effect of gross error in GPS pseudorange observation. It clearly illustrates that the improved robust Kalman filter is very effective, and all simulated gross errors added to GPS pseudorange observation are successfully detected and modified.

Go to article

Authors and Affiliations

Zengke Li
Yifei Yao
Jian Wang
Jingxiang Gao
Download PDF Download RIS Download Bibtex

Abstract

In this article we construct a finite-difference scheme for the three-dimensional equations of the atmospheric boundary layer. The solvability of the mathematical model is proved and quality properties of the solutions are studied. A priori estimates are derived for the solution of the differential equations. The mathematical questions of the difference schemes for the equations of the atmospheric boundary layer are studied. Nonlinear terms are approximated such that the integral term of the identity vanishes when it is scalar multiplied. This property of the difference scheme is formulated as a lemma. Main a priori estimates for the solution of the difference problem are derived. Approximation properties are investigated and the theorem of convergence of the difference solution to the solution of the differential problem is proved.
Go to article

Authors and Affiliations

Almas N. Temirbekov
Urmashev Baydaulet A.
Konrad Gromaszek
Download PDF Download RIS Download Bibtex

Abstract

In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean function. The provided theoretical and experimental results confirm that the novel scheme can generate output hashes with a good level of security, collision resistance, and protection against most common attacks.

Go to article

Authors and Affiliations

M. Todorova
B. Stoyanov
K. Szczypiorski
W. Graniszewski
K. Kordov

This page uses 'cookies'. Learn more