CINXE.COM
Search results for: local interconnect network
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: local interconnect network</title> <meta name="description" content="Search results for: local interconnect network"> <meta name="keywords" content="local interconnect network"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="local interconnect network" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="local interconnect network"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 9794</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: local interconnect network</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9794</span> Design of Local Interconnect Network Controller for Automotive Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jong-Bae%20Lee">Jong-Bae Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Seongsoo%20Lee"> Seongsoo Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Local interconnect network (LIN) is a communication protocol that combines sensors, actuators, and processors to a functional module in automotive applications. In this paper, a LIN ver. 2.2A controller was designed in Verilog hardware description language (Verilog HDL) and implemented in field-programmable gate array (FPGA). Its operation was verified by making full-scale LIN network with the presented FPGA-implemented LIN controller, commercial LIN transceivers, and commercial processors. When described in Verilog HDL and synthesized in 0.18 μm technology, its gate size was about 2,300 gates. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network" title="local interconnect network">local interconnect network</a>, <a href="https://publications.waset.org/abstracts/search?q=controller" title=" controller"> controller</a>, <a href="https://publications.waset.org/abstracts/search?q=transceiver" title=" transceiver"> transceiver</a>, <a href="https://publications.waset.org/abstracts/search?q=processor" title=" processor"> processor</a> </p> <a href="https://publications.waset.org/abstracts/60861/design-of-local-interconnect-network-controller-for-automotive-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60861.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">288</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9793</span> Optimal Number and Placement of Vertical Links in 3D Network-On-Chip</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nesrine%20Toubaline">Nesrine Toubaline</a>, <a href="https://publications.waset.org/abstracts/search?q=Djamel%20Bennouar"> Djamel Bennouar</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20Mahdoum"> Ali Mahdoum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> 3D technology can lead to a significant reduction in power and average hop-count in Networks on Chip (NoCs). It offers short and fast vertical links which copes with the long wire problem in 2D NoCs. This work proposes heuristic-based method to optimize number and placement of vertical links to achieve specified performance goals. Experiments show that significant improvement can be achieved by using a specific number of vertical interconnect. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interconnect%20optimization" title="interconnect optimization">interconnect optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=monolithic%20inter-tier%20vias" title=" monolithic inter-tier vias"> monolithic inter-tier vias</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20on%20chip" title=" network on chip"> network on chip</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20on%20chip" title=" system on chip"> system on chip</a>, <a href="https://publications.waset.org/abstracts/search?q=through%20silicon%20vias" title=" through silicon vias"> through silicon vias</a>, <a href="https://publications.waset.org/abstracts/search?q=three%20dimensional%20integration%20circuits" title=" three dimensional integration circuits"> three dimensional integration circuits</a> </p> <a href="https://publications.waset.org/abstracts/60164/optimal-number-and-placement-of-vertical-links-in-3d-network-on-chip" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60164.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">303</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9792</span> A Linearly Scalable Family of Swapped Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Richard%20Draper">Richard Draper</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A supercomputer can be constructed from identical building blocks which are small parallel processors connected by a network referred to as the local network. The routers have unused ports which are used to interconnect the building blocks. These connections are referred to as the global network. The address space has a global and a local component (g, l). The conventional way to connect the building blocks is to connect (g, l) to (g’,l). If there are K blocks, this requires K global ports in each router. If a block is of size M, the result is a machine with KM routers having diameter two. To increase the size of the machine to 2K blocks, each router connects to only half of the other blocks. The result is a larger machine but also one with greater diameter. This is a crude description of how the network of the CRAY XC® is designed. In this paper, a family of interconnection networks using routers with K global and M local ports is defined. Coordinates are (c,d, p) and the global connections are (c,d,p)↔(c’,p,d) which swaps p and d. The network is denoted D3(K,M) and is called a Swapped Dragonfly. D3(K,M) has KM2 routers and has diameter three, regardless of the size of K. To produce a network of size KM2 conventionally, diameter would be an increasing function of K. The family of Swapped Dragonflies has other desirable properties: 1) D3(K,M) scales linearly in K and quadratically in M. 2) If L < K, D3(K,M) contains many copies of D3(L,M). 3) If L < M, D3(K,M) contains many copies of D3(K,L). 4) D3(K,M) can perform an all-to-all exchange in KM2+KM time which is only slightly more than the time to do a one-to-all. This paper makes several contributions. It is the first time that a swap has been used to define a linearly scalable family of networks. Structural properties of this new family of networks are thoroughly examined. A synchronizing packet header is introduced. It specifies the path to be followed and it makes it possible to define highly parallel communication algorithm on the network. Among these is an all-to-all exchange in time KM2+KM. To demonstrate the effectiveness of the swap properties of the network of the CRAY XC® and D3(K,16) are compared. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=all-to-all%20exchange" title="all-to-all exchange">all-to-all exchange</a>, <a href="https://publications.waset.org/abstracts/search?q=CRAY%20XC%C2%AE" title=" CRAY XC®"> CRAY XC®</a>, <a href="https://publications.waset.org/abstracts/search?q=Dragonfly" title=" Dragonfly"> Dragonfly</a>, <a href="https://publications.waset.org/abstracts/search?q=interconnection%20network" title=" interconnection network"> interconnection network</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20switching" title=" packet switching"> packet switching</a>, <a href="https://publications.waset.org/abstracts/search?q=swapped%20network" title=" swapped network"> swapped network</a>, <a href="https://publications.waset.org/abstracts/search?q=topology" title=" topology"> topology</a> </p> <a href="https://publications.waset.org/abstracts/79510/a-linearly-scalable-family-of-swapped-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9791</span> Synchronization of Bus Frames during Universal Serial Bus Transfer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Petr%20%C5%A0imek">Petr Šimek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work deals with the problem of synchronization of bus frames during transmission using USB (Universal Serial Bus). The principles for synchronization between USB and the non-deterministic CAN (Controller Area Network) bus will be described here. Furthermore, the work deals with ensuring the time sequence of communication frames when receiving from multiple communication bus channels. The structure of a general object for storing frames from different types of communication buses, such as CAN and LIN (Local Interconnect Network), will be described here. Finally, an evaluation of the communication throughput of bus frames for USB High speed will be performed. The creation of this architecture was based on the analysis of the communication of control units with a large number of communication buses. For the design of the architecture, a test HW with a USB-HS interface was used, which received previously known messages, which were compared with the received result. The result of this investigation is the block architecture of the control program for test HW ensuring correct data transmission via the USB bus. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=analysis" title="analysis">analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=CAN" title=" CAN"> CAN</a>, <a href="https://publications.waset.org/abstracts/search?q=interface" title=" interface"> interface</a>, <a href="https://publications.waset.org/abstracts/search?q=LIN" title=" LIN"> LIN</a>, <a href="https://publications.waset.org/abstracts/search?q=synchronization" title=" synchronization"> synchronization</a>, <a href="https://publications.waset.org/abstracts/search?q=USB" title=" USB"> USB</a> </p> <a href="https://publications.waset.org/abstracts/182107/synchronization-of-bus-frames-during-universal-serial-bus-transfer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182107.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9790</span> Design and Implementation of 2D Mesh Network on Chip Using VHDL</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boudjedra%20Abderrahim">Boudjedra Abderrahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Toumi%20Salah"> Toumi Salah</a>, <a href="https://publications.waset.org/abstracts/search?q=Boutalbi%20Mostefa"> Boutalbi Mostefa</a>, <a href="https://publications.waset.org/abstracts/search?q=Frihi%20Mohammed"> Frihi Mohammed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, using the advancement of technology in semiconductor device fabrication, many transistors can be integrated to a single chip (VLSI). Although the growth chip density potentially eases systems-on-chip (SoCs) integrating thousands of processing element (PE) such as memory, processor, interfaces cores, system complexity, high-performance interconnect and scalable on-chip communication architecture become most challenges for many digital and embedded system designers. Networks-on-chip (NoCs) becomes a new paradigm that makes possible integrating heterogeneous devices and allows many communication constraints and performances. In this paper, we are interested for good performance and low area for implementation and a behavioral modeling of network on chip mesh topology design using VHDL hardware description language with performance evaluation and FPGA implementation results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design" title="design">design</a>, <a href="https://publications.waset.org/abstracts/search?q=implementation" title=" implementation"> implementation</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20system" title=" communication system"> communication system</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20on%20chip" title=" network on chip"> network on chip</a>, <a href="https://publications.waset.org/abstracts/search?q=VHDL" title=" VHDL"> VHDL</a> </p> <a href="https://publications.waset.org/abstracts/3993/design-and-implementation-of-2d-mesh-network-on-chip-using-vhdl" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">378</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9789</span> Signal Integrity Performance Analysis in Capacitive and Inductively Coupled Very Large Scale Integration Interconnect Models</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mudavath%20Raju">Mudavath Raju</a>, <a href="https://publications.waset.org/abstracts/search?q=Bhaskar%20Gugulothu"> Bhaskar Gugulothu</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Rajendra%20Naik"> B. Rajendra Naik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid advances in Very Large Scale Integration (VLSI) technology has resulted in the reduction of minimum feature size to sub-quarter microns and switching time in tens of picoseconds or even less. As a result, the degradation of high-speed digital circuits due to signal integrity issues such as coupling effects, clock feedthrough, crosstalk noise and delay uncertainty noise. Crosstalk noise in VLSI interconnects is a major concern and reduction in VLSI interconnect has become more important for high-speed digital circuits. It is the most effectively considered in Deep Sub Micron (DSM) and Ultra Deep Sub Micron (UDSM) technology. Increasing spacing in-between aggressor and victim line is one of the technique to reduce the crosstalk. Guard trace or shield insertion in-between aggressor and victim is also one of the prominent options for the minimization of crosstalk. In this paper, far end crosstalk noise is estimated with mutual inductance and capacitance RLC interconnect model. Also investigated the extent of crosstalk in capacitive and inductively coupled interconnects to minimizes the same through shield insertion technique. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VLSI" title="VLSI">VLSI</a>, <a href="https://publications.waset.org/abstracts/search?q=interconnects" title=" interconnects"> interconnects</a>, <a href="https://publications.waset.org/abstracts/search?q=signal%20integrity" title=" signal integrity"> signal integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=crosstalk" title=" crosstalk"> crosstalk</a>, <a href="https://publications.waset.org/abstracts/search?q=shield%20insertion" title=" shield insertion"> shield insertion</a>, <a href="https://publications.waset.org/abstracts/search?q=guard%20trace" title=" guard trace"> guard trace</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20sub%20micron" title=" deep sub micron"> deep sub micron</a> </p> <a href="https://publications.waset.org/abstracts/87200/signal-integrity-performance-analysis-in-capacitive-and-inductively-coupled-very-large-scale-integration-interconnect-models" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87200.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">186</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9788</span> Updating Stochastic Hosting Capacity Algorithm for Voltage Optimization Programs and Interconnect Standards</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nicholas%20Burica">Nicholas Burica</a>, <a href="https://publications.waset.org/abstracts/search?q=Nina%20Selak"> Nina Selak </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The ADHCAT (Automated Distribution Hosting Capacity Assessment Tool) was designed to run Hosting Capacity Analysis on the ComEd system via a stochastic DER (Distributed Energy Resource) placement on multiple power flow simulations against a set of violation criteria. The violation criteria in the initial version of the tool captured a limited amount of issues that individual departments design against for DER interconnections. Enhancements were made to the tool to further align with individual department violation and operation criteria, as well as the addition of new modules for use for future load profile analysis. A reporting engine was created for future analytical use based on the simulations and observations in the tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20energy%20resources" title="distributed energy resources">distributed energy resources</a>, <a href="https://publications.waset.org/abstracts/search?q=hosting%20capacity" title=" hosting capacity"> hosting capacity</a>, <a href="https://publications.waset.org/abstracts/search?q=interconnect" title=" interconnect"> interconnect</a>, <a href="https://publications.waset.org/abstracts/search?q=voltage%20optimization" title=" voltage optimization"> voltage optimization</a> </p> <a href="https://publications.waset.org/abstracts/127789/updating-stochastic-hosting-capacity-algorithm-for-voltage-optimization-programs-and-interconnect-standards" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127789.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">190</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9787</span> Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mark%20Davey">Mark Davey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20systems" title="embedded systems">embedded systems</a>, <a href="https://publications.waset.org/abstracts/search?q=multiprocessor" title=" multiprocessor"> multiprocessor</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20on%20chip" title=" network on chip"> network on chip</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel" title=" side channel"> side channel</a> </p> <a href="https://publications.waset.org/abstracts/171019/investigating-message-timing-side-channel-attacks-on-networks-on-chip-with-ring-topology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171019.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9786</span> Performance of Total Vector Error of an Estimated Phasor within Local Area Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Abdolkhalig">Ahmed Abdolkhalig</a>, <a href="https://publications.waset.org/abstracts/search?q=Rastko%20Zivanovic"> Rastko Zivanovic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper evaluates the Total Vector Error of an estimated Phasor as define in IEEE C37.118 standard within different medium access in Local Area Networks (LAN). Three different LAN models (CSMA/CD, CSMA/AMP, and Switched Ethernet) are evaluated. The Total Vector Error of the estimated Phasor has been evaluated for the effect of Nodes Number under the standardized network Band-width values defined in IEC 61850-9-2 communication standard (i.e. 0.1, 1, and 10 Gbps). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phasor" title="phasor">phasor</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20area%20network" title=" local area network"> local area network</a>, <a href="https://publications.waset.org/abstracts/search?q=total%20vector%20error" title=" total vector error"> total vector error</a>, <a href="https://publications.waset.org/abstracts/search?q=IEEE%20C37.118" title=" IEEE C37.118"> IEEE C37.118</a>, <a href="https://publications.waset.org/abstracts/search?q=IEC%2061850" title=" IEC 61850"> IEC 61850</a> </p> <a href="https://publications.waset.org/abstracts/5655/performance-of-total-vector-error-of-an-estimated-phasor-within-local-area-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/5655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9785</span> Suitable Models and Methods for the Steady-State Analysis of Multi-Energy Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Juan%20Jos%C3%A9%20Mesas">Juan José Mesas</a>, <a href="https://publications.waset.org/abstracts/search?q=Luis%20Sainz"> Luis Sainz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The motivation for the development of this paper lies in the need for energy networks to reduce losses, improve performance, optimize their operation and try to benefit from the interconnection capacity with other networks enabled for other energy carriers. These interconnections generate interdependencies between some energy networks and others, which requires suitable models and methods for their analysis. Traditionally, the modeling and study of energy networks have been carried out independently for each energy carrier. Thus, there are well-established models and methods for the steady-state analysis of electrical networks, gas networks, and thermal networks separately. What is intended is to extend and combine them adequately to be able to face in an integrated way the steady-state analysis of networks with multiple energy carriers. Firstly, the added value of multi-energy networks, their operation, and the basic principles that characterize them are explained. In addition, two current aspects of great relevance are exposed: the storage technologies and the coupling elements used to interconnect one energy network with another. Secondly, the characteristic equations of the different energy networks necessary to carry out the steady-state analysis are detailed. The electrical network, the natural gas network, and the thermal network of heat and cold are considered in this paper. After the presentation of the equations, a particular case of the steady-state analysis of a specific multi-energy network is studied. This network is represented graphically, the interconnections between the different energy carriers are described, their technical data are exposed and the equations that have previously been presented theoretically are formulated and developed. Finally, the two iterative numerical resolution methods considered in this paper are presented, as well as the resolution procedure and the results obtained. The pros and cons of the application of both methods are explained. It is verified that the results obtained for the electrical network (voltages in modulus and angle), the natural gas network (pressures), and the thermal network (mass flows and temperatures) are correct since they comply with the distribution, operation, consumption and technical characteristics of the multi-energy network under study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=coupling%20elements" title="coupling elements">coupling elements</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20carriers" title=" energy carriers"> energy carriers</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-energy%20networks" title=" multi-energy networks"> multi-energy networks</a>, <a href="https://publications.waset.org/abstracts/search?q=steady-state%20analysis" title=" steady-state analysis"> steady-state analysis</a> </p> <a href="https://publications.waset.org/abstracts/162363/suitable-models-and-methods-for-the-steady-state-analysis-of-multi-energy-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162363.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">79</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9784</span> Design and Implementation of Campus Wireless Networking for Sharing Resources in Federal Polytechnic Bauchi, Bauchi State, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hassan%20Abubakar">Hassan Abubakar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will serve as a guide to good design and implementation of wireless networking for campus institutions in Nigeria. It can be implemented throughout the primary, secondary and tertiary institutions. This paper describe the some technical functions, standard configurations and layouts of the 802.11 wireless LAN(Local Area Network) that can be implemented across the campus network. The paper also touches upon the wireless infrastructure standards involved with enhanced services, such as voice over wireless and wireless guest hotspot. The paper also touch the benefits derived from implementing campus wireless network and share some lights on how to arrive at the success in increasing the performance of wireless and using the campus wireless to share resources like software applications, printer and documents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=networking" title="networking">networking</a>, <a href="https://publications.waset.org/abstracts/search?q=standards" title=" standards"> standards</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20local%20area%20network%20%28WLAN%29" title=" wireless local area network (WLAN)"> wireless local area network (WLAN)</a>, <a href="https://publications.waset.org/abstracts/search?q=radio%20frequency%20%28RF%29" title=" radio frequency (RF)"> radio frequency (RF)</a>, <a href="https://publications.waset.org/abstracts/search?q=campus" title=" campus"> campus</a> </p> <a href="https://publications.waset.org/abstracts/35431/design-and-implementation-of-campus-wireless-networking-for-sharing-resources-in-federal-polytechnic-bauchi-bauchi-state-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35431.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">416</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9783</span> Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zahra%20Ramezanpanah">Zahra Ramezanpanah</a>, <a href="https://publications.waset.org/abstracts/search?q=Joachim%20Carvallo"> Joachim Carvallo</a>, <a href="https://publications.waset.org/abstracts/search?q=Aurelien%20Rodriguez"> Aurelien Rodriguez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=temporal%20graph%20network" title="temporal graph network">temporal graph network</a>, <a href="https://publications.waset.org/abstracts/search?q=anomaly%20detection" title=" anomaly detection"> anomaly detection</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=IDS" title=" IDS"> IDS</a> </p> <a href="https://publications.waset.org/abstracts/150847/real-time-network-anomaly-detection-systems-based-on-machine-learning-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150847.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">103</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9782</span> Observation of Inverse Blech Length Effect during Electromigration of Cu Thin Film</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nalla%20Somaiah">Nalla Somaiah</a>, <a href="https://publications.waset.org/abstracts/search?q=Praveen%20Kumar"> Praveen Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Scaling of transistors and, hence, interconnects is very important for the enhanced performance of microelectronic devices. Scaling of devices creates significant complexity, especially in the multilevel interconnect architectures, wherein current crowding occurs at the corners of interconnects. Such a current crowding creates hot-spots at the respective corners, resulting in non-uniform temperature distribution in the interconnect as well. This non-uniform temperature distribution, which is exuberated with continued scaling of devices, creates a temperature gradient in the interconnect. In particular, the increased current density at corners and the associated temperature rise due to Joule heating accelerate the electromigration induced failures in interconnects, especially at corners. This has been the classic reliability issue associated with metallic interconnects. Herein, it is generally understood that electromigration induced damages can be avoided if the length of interconnect is smaller than a critical length, often termed as Blech length. Interestingly, the effect of non-negligible temperature gradients generated at these corners in terms of thermomigration and electromigration-thermomigration coupling has not attracted enough attention. Accordingly, in this work, the interplay between the electromigration and temperature gradient induced mass transport was studied using standard Blech structure. In this particular sample structure, the majority of the current is forcefully directed into the low resistivity metallic film from a high resistivity underlayer film, resulting in current crowding at the edges of the metallic film. In this study, 150 nm thick Cu metallic film was deposited on 30 nm thick W underlayer film in the configuration of Blech structure. Series of Cu thin strips, with lengths of 10, 20, 50, 100, 150 and 200 μm, were fabricated. Current density of ≈ 4 × 1010 A/m² was passed through Cu and W films at a temperature of 250ºC. Herein, along with expected forward migration of Cu atoms from the cathode to the anode at the cathode end of the Cu film, backward migration from the anode towards the center of Cu film was also observed. Interestingly, smaller length samples consistently showed enhanced migration at the cathode end, thus indicating the existence of inverse Blech length effect in presence of temperature gradient. A finite element based model showing the interplay between electromigration and thermomigration driving forces has been developed to explain this observation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Blech%20structure" title="Blech structure">Blech structure</a>, <a href="https://publications.waset.org/abstracts/search?q=electromigration" title=" electromigration"> electromigration</a>, <a href="https://publications.waset.org/abstracts/search?q=temperature%20gradient" title=" temperature gradient"> temperature gradient</a>, <a href="https://publications.waset.org/abstracts/search?q=thin%20films" title=" thin films"> thin films</a> </p> <a href="https://publications.waset.org/abstracts/69174/observation-of-inverse-blech-length-effect-during-electromigration-of-cu-thin-film" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69174.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">257</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9781</span> Performance Estimation of Two Port Multiple-Input and Multiple-Output Antenna for Wireless Local Area Network Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Radha%20Tomar">Radha Tomar</a>, <a href="https://publications.waset.org/abstracts/search?q=Satish%20K.%20Jain"> Satish K. Jain</a>, <a href="https://publications.waset.org/abstracts/search?q=Manish%20Panchal"> Manish Panchal</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20S.%20Rathore"> P. S. Rathore</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the presented work, inset fed microstrip patch antenna (IFMPA) based two port MIMO Antenna system has been proposed, which is suitable for wireless local area network (WLAN) applications. IFMPA has been designed, optimized for 2.4 GHz and applied for MIMO formation. The optimized parameters of the proposed IFMPA have been used for fabrication of antenna and two port MIMO in a laboratory. Fabrication of the designed MIMO antenna has been done and tested experimentally for performance parameters like Envelope Correlation Coefficient (ECC), Mean Effective Gain (MEG), Directive Gain (DG), Channel Capacity Loss (CCL), Multiplexing Efficiency (ME) etc and results are compared with simulated parameters extracted with simulated S parameters to validate the results. The simulated and experimentally measured plots and numerical values of these MIMO performance parameters resembles very much with each other. This shows the success of MIMO antenna design methodology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multiple-input%20and%20multiple-output" title="multiple-input and multiple-output">multiple-input and multiple-output</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20local%20area%20network" title=" wireless local area network"> wireless local area network</a>, <a href="https://publications.waset.org/abstracts/search?q=vector%20network%20analyzer" title=" vector network analyzer"> vector network analyzer</a>, <a href="https://publications.waset.org/abstracts/search?q=envelope%20correlation%20coefficient" title=" envelope correlation coefficient"> envelope correlation coefficient</a> </p> <a href="https://publications.waset.org/abstracts/177821/performance-estimation-of-two-port-multiple-input-and-multiple-output-antenna-for-wireless-local-area-network-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/177821.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">55</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9780</span> Monitoring System for Electronic Procurement Systems </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdulah%20Fajar">Abdulah Fajar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=procurement%20system" title="procurement system">procurement system</a>, <a href="https://publications.waset.org/abstracts/search?q=SNMP" title=" SNMP"> SNMP</a>, <a href="https://publications.waset.org/abstracts/search?q=LKPP" title=" LKPP"> LKPP</a>, <a href="https://publications.waset.org/abstracts/search?q=LPSE" title=" LPSE"> LPSE</a> </p> <a href="https://publications.waset.org/abstracts/21800/monitoring-system-for-electronic-procurement-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21800.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">427</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9779</span> Gender Effects in EEG-Based Functional Brain Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahdi%20Jalili">Mahdi Jalili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Functional connectivity in the human brain can be represented as a network using electroencephalography (EEG) signals. Network representation of EEG time series can be an efficient vehicle to understand the underlying mechanisms of brain function. Brain functional networks – whose nodes are brain regions and edges correspond to functional links between them – are characterized by neurobiologically meaningful graph theory metrics. This study investigates the degree to which graph theory metrics are sex dependent. To this end, EEGs from 24 healthy female subjects and 21 healthy male subjects were recorded in eyes-closed resting state conditions. The connectivity matrices were extracted using correlation analysis and were further binarized to obtain binary functional networks. Global and local efficiency measures – as graph theory metrics– were computed for the extracted networks. We found that male brains have a significantly greater global efficiency (i.e., global communicability of the network) across all frequency bands for a wide range of cost values in both hemispheres. Furthermore, for a range of cost values, female brains showed significantly greater right-hemispheric local efficiency (i.e., local connectivity) than male brains. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EEG" title="EEG">EEG</a>, <a href="https://publications.waset.org/abstracts/search?q=brain" title=" brain"> brain</a>, <a href="https://publications.waset.org/abstracts/search?q=functional%20networks" title=" functional networks"> functional networks</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20science" title=" network science"> network science</a>, <a href="https://publications.waset.org/abstracts/search?q=graph%20theory" title=" graph theory"> graph theory</a> </p> <a href="https://publications.waset.org/abstracts/23346/gender-effects-in-eeg-based-functional-brain-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23346.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">443</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9778</span> Impact Assessment of Information Communication, Network Providers, Teledensity, and Consumer Complaints on Gross Domestic Products</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Essang%20Anwana%20Onuntuei">Essang Anwana Onuntuei</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinyere%20Blessing%20Azunwoke"> Chinyere Blessing Azunwoke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study used secondary data from foreign and local organizations to explore major challenges and opportunities abound in Information Communication. The study aimed at exploring the tie between tele density (network coverage area) and the number of network subscriptions, probing if the degree of consumer complaints varies significantly among network providers, and assessing if network subscriptions do significantly influence the sector’s GDP contribution. Methods used for data analysis include Pearson product-moment correlation and regression analysis, and the Analysis of Variance (ANOVA) as well. At a two-tailed test of 0.05 confidence level, the results of findings established about 85.6% of network subscriptions were explained by tele density (network coverage area), and the number of network subscriptions; Consumer Complaints’ degree varied significantly among network providers as 80.158291 (F calculated) > 3.490295 (F critical) with very high confidence associated p-value = 0.000000 which is < 0.05; and finally, 65% of the nation’s GDP was explained by network subscription to show a high association. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tele%20density" title="tele density">tele density</a>, <a href="https://publications.waset.org/abstracts/search?q=subscription" title=" subscription"> subscription</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20coverage" title=" network coverage"> network coverage</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20communication" title=" information communication"> information communication</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer" title=" consumer"> consumer</a> </p> <a href="https://publications.waset.org/abstracts/188468/impact-assessment-of-information-communication-network-providers-teledensity-and-consumer-complaints-on-gross-domestic-products" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188468.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">45</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9777</span> Horizontal-Vertical and Enhanced-Unicast Interconnect Testing Techniques for Network-on-Chip</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mahdiar%20Hosseinghadiry">Mahdiar Hosseinghadiry</a>, <a href="https://publications.waset.org/abstracts/search?q=Razali%20Ismail"> Razali Ismail</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Fotovati"> F. Fotovati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the most important and challenging tasks in testing network-on-chip based system-on-chips (NoC based SoCs) is to verify the communication entity. It is important because of its usage for transferring both data packets and test patterns for intellectual properties (IPs) during normal and test mode. Hence, ensuring of NoC reliability is required for reliable IPs functionality and testing. On the other hand, it is challenging due to the required time to test it and the way of transferring test patterns from the tester to the NoC components. In this paper, two testing techniques for mesh-based NoC interconnections are proposed. The first one is based on one-by-one testing and the second one divides NoC interconnects into three parts, horizontal links of switches in even columns, horizontal links of switches in odd columns and all vertical. A design for testability (DFT) architecture is represented to send test patterns directly to each switch under test and also support the proposed testing techniques by providing a loopback path in each switch. The simulation results shows the second proposed testing mechanism outperforms in terms of test time because this method test all the interconnects in only three phases, independent to the number of existed interconnects in the network, while test time of other methods are highly dependent to the number of switches and interconnects in the NoC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=on%20chip" title="on chip">on chip</a>, <a href="https://publications.waset.org/abstracts/search?q=interconnection%20testing" title=" interconnection testing"> interconnection testing</a>, <a href="https://publications.waset.org/abstracts/search?q=horizontal-vertical%20testing" title=" horizontal-vertical testing"> horizontal-vertical testing</a>, <a href="https://publications.waset.org/abstracts/search?q=enhanced%20unicast" title=" enhanced unicast"> enhanced unicast</a> </p> <a href="https://publications.waset.org/abstracts/16767/horizontal-vertical-and-enhanced-unicast-interconnect-testing-techniques-for-network-on-chip" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16767.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">553</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9776</span> Monitoring of Water Quality Using Wireless Sensor Network: Case Study of Benue State of Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Desmond%20Okorie">Desmond Okorie</a>, <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20Prince"> Emmanuel Prince</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Availability of portable water has been a global challenge especially to the developing continents/nations such as Africa/Nigeria. The World Health Organization WHO has produced the guideline for drinking water quality GDWQ which aims at ensuring water safety from source to consumer. Portable water parameters test include physical (colour, odour, temperature, turbidity), chemical (PH, dissolved solids) biological (algae, plytoplankton). This paper discusses the use of wireless sensor networks to monitor water quality using efficient and effective sensors that have the ability to sense, process and transmit sensed data. The integration of wireless sensor network to a portable sensing device offers the feasibility of sensing distribution capability, on site data measurements and remote sensing abilities. The current water quality tests that are performed in government water quality institutions in Benue State Nigeria are carried out in problematic locations that require taking manual water samples to the institution laboratory for examination, to automate the entire process based on wireless sensor network, a system was designed. The system consists of sensor node containing one PH sensor, one temperature sensor, a microcontroller, a zigbee radio and a base station composed by a zigbee radio and a PC. Due to the advancement of wireless sensor network technology, unexpected contamination events in water environments can be observed continuously. local area network (LAN) wireless local area network (WLAN) and internet web-based also commonly used as a gateway unit for data communication via local base computer using standard global system for mobile communication (GSM). The improvement made on this development show a water quality monitoring system and prospect for more robust and reliable system in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=local%20area%20network" title="local area network">local area network</a>, <a href="https://publications.waset.org/abstracts/search?q=Ph%20measurement" title=" Ph measurement"> Ph measurement</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network" title=" wireless sensor network"> wireless sensor network</a>, <a href="https://publications.waset.org/abstracts/search?q=zigbee" title=" zigbee"> zigbee</a> </p> <a href="https://publications.waset.org/abstracts/91538/monitoring-of-water-quality-using-wireless-sensor-network-case-study-of-benue-state-of-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91538.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">172</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9775</span> Studying Relationship between Local Geometry of Decision Boundary with Network Complexity for Robustness Analysis with Adversarial Perturbations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tushar%20K.%20Routh">Tushar K. Routh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> If inputs are engineered in certain manners, they can influence deep neural networks’ (DNN) performances by facilitating misclassifications, a phenomenon well-known as adversarial attacks that question networks’ vulnerability. Recent studies have unfolded the relationship between vulnerability of such networks with their complexity. In this paper, the distinctive influence of additional convolutional layers at the decision boundaries of several DNN architectures was investigated. Here, to engineer inputs from widely known image datasets like MNIST, Fashion MNIST, and Cifar 10, we have exercised One Step Spectral Attack (OSSA) and Fast Gradient Method (FGM) techniques. The aftermaths of adding layers to the robustness of the architectures have been analyzed. For reasoning, separation width from linear class partitions and local geometry (curvature) near the decision boundary have been examined. The result reveals that model complexity has significant roles in adjusting relative distances from margins, as well as the local features of decision boundaries, which impact robustness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DNN%20robustness" title="DNN robustness">DNN robustness</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20boundary" title=" decision boundary"> decision boundary</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20curvature" title=" local curvature"> local curvature</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20complexity" title=" network complexity"> network complexity</a> </p> <a href="https://publications.waset.org/abstracts/145321/studying-relationship-between-local-geometry-of-decision-boundary-with-network-complexity-for-robustness-analysis-with-adversarial-perturbations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145321.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9774</span> Determinants of the Users Intention of Social-Local-Mobile Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Chen%20Chen">Chia-Chen Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Mu-Yen%20Chen"> Mu-Yen Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SoLoMo%20%28social" title="SoLoMo (social">SoLoMo (social</a>, <a href="https://publications.waset.org/abstracts/search?q=local" title=" local"> local</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20mobile%29" title=" and mobile)"> and mobile)</a>, <a href="https://publications.waset.org/abstracts/search?q=technology%20acceptance%20model" title=" technology acceptance model"> technology acceptance model</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation%20diffusion%20theory" title=" innovation diffusion theory"> innovation diffusion theory</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20externality" title=" network externality"> network externality</a> </p> <a href="https://publications.waset.org/abstracts/13054/determinants-of-the-users-intention-of-social-local-mobile-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">528</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9773</span> An Algorithm to Depreciate the Energy Utilization Using a Bio-Inspired Method in Wireless Sensor Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Navdeep%20Singh%20Randhawa">Navdeep Singh Randhawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Shally%20Sharma"> Shally Sharma </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless Sensor Network is an autonomous technology emanating in the current scenario at a fast pace. This technology faces a number of defiance’s and energy management is one of them, which has a huge impact on the network lifetime. To sustain energy the different types of routing protocols have been flourished. The classical routing protocols are no more compatible to perform in complicated environments. Hence, in the field of routing the intelligent algorithms based on nature systems is a turning point in Wireless Sensor Network. These nature-based algorithms are quite efficient to handle the challenges of the WSN as they are capable of achieving local and global best optimization solutions for the complex environments. So, the main attention of this paper is to develop a routing algorithm based on some swarm intelligent technique to enhance the performance of Wireless Sensor Network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network" title="wireless sensor network">wireless sensor network</a>, <a href="https://publications.waset.org/abstracts/search?q=routing" title=" routing"> routing</a>, <a href="https://publications.waset.org/abstracts/search?q=swarm%20intelligence" title=" swarm intelligence"> swarm intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=MPRSO" title=" MPRSO"> MPRSO</a> </p> <a href="https://publications.waset.org/abstracts/57858/an-algorithm-to-depreciate-the-energy-utilization-using-a-bio-inspired-method-in-wireless-sensor-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57858.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9772</span> System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alicja%20Starczewska">Alicja Starczewska</a>, <a href="https://publications.waset.org/abstracts/search?q=Aleksander%20Nawrat"> Aleksander Nawrat</a>, <a href="https://publications.waset.org/abstracts/search?q=Krzysztof%20Daniec"> Krzysztof Daniec</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaros%C5%82aw%20Homa"> Jarosław Homa</a>, <a href="https://publications.waset.org/abstracts/search?q=Kacper%20Ho%C5%82da"> Kacper Hołda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=BGP" title="BGP">BGP</a>, <a href="https://publications.waset.org/abstracts/search?q=BGP%20hijacking" title=" BGP hijacking"> BGP hijacking</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a> </p> <a href="https://publications.waset.org/abstracts/174286/system-detecting-border-gateway-protocol-anomalies-using-local-and-remote-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174286.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9771</span> Altered Network Organization in Mild Alzheimer's Disease Compared to Mild Cognitive Impairment Using Resting-State EEG</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chia-Feng%20Lu">Chia-Feng Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuh-Jen%20Wang"> Yuh-Jen Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Shin%20Teng"> Shin Teng</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu-Te%20Wu"> Yu-Te Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Sui-Hing%20Yan"> Sui-Hing Yan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Brain functional networks based on resting-state EEG data were compared between patients with mild Alzheimer’s disease (mAD) and matched patients with amnestic subtype of mild cognitive impairment (aMCI). We integrated the time–frequency cross mutual information (TFCMI) method to estimate the EEG functional connectivity between cortical regions and the network analysis based on graph theory to further investigate the alterations of functional networks in mAD compared with aMCI group. We aimed at investigating the changes of network integrity, local clustering, information processing efficiency, and fault tolerance in mAD brain networks for different frequency bands based on several topological properties, including degree, strength, clustering coefficient, shortest path length, and efficiency. Results showed that the disruptions of network integrity and reductions of network efficiency in mAD characterized by lower degree, decreased clustering coefficient, higher shortest path length, and reduced global and local efficiencies in the delta, theta, beta2, and gamma bands were evident. The significant changes in network organization can be used in assisting discrimination of mAD from aMCI in clinical. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EEG" title="EEG">EEG</a>, <a href="https://publications.waset.org/abstracts/search?q=functional%20connectivity" title=" functional connectivity"> functional connectivity</a>, <a href="https://publications.waset.org/abstracts/search?q=graph%20theory" title=" graph theory"> graph theory</a>, <a href="https://publications.waset.org/abstracts/search?q=TFCMI" title=" TFCMI"> TFCMI</a> </p> <a href="https://publications.waset.org/abstracts/13268/altered-network-organization-in-mild-alzheimers-disease-compared-to-mild-cognitive-impairment-using-resting-state-eeg" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">431</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9770</span> Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b, and 802.11g</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amandeep%20Singh%20Dhaliwal">Amandeep Singh Dhaliwal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Networking solutions, particularly wireless local area networks have revolutionized the technological advancement. Wireless Local Area Networks (WLANs) have gained a lot of popularity as they provide location-independent network access between computing devices. There are a number of access methods used in Wireless Networks among which DCF and PCF are the fundamental access methods. This paper emphasizes on the impact of DCF and PCF access mechanisms on the performance of the IEEE 802.11a, 802.11b and 802.11g standards. On the basis of various parameters viz. throughput, delay, load etc performance is evaluated between these three standards using above mentioned access mechanisms. Analysis revealed a superior throughput performance with low delays for 802.11g standard as compared to 802.11 a/b standard using both DCF and PCF access methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DCF" title="DCF">DCF</a>, <a href="https://publications.waset.org/abstracts/search?q=IEEE" title=" IEEE"> IEEE</a>, <a href="https://publications.waset.org/abstracts/search?q=PCF" title=" PCF"> PCF</a>, <a href="https://publications.waset.org/abstracts/search?q=WLAN" title=" WLAN"> WLAN</a> </p> <a href="https://publications.waset.org/abstracts/3167/analyzing-the-impact-of-dcf-and-pcf-on-wlan-network-standards-80211a-80211b-and-80211g" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9769</span> Local Image Features Emerging from Brain Inspired Multi-Layer Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hui%20Wei">Hui Wei</a>, <a href="https://publications.waset.org/abstracts/search?q=Zheng%20Dong"> Zheng Dong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Object recognition has long been a challenging task in computer vision. Yet the human brain, with the ability to rapidly and accurately recognize visual stimuli, manages this task effortlessly. In the past decades, advances in neuroscience have revealed some neural mechanisms underlying visual processing. In this paper, we present a novel model inspired by the visual pathway in primate brains. This multi-layer neural network model imitates the hierarchical convergent processing mechanism in the visual pathway. We show that local image features generated by this model exhibit robust discrimination and even better generalization ability compared with some existing image descriptors. We also demonstrate the application of this model in an object recognition task on image data sets. The result provides strong support for the potential of this model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biological%20model" title="biological model">biological model</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-layer%20neural%20network" title=" multi-layer neural network"> multi-layer neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20recognition" title=" object recognition"> object recognition</a> </p> <a href="https://publications.waset.org/abstracts/25221/local-image-features-emerging-from-brain-inspired-multi-layer-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25221.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">542</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9768</span> Network Security Attacks and Defences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ranbir%20Singh">Ranbir Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepinder%20Kaur"> Deepinder Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=denial" title=" denial"> denial</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticating" title=" authenticating"> authenticating</a> </p> <a href="https://publications.waset.org/abstracts/53007/network-security-attacks-and-defences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9767</span> Bi-Objective Optimization for Sustainable Supply Chain Network Design in Omnichannel</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Veerpaul%20Maan">Veerpaul Maan</a>, <a href="https://publications.waset.org/abstracts/search?q=Gaurav%20Mishra"> Gaurav Mishra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The evolution of omnichannel has revolutionized the supply chain of the organizations by enhancing customer shopping experience. For these organizations need to develop well-integrated multiple distribution channels to leverage the benefits of omnichannel. To adopt an omnichannel system in the supply chain has resulted in structuring and reconfiguring the practices of the traditional supply chain distribution network. In this paper a multiple distribution supply chain network (MDSCN) have been proposed which integrates online giants with a local retailers distribution network in uncertain environment followed by sustainability. To incorporate sustainability, an additional objective function is added to reduce the carbon content through minimizing the travel distance of the product. Through this proposed model, customers are free to access product and services as per their choice of channels which increases their convenience, reach and satisfaction. Further, a numerical illustration is being shown along with interpretation of results to validate the proposed model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sustainable%20supply%20chain%20network" title="sustainable supply chain network">sustainable supply chain network</a>, <a href="https://publications.waset.org/abstracts/search?q=omnichannel" title=" omnichannel"> omnichannel</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20distribution%20supply%20chain%20network" title=" multiple distribution supply chain network"> multiple distribution supply chain network</a>, <a href="https://publications.waset.org/abstracts/search?q=integrate%20multiple%20distribution%20channels" title=" integrate multiple distribution channels"> integrate multiple distribution channels</a> </p> <a href="https://publications.waset.org/abstracts/97719/bi-objective-optimization-for-sustainable-supply-chain-network-design-in-omnichannel" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97719.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">223</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9766</span> Intended and Unintended Outcomes of Partnerships at the Local Level in Slovakia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Klimovsk%C3%BD">Daniel Klimovský</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Slovakia belongs to the most fragmented countries if one looks at its local government structure. The Slovak central governments implemented both broad devolution and fiscal decentralization some decades ago. However, neither territorial consolidation nor size categorization of local competences and powers has been implemented yet. Taking this fact into account, it is clear that the local governments are challenged not only by their citizens as customers but also by effectiveness as well as efficiency of delivered services. The paper is focused on behavior of the local governments in Slovakia and their approaches towards other local partners, including other local governments. Analysis of set of interviews shows that inter-municipal cooperation is the most common local partnership in Slovakia, but due to diversity of the local governments, this kind of cooperation leads to both intended and unintended outcomes. While in many cases the local governments are more efficient as well as effective in delivery of local services thanks to inter-municipal cooperation, there are many cases where inter-municipal cooperation fails, and it brings rather questionable or even negative outcomes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=local%20governments" title="local governments">local governments</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20partnerships" title=" local partnerships"> local partnerships</a>, <a href="https://publications.waset.org/abstracts/search?q=inter-municipal%20cooperation" title=" inter-municipal cooperation"> inter-municipal cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=delivery%20of%20local%20services" title=" delivery of local services"> delivery of local services</a> </p> <a href="https://publications.waset.org/abstracts/81207/intended-and-unintended-outcomes-of-partnerships-at-the-local-level-in-slovakia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81207.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">262</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">9765</span> A Predictive MOC Solver for Water Hammer Waves Distribution in Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Bayle">A. Bayle</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Plourabou%C3%A9"> F. Plouraboué</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Water Distribution Network (WDN) still suffers from a lack of knowledge about fast pressure transient events prediction, although the latter may considerably impact their durability. Accidental or planned operating activities indeed give rise to complex pressure interactions and may drastically modified the local pressure value generating leaks and, in rare cases, pipe’s break. In this context, a numerical predictive analysis is conducted to prevent such event and optimize network management. A couple of Python/FORTRAN 90, home-made software, has been developed using Method Of Characteristic (MOC) solving for water-hammer equations. The solver is validated by direct comparison with theoretical and experimental measurement in simple configurations whilst afterward extended to network analysis. The algorithm's most costly steps are designed for parallel computation. A various set of boundary conditions and energetic losses models are considered for the network simulations. The results are analyzed in both real and frequencies domain and provide crucial information on the pressure distribution behavior within the network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energetic%20losses%20models" title="energetic losses models">energetic losses models</a>, <a href="https://publications.waset.org/abstracts/search?q=method%20of%20characteristic" title=" method of characteristic"> method of characteristic</a>, <a href="https://publications.waset.org/abstracts/search?q=numerical%20predictive%20analysis" title=" numerical predictive analysis"> numerical predictive analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20distribution%20network" title=" water distribution network"> water distribution network</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20hammer" title=" water hammer"> water hammer</a> </p> <a href="https://publications.waset.org/abstracts/141429/a-predictive-moc-solver-for-water-hammer-waves-distribution-in-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=326">326</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=327">327</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=local%20interconnect%20network&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>