The demand for the telecommunication services,such as IP telephony,has increased dramatically during the COVID-19 pandemic lockdown.IP tele-phony should be enhanced to provide the expected quality.One of the issues th...The demand for the telecommunication services,such as IP telephony,has increased dramatically during the COVID-19 pandemic lockdown.IP tele-phony should be enhanced to provide the expected quality.One of the issues that should be investigated in IP telephony is bandwidth utilization.IP telephony pro-duces very small speech samples attached to a large packet header.The header of the IP telephony consumes a considerable share of the bandwidth allotted to the IP telephony.This wastes the network's bandwidth and influences the IP telephony quality.This paper proposes a mechanism(called Smallerize)that reduces the bandwidth consumed by both the speech sample and the header.This is achieved by assembling numerous IP telephony packets in one header and use the header'sfields to carry the speech sample.Several metrics have been used to measure the achievement Smallerize mechanism.The number of calls has been increased by 245.1%compared to the typical mechanism.The bandwidth saving has also reached 68%with the G.28 codec.Therefore,Smallerize is a possible mechanism to enhance bandwidth utilization of the IP telephony.展开更多
Infrastructure as a Service(IaaS)provides logical separation between data,network,applications and machines from the physical constrains of real machines.IaaS is one of the basis of cloud virtualization.Recently,secur...Infrastructure as a Service(IaaS)provides logical separation between data,network,applications and machines from the physical constrains of real machines.IaaS is one of the basis of cloud virtualization.Recently,security issues are also gradually emerging with virtualization of cloud computing.Different security aspects of cloud virtualization will be explored in this research paper,security recognizing potential threats or attacks that exploit these vulnerabilities,and what security measures are used to alleviate such threats.In addition,a dis-cussion of general security requirements and the existing security schemes is also provided.As shown in this paper,different components of virtualization environ-ment are targets to various attacks that in turn leads to security issues compromis-ing the whole cloud infrastructure.In this paper an overview of various cloud security aspects is also provided.Different attack scenarios of virtualization envir-onments and security solutions to cater these attacks have been discussed in the paper.We then proceed to discuss API security concerns,data security,hijacking of user account and other security concerns.The aforementioned discussions can be used in the future to propose assessment criteria,which could be useful in ana-lyzing the efficiency of security solutions of virtualization environment in the face of various virtual environment attacks.展开更多
Industry 4.0, or the Fourth Industrial Revolution, is based on digitized the manufacturing process and makes use of all digital tools so its combination of various digital technologies computers, ERP software, IoT, ma...Industry 4.0, or the Fourth Industrial Revolution, is based on digitized the manufacturing process and makes use of all digital tools so its combination of various digital technologies computers, ERP software, IoT, machine learning and AI techniques, Manufacturing Execution Systems (MES), and big data analytics to create a new, fully digitized manufacturing system. The Critical Success Factors (CSFs) of MES adoption are both a quantitative and qualitative measurement. We use the case of ready-made garments to improve each of the three Overall Equipment Efficiency (OEE) factors: Availability, Performance, and Quality. In this study, we adopt real-time management of production activities on the shop floor from order receipt to finished products, then measure the improvement.展开更多
The human body contains a near-infinite supply of energy in chemical,thermal,and mechanical forms.However,the majority of implantable and wear-able devices are still operated by batteries,whose insufficient capacity a...The human body contains a near-infinite supply of energy in chemical,thermal,and mechanical forms.However,the majority of implantable and wear-able devices are still operated by batteries,whose insufficient capacity and large size limit their lifespan and increase the risk of hazardous material leakage.Such energy can be used to exceed the battery power limits of implantable and wear-able devices.Moreover,novel materials and fabrication methods can be used to create various medical therapies and life-enhancing technologies.This review paper focuses on energy-harvesting technologies used in medical and health applications,primarily power collectors from the human body.Current approaches to energy harvesting from the bodies of living subjects for self-powered electronics are summarized.Using the human body as an energy source encompasses numer-ous topics:thermoelectric generators,power harvesting by kinetic energy,cardi-ovascular energy harvesting,and blood pressure.The review considers various perspectives on future research,which can provide a new forum for advancing new technologies for the diagnosis,treatment,and prevention of diseases by integrating different energy harvesters with advanced electronics.展开更多
文摘The demand for the telecommunication services,such as IP telephony,has increased dramatically during the COVID-19 pandemic lockdown.IP tele-phony should be enhanced to provide the expected quality.One of the issues that should be investigated in IP telephony is bandwidth utilization.IP telephony pro-duces very small speech samples attached to a large packet header.The header of the IP telephony consumes a considerable share of the bandwidth allotted to the IP telephony.This wastes the network's bandwidth and influences the IP telephony quality.This paper proposes a mechanism(called Smallerize)that reduces the bandwidth consumed by both the speech sample and the header.This is achieved by assembling numerous IP telephony packets in one header and use the header'sfields to carry the speech sample.Several metrics have been used to measure the achievement Smallerize mechanism.The number of calls has been increased by 245.1%compared to the typical mechanism.The bandwidth saving has also reached 68%with the G.28 codec.Therefore,Smallerize is a possible mechanism to enhance bandwidth utilization of the IP telephony.
文摘Infrastructure as a Service(IaaS)provides logical separation between data,network,applications and machines from the physical constrains of real machines.IaaS is one of the basis of cloud virtualization.Recently,security issues are also gradually emerging with virtualization of cloud computing.Different security aspects of cloud virtualization will be explored in this research paper,security recognizing potential threats or attacks that exploit these vulnerabilities,and what security measures are used to alleviate such threats.In addition,a dis-cussion of general security requirements and the existing security schemes is also provided.As shown in this paper,different components of virtualization environ-ment are targets to various attacks that in turn leads to security issues compromis-ing the whole cloud infrastructure.In this paper an overview of various cloud security aspects is also provided.Different attack scenarios of virtualization envir-onments and security solutions to cater these attacks have been discussed in the paper.We then proceed to discuss API security concerns,data security,hijacking of user account and other security concerns.The aforementioned discussions can be used in the future to propose assessment criteria,which could be useful in ana-lyzing the efficiency of security solutions of virtualization environment in the face of various virtual environment attacks.
文摘Industry 4.0, or the Fourth Industrial Revolution, is based on digitized the manufacturing process and makes use of all digital tools so its combination of various digital technologies computers, ERP software, IoT, machine learning and AI techniques, Manufacturing Execution Systems (MES), and big data analytics to create a new, fully digitized manufacturing system. The Critical Success Factors (CSFs) of MES adoption are both a quantitative and qualitative measurement. We use the case of ready-made garments to improve each of the three Overall Equipment Efficiency (OEE) factors: Availability, Performance, and Quality. In this study, we adopt real-time management of production activities on the shop floor from order receipt to finished products, then measure the improvement.
文摘The human body contains a near-infinite supply of energy in chemical,thermal,and mechanical forms.However,the majority of implantable and wear-able devices are still operated by batteries,whose insufficient capacity and large size limit their lifespan and increase the risk of hazardous material leakage.Such energy can be used to exceed the battery power limits of implantable and wear-able devices.Moreover,novel materials and fabrication methods can be used to create various medical therapies and life-enhancing technologies.This review paper focuses on energy-harvesting technologies used in medical and health applications,primarily power collectors from the human body.Current approaches to energy harvesting from the bodies of living subjects for self-powered electronics are summarized.Using the human body as an energy source encompasses numer-ous topics:thermoelectric generators,power harvesting by kinetic energy,cardi-ovascular energy harvesting,and blood pressure.The review considers various perspectives on future research,which can provide a new forum for advancing new technologies for the diagnosis,treatment,and prevention of diseases by integrating different energy harvesters with advanced electronics.