For the recipe below adjust the recipe from 17 gallons to 70 gallons. Convert all ingredients to pounds (show work) before applying the percentage. Report the percentage; you can do this in decimals. Report the adjusted ingredients in pounds and oz. Example 1.5 pounds = 1 pound and 8 oz.
There are 111 oz in a 10# can of tomato paste
Yield: 17 gallons (one gallon = 42 3 oz servings)
Ground Beef, fine 85/15
8, 10 pounds chubs
Flour
9 1/2 C
Corn Starch
5 pounds
Chili Powder, ground
7 C
Cumin, ground
1 1/2 C
Black Pepper, ground
3/4 C
Onion Poser
7 C
Salt
1 C
Garlic Powder
2 1/2 C
Tomato Paste
3, 10# Can
Water
8 gal
MN610Virtual Private NetworksPage 3 of total pages
Assessment Details and Submission Guidelines
Trimester
T2, 2018
Unit Code
MN610
Unit Title
Virtual Private Networks
Assessment Author
Dr Ammar Alazab
Assessment Type
Individual (Assignment 1)
Assessment Title
Assignment 1 – VPN Technologies and Security issues
Unit Learning Outcomes covered in this assessment
Students should be able to demonstrate their achievements in the following unit learning outcomes:
a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.
b.Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations
Weight
15% of Total Assessment
Total Marks
100
Word limit
See instructions
Due Date
6:00 PM, Wednesday 29 August 2018 (Week 7)
Submission Guidelines
· All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively.
Extension
· If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
· Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure.For further information, please r.
Hierarchy of management that covers different levels of management
For the recipe below adjust the recipe from 17 gallons to 70 gal.docx
1. For the recipe below adjust the recipe from 17 gallons to 70
gallons. Convert all ingredients to pounds (show work) before
applying the percentage. Report the percentage; you can do this
in decimals. Report the adjusted ingredients in pounds and oz.
Example 1.5 pounds = 1 pound and 8 oz.
There are 111 oz in a 10# can of tomato paste
Yield: 17 gallons (one gallon = 42 3 oz servings)
Ground Beef, fine 85/15
8, 10 pounds chubs
Flour
9 1/2 C
Corn Starch
5 pounds
Chili Powder, ground
7 C
Cumin, ground
1 1/2 C
Black Pepper, ground
3/4 C
Onion Poser
7 C
Salt
1 C
Garlic Powder
2 1/2 C
Tomato Paste
3, 10# Can
Water
8 gal
2. MN610Virtual Private NetworksPage 3 of total pages
Assessment Details and Submission Guidelines
Trimester
T2, 2018
Unit Code
MN610
Unit Title
Virtual Private Networks
Assessment Author
Dr Ammar Alazab
Assessment Type
Individual (Assignment 1)
Assessment Title
Assignment 1 – VPN Technologies and Security issues
Unit Learning Outcomes covered in this assessment
Students should be able to demonstrate their achievements in
the following unit learning outcomes:
a. Analyse and discuss the significance of VPN for
contemporary organisations and how it addresses their concerns
and security issues.
b.Explain the role of VPN, its limitations and works done to
address these limitations as well as
to supporting the security of businesses and corporations
Weight
15% of Total Assessment
Total Marks
100
Word limit
See instructions
Due Date
6:00 PM, Wednesday 29 August 2018 (Week 7)
Submission Guidelines
3. · All work must be submitted on Moodle by the due date along
with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-
pt Calibri (Body) font and 2 cm margins on all four sides of
your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and
listed appropriately at the end in a reference list using APA or
IEEE referencing style for School of Business and School of
Information Technology and Engineering respectively.
Extension
· If an extension of time to submit work is required, a Special
Consideration Application must be submitted directly to the
School's Administration Officer, in Melbourne on Level 6 or in
Sydney on Level 7. You must submit this application three
working days prior to the due date of the assignment. Further
information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
· Academic Misconduct is a serious offence. Depending on the
seriousness of the case, penalties can vary from a written
warning or zero marks to exclusion from the course or
rescinding the degree. Students should make themselves
familiar with the full policy and procedure available
at:http://www.mit.edu.au/about-mit/institute-
publications/policies-procedures-and-guidelines/Plagiarism-
Academic-Misconduct-Policy-Procedure.For further
information, please refer to the Academic Integrity Section in
your Unit Description.
Assignment Description
4. Tasks:
There are two parts to this assignment, i.e. part A and part B.
A. Write a review article for the following topics depending on
the last digit of your ID: select Topic 1 if it ends in an ‘odd’
number or Topic 2 if it ends in an ‘even’ number.90 marks
B. Presentation
10 marks
Part A description:
1. Topic 1 - Significance of VPN for contemporary
organisations that have branches nationally and internationally
A virtual private network uses a public network’s infrastructure
to make the connections among geographically dispersed nodes,
instead of using cables owned or leased exclusively for one
single network’s use, eg using of network that as is typical for a
wide area network (WAN). To the user, a VPN looks like a
private network, even though it shares the network with other
users. There are several uses for a VPN. Analyse and discuss
the significance of VPN for these contemporary organisations.
List the concerns of contemporary organizations in
communicating among their employees and clients, and
comment if VPN can address their concerns. Discuss how VPN
can be advantageous for securing computer communications.
Address the issue of VPN security in details as described in
section 3.
2. Topic 2 – VPN Replacement Technologies
Legacy VPNs has had some major drawbacks and problems such
as the ones described below. There have been attempts to
resolve the issues, and some technologies are being deployed as
alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc.
List the limitations/problems existed in legacy VPNs and review
alternative options to resolve and overcome the problems of
legacy VPNs. Address the issue of VPN security in details as
described in section 3.
5. Common Part – VPN Security Issues
Fundamentally, VPN is known as being secure and safe;
however, there are still many issues with regards to security
aspects. A simple Google search of ‘VPN security’ displays 135
million results. Search the internet for relevant articles/papers,
and compare and analyze what these security issues are and
what solutions they propose.
· http://www.pcworld.com/article/2943472/vpn-users-beware-
you-may-not-be-as-safe-as-you-think-you-are.html
· https://www.digitaltrends.com/computing/commercial-vpn-
huge-security-flaws/
· https://security.stackexchange.com/questions/89017/what-are-
security-risks-of-connecting-to-my-home-vpn-from-my-work
· https://www.sans.org/reading-room/whitepapers/vpns/remote-
access-vpn-security-concerns-policy-enforcement-881
Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template
for the format.
https://www.ieee.org/publications_standards/publications/author
s/author_templates.html
2. Another link for the template:
https://www.ieee.org/publications_standards/publications/journ
mag/ieee_tj_template_17.pdf
3. Read and familiarize yourself with the instructions carefully.
4. Prepare a paper using the IEEE format and the example
attached. Follow the template if there are any confusions. Also,
refer to the link below to have ideas how to start (see section 6).
(https://www.ieee.org/publications_standards/publications/autho
rs/author_guide_interactive.pdf)
5. Complete the assignment (minimum 5 and maximum 8 pages)
including all the sections below. The number of words will be
counted thoroughly and you must keep the minimum number of
words to avoid any penalties.
6. · Title (maximum 15 words)
· Abstract (200 – 250 words)
· Introduction (500 – 1000 words)
· Literature Review (500 – 1000 words)
· Main body (1000 – 1500 words)
· Conclusion (200 – 300 words)
· Future Works (150 – 300 words)
· References (minimum 10 references)
6. The article must be a ‘Review’[footnoteRef:1] article
including at least 5 references and not more than 25. [1: See
http://www.editage.com/insights/6-article-types-that-journals-
publish-a-guide-for-early-career-researchers]
7. Strictly follow the IEEE reference format for in-body
citations and the references section.
8. See the attached files for guidance on how to prepare a
review paper. You can also find thorough instructions from
IEEE and the Internet.
9. Contents must include:
· History and background of the topic
· What are the challenges and drawbacks, what solutions and
workouts they found
· Possible options (solutions) and future research areas
proposed
· Scopes of topic, progress of developments such as
requirements, benchmarking, purposes & objectives,
stakeholders, owners, roles and responsibilities where
applicable.
· Flowchart
· Include a minimum of two (2) figures to show the overall
concept and summarized overview of the topic from the review
of minimum 10 – 15 (but not limited to) papers.
· Include a couple of tables to summarize the result of findings
· How each organization approaches, initiates, develops
procedures and ownerships, and what results they got, and how
it affected their businesses.
7. · What you conclude in terms of the topic/solutions to
implement in an organization. Consider other aspects to include
for a good review paper.
10. Remember to strictly follow the template and the
instructions above to avoid penalties.
Part B description:
Prepare slides (between 5 – 10 slides) for presentation during
the lab class. Read the instruction attached carefully.
Marking criteria:
Example of marking criteria is shown in following table. Marks
are allocated as follows:
Note: The marking criteria varies for each assignment
Section to be included in the report
Detailed Description of the Criteria
Marks
Conforming to the template and format
No marks will be given and severe penalties will apply for any
breach of the format and template. Fonts, sizes, spacing,
captions, headings etc. will also be checked thoroughly. Be
thorough and follow fully when using the template and format
instruction to avoid penalties.
10
Figures and tables created
They should be created yourself and not copied from elsewhere.
For full marks you should create at least 2 figures and 2 tables.
20
Main sections
8. Main body structures and contents quality including word limit.
40
Literature review
Severe penalties apply for simple listing and describing. It
should be a logically support analysis that reaches the review
conclusion that should be included at the end of the section.
Check word limit.
10
In body citation
Strictly follow the order and instruction by IEEE. Check
when/where to put the citation. See attached files and search the
internet for guidelines
5
References section
Check whether they follow the instruction. Otherwise, no marks
will be provided
5
Presentation
Presentation skills and materials quality
10
Total
100
Example Marking Rubric for Assignment #: Total Marks 100
Note: The marking criteria varies for each assignment
Marking Rubric Criteria/ Grades
High Distinction (HD) [Excellent]
>80%
Distinction (D) [Very Good]
70%-80%
Credits
(C) [Good]
60%-70%
Pass (P) [Satisfactory]
50%-60%
Fail (N) [Unsatisfactory]
9. <50%
Criteria 1
Concise and specific to the project
Topics are relevant and soundly analysed.
Generally relevant and analysed.
Some relevance and briefly presented.
This is not relevant to the assignment topic.
Criteria 2
Demonstrated excellent ability to think critically and sourced
reference material appropriately
Demonstrated excellent ability to think critically but did not
source reference material appropriately
Demonstrated ability to think critically and sourced reference
material appropriately
Demonstrated ability to think critically and did not source
reference material appropriately
Did not demonstrate ability to think critically and did not
source reference material appropriately
Criteria 3
Demonstrated excellent ability to think critically and sourced
reference material appropriately
Demonstrated excellent ability to think critically but did not
source reference material appropriately
Demonstrated ability to think critically and sourced reference
material appropriately
Demonstrated ability to think critically and did not source
reference material appropriately
Did not demonstrate ability to think critically and did not
10. source reference material appropriately
Criteria 4
All elements are present and very well integrated.
Components present with good cohesive
Components present and mostly well integrated
Most components present
Proposal lacks structure.
Criteria 5
Logic is clear and easy to follow with strong arguments
Consistency logical and convincing
Mostly consistent logical and convincing
Adequate cohesion and conviction
Argument is confused and disjointed
Criteria 6
Clear styles with excellent source of references.
Clear referencing style
Generally good referencing style
Sometimes clear referencing style
Lacks consistency with many errors
Prepared by: Dr. Ammar Alazab Moderated by: Dr Tony
JanJuly, 2018
Prepared by: Dr. Ammar Alazab Moderated by: Dr Tony
JanJuly, 2018
ieee_tj_template_17
.docx
[footnoteRef:1] [1: This paragraph of the first footnote will
11. contain the date on which you submitted your paper for review.
It will also contain support information, including sponsor and
financial support acknowledgment. For example, “This work
was supported in part by the U.S. Department of Commerce
under Grant BS123456.”
The next few paragraphs should contain the authors’ current
affiliations, including current address and e-mail. For example,
F. A. Author is with the National Institute of Standards and
Technology, Boulder, CO 80305 USA (e-mail: [email protected]
boulder.nist.gov).
S. B. Author, Jr., was with Rice University, Houston, TX 77005
USA. He is now with the Department of Physics, Colorado State
University, Fort Collins, CO 80523 USA (e-mail:
[email protected]).
T. C. Author is with the Electrical Engineering Department,
University of Colorado, Boulder, CO 80309 USA, on leave from
the National Research Institute for Metals, Tsukuba, Japan (e-
mail: [email protected]).]
Preparation of Papers for IEEE TRANSACTIONS and
JOURNALS(February 2017)
First A. Author, Fellow, IEEE, Second B. Author, and Third C.
Author, Jr., Member, IEEE
Abstract—These instructions give you guidelines for preparing
papers for IEEE Transactions and Journals. Use this document
as a template if you are using Microsoft Word 6.0 or later.
Otherwise, use this document as an instruction set. The
electronic file of your paper will be formatted further at IEEE.
Paper titles should be written in uppercase and lowercase
letters, not all uppercase. Avoid writing long formulas with
subscripts in the title; short formulas that identify the elements
are fine (e.g., "Nd–Fe–B"). Do not write “(Invited)” in the title.
Full names of authors are preferred in the author field, but are
not required. Put a space between authors’ initials. The abstract
must be a concise yet comprehensive reflection of what is in
your article. In particular, the abstract must be self-contained,
without abbreviations, footnotes, or references. It should be a
12. microcosm of the full article. The abstract must be between
150–250 words. Be sure that you adhere to these limits;
otherwise, you will need to edit your abstract accordingly. The
abstract must be written as one paragraph, and should not
contain displayed mathematical equations or tabular material.
The abstract should include three or four different keywords or
phrases, as this will help readers to find it. It is important to
avoid over-repetition of such phrases as this can result in a page
being rejected by search engines. Ensure that your abstract
reads well and is grammatically correct.
Index Terms—Enter key words or phrases in alphabetical order,
separated by commas. For a list of suggested keywords, send a
blank e-mail to [email protected] or visit
http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt
INTRODUCTION
T
HIS document is a template for Microsoft Word versions 6.0 or
later. If you are reading a paper or PDF version of this
document, please download the electronic file,
trans_jour.docx, from the IEEE Web site at
www.ieee.org/authortools so you can use it to prepare your
manuscript. If you would prefer to use LaTeX, download
IEEE’s LaTeX style and sample files from the same Web page.
You can also explore using the Overleaf editor at
https://www.overleaf.com/blog/278-how-to-use-overleaf-with-
ieee-collabratec-your-quick-guide-to-getting-
started#.Vp6tpPkrKM9
If your paper is intended for a conference, please contact your
conference editor concerning acceptable word processor formats
for your particular conference. Guidelines For Manuscript
Preparation
When you open trans_jour.docx, select “Page Layout” from the
“View” menu in the menu bar (View | Page Layout), (these
instructions assume MS 6.0. Some versions may have alternate
ways to access the same functionalities noted here). Then, type
13. over sections of trans_jour.docx or cut and paste from another
document and use markup styles. The pull-down style menu is
at the left of the Formatting Toolbar at the top of your Word
window (for example, the style at this point in the document is
“Text”). Highlight a section that you want to designate with a
certain style, and then select the appropriate name on the style
menu. The style will adjust your fonts and line spacing. Do not
change the font sizes or line spacing to squeeze more text into a
limited number of pages.Use italics for emphasis; do not
underline.
To insert images in Word, position the cursor at the insertion
point and either use Insert | Picture | From File or copy the
image to the Windows clipboard and then Edit | Paste Special |
Picture (with “float over text” unchecked).
IEEE will do the final formatting of your paper. If your paper is
intended for a conference, please observe the conference page
limits.
Abbreviations and Acronyms
Define abbreviations and acronyms the first time they are used
in the text, even after they have already been defined in the
abstract. Abbreviations such as IEEE, SI, ac, and dc do not have
to be defined. Abbreviations that incorporate periods should not
have spaces: write “C.N.R.S.,” not “C. N. R. S.” Do not use
abbreviations in the title unless they are unavoidable (for
example, “IEEE” in the title of this article).
Other Recommendations
Use one space after periods and colons. Hyphenate complex
modifiers: “zero-field-cooled magnetization.” Avoid dangling
participles, such as, “Using (1), the potential was calculated.”
[It is not clear who or what used (1).] Write instead, “The
potential was calculated by using (1),” or “Using (1), we
calculated the potential.”
Use a zero before decimal points: “0.25,” not “.25.” Use “cm3,”
14. not “cc.” Indicate sample dimensions as “0.1 cm 0.2 cm,” not
“0.1 0.2 cm2.” The abbreviation for “seconds” is “s,” not
“sec.” Use “Wb/m2” or “webers per square meter,” not
“webers/m2.” When expressing a range of values, write “7 to 9”
or “7-9,” not “7~9.”
A parenthetical statement at the end of a sentence is punctuated
outside of the closing parenthesis (like this). (A parenthetical
sentence is punctuated within the parentheses.) In American
English, periods and commas are within quotation marks, like
“this period.” Other punctuation is “outside”! Avoid
contractions; for example, write “do not” instead of “don’t.”
The serial comma is preferred: “A, B, and C” instead of “A, B
and C.”
If you wish, you may write in the first person singular or plural
and use the active voice (“I observed that ...” or “We observed
that ...” instead of “It was observed that ...”). Remember to
check spelling. If your native language is not English, please
get a native English-speaking colleague to carefully proofread
your paper.MATH
If you are using Word, use either the Microsoft Equation Editor
or the MathType add-on (http://www.mathtype.com) for
equations in your paper (Insert | Object | Create New | Microsoft
Equation or MathType Equation). “Float over text” should not
be selected.
Equations
Number equations consecutively with equation numbers in
parentheses flush with the right margin, as in (1). First use the
equation editor to create the equation. Then select the
“Equation” markup style. Press the tab key and write the
equation number in parentheses. To make your equations more
compact, you may use the solidus ( / ), the exp function, or
appropriate exponents. Use parentheses to avoid ambiguities in
denominators. Punctuate equations when they are part of a
sentence, as in
15. (1)
Be sure that the symbols in your equation have been defined
before the equation appears or immediately following. Italicize
symbols (T might refer to temperature, but T is the unit tesla).
Refer to “(1),” not “Eq. (1)” or “equation (1),” except at the
beginning of a sentence: “Equation (1) is ... .”Units
Use either SI (MKS) or CGS as primary units. (SI units are
strongly encouraged.) English units may be used as secondary
units (in parentheses). This applies to papers in data storage.
For example, write “15 Gb/cm2 (100 Gb/in2).” An exception is
when English units are used as identifiers in trade, such as “3½-
in disk drive.” Avoid combining SI and CGS units, such as
current in amperes and magnetic field in oersteds. This often
leads to confusion because equations do not balance
dimensionally. If you must use mixed units, clearly state the
units for each quantity in an equation.
The SI unit for magnetic field strength H is A/m. However, if
you wish to use units of T, either refer to magnetic flux density
B or magnetic field strength symbolized as µ0H. Use the center
dot to separate compound units, e.g., “A·m2.”Some Common
Mistakes
The word “data” is plural, not singular. The subscript for the
permeability of vacuum µ0 is zero, not a lowercase letter “o.”
The term for residual magnetization is “remanence”; the
adjective is “remanent”; do not write “remnance” or “remnant.”
Use the word “micrometer” instead of “micron.” A graph within
a graph is an “inset,” not an “insert.” The word “alternatively”
is preferred to the word “alternately” (unless you really mean
something that alternates). Use the word “whereas” instead of
“while” (unless you are referring to simultaneous events). Do
not use the word “essentially” to mean “approximately” or
“effectively.” Do not use the word “issue” as a euphemism for
“problem.” When compositions are not specified, separate
chemical symbols by en-dashes; for example, “NiMn” indicates
the intermetallic compound Ni0.5Mn0.5 whereas “Ni–Mn”
16. indicates an alloy of some composition NixMn1-x.
Be aware of the different meanings of the homophones “affect”
(usually a verb) and “effect” (usually a noun), “complement”
and “compliment,” “discreet” and “discrete,” “principal” (e.g.,
“principal investigator”) and “principle” (e.g., “principle of
measurement”). Do not confuse “imply” and “infer.”
Prefixes such as “non,” “sub,” “micro,” “multi,” and “ultra” are
not independent words; they should be joined to the words they
modify, usually without a hyphen. There is no period after the
“et” in the Latin abbreviation “et al.” (it is also italicized). The
abbreviation “i.e.,” means “that is,” and the abbreviation “e.g.,”
means “for example” (these abbreviations are not italicized).
A general IEEE styleguide is available at
www.ieee.org/authortools.
Fig. 1. Magnetization as a function of applied field. Note that
“Fig.” is abbreviated. There is a period after the figure number,
followed by two spaces. It is good practice to explain the
significance of the figure in the caption.
TABLE I
Units for Magnetic Properties
Vertical lines are optional in tables. Statements that serve as
captions for the entire table do not need footnote letters.
aGaussian units are the same as cg emu for magnetostatics; Mx
= maxwell, G = gauss, Oe = oersted; Wb = weber, V = volt, s =
second, T = tesla, m = meter, A = ampere, J = joule, kg =
kilogram, H = henry.
Guidelines for Graphics Preparation
and Submission
Types of Graphics
The following list outlines the different types of graphics
published in IEEE journals. They are categorized based on their
construction, and use of color / shades of gray:
17. Color/Grayscale figures
Figures that are meant to appear in color, or shades of
black/gray. Such figures may include photographs,
illustrations, multicolor graphs, and flowcharts.
Line Art figuresFigures that are composed of only black lines
and shapes. These figures should have no shades or half-tones
of gray, only black and white.
Author photosHead and shoulders shots of authors that appear at
the end of our papers.
Tables
Data charts which are typically black and white, but sometimes
include color.
Multipart figures
Figures compiled of more than one sub-figure presented side-
by-side, or stacked. If a multipart figure is made up of multiple
figure types (one part is lineart, and another is grayscale or
color) the figure should meet the stricter guidelines.
File Formats For Graphics
Format and save your graphics using a suitable graphics
processing program that will allow you to create the images as
PostScript (PS), Encapsulated PostScript (.EPS), Tagged Image
File Format (.TIFF), Portable Document Format (.PDF), or
Portable Network Graphics (.PNG) sizes them, and adjusts the
resolution settings. If you created your source files in one of the
following programs you will be able to submit the graphics
without converting to a PS, EPS, TIFF, PDF, or PNG file:
Microsoft Word, Microsoft PowerPoint, or Microsoft Excel.
Though it is not required, it is strongly recommended that these
18. files be saved in PDF format rather than DOC, XLS, or PPT.
Doing so will protect your figures from common font and arrow
stroke issues that occur when working on the files across
multiple platforms. When submitting your final paper, your
graphics should all be submitted individually in one of these
formats along with the manuscript.
Sizing of Graphics
Most charts, graphs, and tables are one column wide (3.5 inches
/ 88 millimeters / 21 picas) or page wide (7.16 inches / 181
millimeters / 43 picas). The maximum depth a graphic can be is
8.5 inches (216 millimeters / 54 picas). When choosing the
depth of a graphic, please allow space for a caption. Figures can
be sized between column and page widths if the author chooses,
however it is recommended that figures are not sized less than
column width unless when necessary.
There is currently one publication with column measurements
that do not coincide with those listed above. Proceedings of the
IEEE has a column measurement of 3.25 inches (82.5
millimeters / 19.5 picas).
The final printed size of author photographs is exactly
1 inch wide by 1.25 inches tall (25.4 millimeters x 31.75
millimeters / 6 picas x 7.5 picas). Author photos printed in
editorials measure 1.59 inches wide by 2 inches tall (40
millimeters x 50 millimeters / 9.5 picas x 12 picas).
Resolution
The proper resolution of your figures will depend on the type of
figure it is as defined in the “Types of Figures” section. Author
photographs, color, and grayscale figures should be at least
300dpi. Line art, including tables should be a minimum of
600dpi.
Vector Art
In order to preserve the figures’ integrity across multiple
computer platforms, we accept files in the following formats:
19. .EPS/.PDF/.PS. All fonts must be embedded or text converted to
outlines in order to achieve the best-quality results.
Color Space
The term color space refers to the entire sum of colors that can
be represented within the said medium. For our purposes, the
three main color spaces are Grayscale, RGB (red/green/blue)
and CMYK (cyan/magenta/yellow/black). RGB is generally used
with on-screen graphics, whereas CMYK is used for printing
purposes.
All color figures should be generated in RGB or CMYK color
space. Grayscale images should be submitted in Grayscale color
space. Line art may be provided in grayscale OR bitmap
colorspace. Note that “bitmap colorspace” and “bitmap file
format” are not the same thing. When bitmap color space is
selected, .TIF/.TIFF/.PNG are the recommended file formats.
Accepted Fonts Within Figures
When preparing your graphics IEEE suggests that you use of
one of the following Open Type fonts: Times New Roman,
Helvetica, Arial, Cambria, and Symbol. If you are supplying
EPS, PS, or PDF files all fonts must be embedded. Some fonts
may only be native to your operating system; without the fonts
embedded, parts of the graphic may be distorted or missing.
A safe option when finalizing your figures is to strip out the
fonts before you save the files, creating “outline” type. This
converts fonts to artwork what will appear uniformly on any
screen.
Using Labels Within FiguresFigure Axis labels
Figure axis labels are often a source of confusion. Use words
20. rather than symbols. As an example, write the quantity
“Magnetization,” or “Magnetization M,” not just “M.” Put units
in parentheses. Do not label axes only with units. As in Fig. 1,
for example, write “Magnetization (A/m)” or “Magnetization
(Am1),” not just “A/m.” Do not label axes with a ratio of
quantities and units. For example, write “Temperature (K),” not
“Temperature/K.”
Multipliers can be especially confusing. Write “Magnetization
(kA/m)” or “Magnetization (103 A/m).” Do not write
“Magnetization (A/m) 1000” because the reader would not
know whether the top axis label in Fig. 1 meant 16000 A/m or
0.016 A/m. Figure labels should be legible, approximately 8 to
10 point type.
Subfigure Labels in Multipart Figures and Tables
Multipart figures should be combined and labeled before final
submission. Labels should appear centered below each subfigure
in 8 point Times New Roman font in the format of (a) (b) (c).
File Naming
Figures (line artwork or photographs) should be named starting
with the first 5 letters of the author’s last name. The next
characters in the filename should be the number that represents
the sequential location of this image in your article. For
example, in author “Anderson’s” paper, the first three figures
would be named ander1.tif, ander2.tif, and ander3.ps.
Tables should contain only the body of the table (not the
caption) and should be named similarly to figures, except that
‘.t’ is inserted in-between the author’s name and the table
number. For example, author Anderson’s first three tables
would be named ander.t1.tif, ander.t2.ps, ander.t3.eps.
Author photographs should be named using the first five
characters of the pictured author’s last name. For example, four
author photographs for a paper may be named: oppen.ps,
moshc.tif, chen.eps, and duran.pdf.
If two authors or more have the same last name, their first
21. initial(s) can be substituted for the fifth, fourth, third... letters
of their surname until the degree where there is differentiation.
For example, two authors Michael and Monica Oppenheimer’s
photos would be named oppmi.tif, and oppmo.eps.
Referencing a Figure or Table Within Your Paper
When referencing your figures and tables within your paper, use
the abbreviation “Fig.” even at the beginning of a sentence. Do
not abbreviate “Table.” Tables should be numbered with Roman
Numerals.
Checking Your Figures: The IEEE Graphics Analyzer
The IEEE Graphics Analyzer enables authors to pre-screen their
graphics for compliance with IEEE Transactions and Journals
standards before submission. The online tool, located at
http://graphicsqc.ieee.org/, allows authors to upload their
graphics in order to check that each file is the correct file
format, resolution, size and colorspace; that no fonts are
missing or corrupt; that figures are not compiled in layers or
have transparency, and that they are named according to the
IEEE Transactions and Journals naming convention. At the end
of this automated process, authors are provided with a detailed
report on each graphic within the web applet, as well as by
email.
For more information on using the Graphics Analyzer
or any other graphics related topic, contact the IEEE Graphics
Help Desk by e-mail at [email protected].
Submitting Your Graphics
Because IEEE will do the final formatting of your paper,
you do not need to position figures and tables at the top and
bottom of each column. In fact, all figures, figure captions, and
tables can be placed at the end of your paper. In addition to, or
even in lieu of submitting figures within your final manuscript,
22. figures should be submitted individually, separate from the
manuscript in one of the file formats listed above in section VI-
J. Place figure captions below the figures; place table titles
above the tables. Please do not include captions as part of the
figures, or put them in “text boxes” linked to the figures. Also,
do not place borders around the outside of your figures.
Color Processing / Printing in IEEE Journals
All IEEE Transactions, Journals, and Letters allow an author to
publish color figures on IEEE Xplore® at no charge, and
automatically convert them to grayscale for print versions. In
most journals, figures and tables may alternatively be printed in
color if an author chooses to do so. Please note that this service
comes at an extra expense to the author. If you intend to have
print color graphics, include a note with your final paper
indicating which figures or tables you would like to be handled
that way, and stating that you are willing to pay the additional
fee.
Conclusion
A conclusion section is not required. Although a conclusion
may review the main points of the paper, do not replicate the
abstract as the conclusion. A conclusion might elaborate on the
importance of the work or suggest applications and extensions.
Appendix
Appendixes, if needed, appear before the acknowledgment.
Acknowledgment
The preferred spelling of the word “acknowledgment” in
American English is without an “e” after the “g.” Use the
singular heading even if you have many acknowledgments.
Avoid expressions such as “One of us (S.B.A.) would like to
thank ... .” Instead, write “F. A. Author thanks ... .” In most
cases, sponsor and financial support acknowledgments are
placed in the unnumbered footnote on the first page, not here.
References and Footnotes
23. A. References
References need not be cited in text. When they are, they appear
on the line, in square brackets, inside the punctuation. Multiple
references are each numbered with separate brackets. When
citing a section in a book, please give the relevant page
numbers. In text, refer simply to the reference number. Do not
use “Ref.” or “reference” except at the beginning of a sentence:
“Reference [3] shows ... .” Please do not use automatic endnotes
in Word, rather, type the reference list at the end of the paper
using the “References” style.
Reference numbers are set flush left and form a column of their
own, hanging out beyond the body of the reference. The
reference numbers are on the line, enclosed in square brackets.
In all references, the given name of the author or editor is
abbreviated to the initial only and precedes the last name. Use
them all; use et al. only if names are not given. Use commas
around Jr., Sr., and III in names. Abbreviate conference titles.
When citing IEEE transactions, provide the issue number, page
range, volume number, year, and/or month if available. When
referencing a patent, provide the day and the month of issue, or
application. References may not include all information; please
obtain and include relevant information. Do not combine
references. There must be only one reference with each number.
If there is a URL included with the print reference, it can be
included at the end of the reference.
Other than books, capitalize only the first word in a paper title,
except for proper nouns and element symbols. For papers
published in translation journals, please give the English
citation first, followed by the original foreign-language citation
See the end of this document for formats and examples of
common references. For a complete discussion of references and
their formats, see the IEEE style manual at
www.ieee.org/authortools.
Footnotes
24. Number footnotes separately in superscripts (Insert |
Footnote).[footnoteRef:2] Place the actual footnote at the
bottom of the column in which it is cited; do not put footnotes
in the reference list (endnotes). Use letters for table footnotes
(see Table I). [2: It is recommended that footnotes be avoided
(except for the unnumbered footnote with the receipt date on the
first page). Instead, try to integrate the footnote information
into the text.]
Submitting Your Paper for Review
Review Stage Using Word 6.0 or Higher
If you want to submit your file with one column electronically,
please do the following:
--First, click on the View menu and choose Print Layout.
--Second, place your cursor in the first paragraph. Go to the
Format menu, choose Columns, choose one column Layout, and
choose “apply to whole document” from the dropdown menu.
--Third, click and drag the right margin bar to just over 4 inches
in width.
The graphics will stay in the “second” column, but you can drag
them to the first column. Make the graphic wider to push out
any text that may try to fill in next to the graphic.
Final Stage Using Word 6.0
When you submit your final version (after your paper has been
accepted), print it in two-column format, including figures and
tables. You must also send your final manuscript on a disk, via
e-mail, or through a Web manuscript submission system as
directed by the society contact. You may use Zip for large files,
or compress files using Compress, Pkzip, Stuffit, or Gzip.
Also, send a sheet of paper or PDF with complete contact
information for all authors. Include full mailing addresses,
telephone numbers, fax numbers, and e-mail addresses. This
information will be used to send each author a complimentary
copy of the journal in which the paper appears. In addition,
25. designate one author as the “corresponding author.” This is the
author to whom proofs of the paper will be sent. Proofs are sent
to the corresponding author only.
Review Stage Using ScholarOne® Manuscripts
Contributions to the Transactions, Journals, and Letters may be
submitted electronically on IEEE’s on-line manuscript
submission and peer-review system, ScholarOne® Manuscripts.
You can get a listing of the publications that participate in
ScholarOne at
http://www.ieee.org/publications_standards/publications/authors
/authors_submission.html First check if you have an existing
account. If there is none, please create a new account. After
logging in, go to your Author Center and click “Submit First
Draft of a New Manuscript.”
Along with other information, you will be asked to select the
subject from a pull-down list. Depending on the journal, there
are various steps to the submission process; you must complete
all steps for a complete submission. At the end of each step you
must click “Save and Continue”; just uploading the paper is not
sufficient. After the last step, you should see a confirmation
that the submission is complete. You should also receive an e-
mail confirmation. For inquiries regarding the submission of
your paper on ScholarOne Manuscripts, please contact
[email protected] or call +1 732 465 5861.
ScholarOne Manuscripts will accept files for review in various
formats. Please check the guidelines of the specific journal for
which you plan to submit.
You will be asked to file an electronic copyright form
immediately upon completing the submission process (authors
are responsible for obtaining any security clearances). Failure to
submit the electronic copyright could result in publishing delays
later. You will also have the opportunity to designate your
article as “open access” if you agree to pay the IEEE open
access fee.
26. Final Stage Using ScholarOne Manuscripts
Upon acceptance, you will receive an email with specific
instructions regarding the submission of your final files. To
avoid any delays in publication, please be sure to follow these
instructions. Most journals require that final submissions be
uploaded through ScholarOne Manuscripts, although some may
still accept final submissions via email. Final submissions
should include source files of your accepted manuscript, high
quality graphic files, and a formatted pdf file. If you have any
questions regarding the final submission process, please contact
the administrative contact for the journal.
In addition to this, upload a file with complete contact
information for all authors. Include full mailing addresses,
telephone numbers, fax numbers, and e-mail addresses.
Designate the author who submitted the manuscript on
ScholarOne Manuscripts as the “corresponding author.” This is
the only author to whom proofs of the paper will be sent.
Copyright Form
Authors must submit an electronic IEEE Copyright Form (eCF)
upon submitting their final manuscript files. You can access the
eCF system through your manuscript submission system or
through the Author Gateway. You are responsible for obtaining
any necessary approvals and/or security clearances. For
additional information on intellectual property rights, visit the
IEEE Intellectual Property Rights department web page at
http://www.ieee.org/publications_standards/publications/rights/i
ndex.html. IEEE Publishing Policy
The general IEEE policy requires that authors should only
submit original work that has neither appeared elsewhere for
publication, nor is under review for another refereed
publication. The submitting author must disclose all prior
publication(s) and current submissions when submitting a
manuscript. Do not publish “preliminary” data or results. The
27. submitting author is responsible for obtaining agreement of all
coauthors and any consent required from employers or sponsors
before submitting an article. The IEEE Transactions and
Journals Department strongly discourages courtesy authorship;
it is the obligation of the authors to cite only relevant prior
work.
The IEEE Transactions and Journals Department does not
publish conference records or proceedings, but can publish
articles related to conferences that have undergone rigorous
peer review. Minimally, two reviews are required for every
article submitted for peer review.Publication Principles
The two types of contents of that are published are; 1) peer-
reviewed and 2) archival. The Transactions and Journals
Department publishes scholarly articles of archival value as
well as tutorial expositions and critical reviews of classical
subjects and topics of current interest.
Authors should consider the following points:
1) Technical papers submitted for publication must advance the
state of knowledge and must cite relevant prior work.
2) The length of a submitted paper should be commensurate
with the importance, or appropriate to the complexity, of the
work. For example, an obvious extension of previously
published work might not be appropriate for publication or
might be adequately treated in just a few pages.
3) Authors must convince both peer reviewers and the editors of
the scientific and technical merit of a paper; the standards of
proof are higher when extraordinary or unexpected results are
reported.
4) Because replication is required for scientific progress, papers
submitted for publication must provide sufficient information to
allow readers to perform similar experiments or calculations
and use the reported results. Although not everything need be
disclosed, a paper must contain new, useable, and fully
described information. For example, a specimen’s chemical
composition need not be reported if the main purpose of a paper
28. is to introduce a new measurement technique. Authors should
expect to be challenged by reviewers if the results are not
supported by adequate data and critical details.
5) Papers that describe ongoing work or announce the latest
technical achievement, which are suitable for presentation at a
professional conference, may not be appropriate for publication.
References
Basic format for books:
J. K. Author, “Title of chapter in the book,” in Title of His
Published Book, xth ed. City of Publisher, (only U.S. State),
Country: Abbrev. of Publisher, year, ch. x, sec. x, pp. xxx–xxx.
Examples:
G. O. Young, “Synthetic structure of industrial plastics,” in
Plastics, 2nd ed., vol. 3, J. Peters, Ed. New York, NY, USA:
McGraw-Hill, 1964, pp. 15–64.
W.-K. Chen, Linear Networks and Systems. Belmont, CA, USA:
Wadsworth, 1993, pp. 123–135.
Basic format for periodicals:
J. K. Author, “Name of paper,” Abbrev. Title of Periodical,
vol. x, no. x, pp. xxx-xxx, Abbrev. Month, year, DOI.
10.1109.XXX.123456.
Examples:
J. U. Duncombe, “Infrared navigation—Part I: An assessment of
feasibility,” IEEE Trans. Electron Devices, vol. ED-11, no. 1,
pp. 34–39, Jan. 1959, 10.1109/TED.2016.2628402.
E. P. Wigner, “Theory of traveling-wave optical laser,”
Phys. Rev.,
vol. 134, pp. A635–A646, Dec. 1965.
E. H. Miller, “A note on reflector arrays,” IEEE Trans.
Antennas Propagat., to be published.
Basic format for reports:
J. K. Author, “Title of report,” Abbrev. Name of Co., City of
29. Co., Abbrev. State, Country, Rep. xxx, year.
Examples:
E. E. Reber, R. L. Michell, and C. J. Carter, “Oxygen
absorption in the earth’s atmosphere,” Aerospace Corp., Los
Angeles, CA, USA, Tech. Rep. TR-0200 (4230-46)-3, Nov.
1988.
J. H. Davis and J. R. Cogdell, “Calibration program for the 16-
foot antenna,” Elect. Eng. Res. Lab., Univ. Texas, Austin, TX,
USA, Tech. Memo. NGL-006-69-3, Nov. 15, 1987.
Basic format for handbooks:
Name of Manual/Handbook, x ed., Abbrev. Name of Co., City
of Co., Abbrev. State, Country, year, pp. xxx-xxx.
Examples:
Transmission Systems for Communications, 3rd ed., Western
Electric Co., Winston-Salem, NC, USA, 1985, pp. 44–60.
Motorola Semiconductor Data Manual, Motorola Semiconductor
Products Inc., Phoenix, AZ, USA, 1989.
Basic format for books (when available online):
J. K. Author, “Title of chapter in the book,” in Title of
Published Book, xth ed. City of Publisher, State, Country:
Abbrev. of Publisher, year, ch. x, sec. x, pp. xxx–xxx. [Online].
Available: http://www.web.com
Examples:
G. O. Young, “Synthetic structure of industrial plastics,” in
Plastics, vol. 3, Polymers of Hexadromicon, J. Peters, Ed., 2nd
ed. New York, NY, USA: McGraw-Hill, 1964, pp. 15-64.
[Online]. Available: http://www.bookref.com.
The Founders’ Constitution, Philip B. Kurland and Ralph
Lerner, eds., Chicago, IL, USA: Univ. Chicago Press, 1987.
[Online]. Available: http://press-pubs.uchicago.edu/founders/
The Terahertz Wave eBook. ZOmega Terahertz Corp., 2014.
[Online]. Available: http://dl.z-
thz.com/eBook/zomega_ebook_pdf_1206_sr.pdf. Accessed on:
May 19, 2014.
30. Philip B. Kurland and Ralph Lerner, eds., The Founders’
Constitution. Chicago, IL, USA: Univ. of Chicago Press, 1987,
Accessed on: Feb. 28, 2010, [Online] Available: http://press-
pubs.uchicago.edu/founders/
Basic format for journals (when available online):
J. K. Author, “Name of paper,” Abbrev. Title of Periodical, vol.
x, no. x, pp. xxx-xxx, Abbrev. Month, year. Accessed on:
Month, Day, year, DOI: 10.1109.XXX.123456, [Online].
Examples:
J. S. Turner, “New directions in communications,” IEEE J. Sel.
Areas Commun., vol. 13, no. 1, pp. 11-23, Jan. 1995.
W. P. Risk, G. S. Kino, and H. J. Shaw, “Fiber-optic frequency
shifter using a surface acoustic wave incident at an oblique
angle,” Opt. Lett., vol. 11, no. 2, pp. 115–117, Feb. 1986.
P. Kopyt et al., “Electric properties of graphene-based
conductive layers from DC up to terahertz range,” IEEE THz
Sci. Technol., to be published. DOI:
10.1109/TTHZ.2016.2544142.
Basic format for papers presented at conferences (when
available online):
J.K. Author. (year, month). Title. presented at abbrev.
conference title. [Type of Medium]. Available: site/path/file
Example:
PROCESS Corporation, Boston, MA, USA. Intranets: Internet
technologies deployed behind the firewall for corporate
productivity. Presented at INET96 Annual Meeting. [Online].
Available: http://home.process.com/Intranets/wp2.htp
Basic format for reports and handbooks (when available
online):
J. K. Author. “Title of report,” Company. City, State, Country.
Rep. no., (optional: vol./issue), Date. [Online] Available:
site/path/file
Examples:
31. R. J. Hijmans and J. van Etten, “Raster: Geographic analysis
and modeling with raster data,” R Package Version 2.0-12, Jan.
12, 2012. [Online]. Available: http://CRAN.R-
project.org/package=raster
Teralyzer. Lytera UG, Kirchhain, Germany [Online]. Available:
http://www.lytera.de/Terahertz_THz_Spectroscopy.php?id=hom
e, Accessed on: Jun. 5, 2014
Basic format for computer programs and electronic documents
(when available online):
Legislative body. Number of Congress, Session. (year, month
day). Number of bill or resolution, Title. [Type of medium].
Available: site/path/file
NOTE: ISO recommends that capitalization follow the accepted
practice for the language or script in which the information is
given.
Example:
U.S. House. 102nd Congress, 1st Session. (1991, Jan. 11). H.
Con. Res. 1, Sense of the Congress on Approval of Military
Action. [Online]. Available: LEXIS Library: GENFED File:
BILLS
Basic format for patents (when available online):
Name of the invention, by inventor’s name. (year, month day).
Patent Number[Type of medium]. Available: site/path/file
Example:
Musical toothbrush with mirror, by L.M.R. Brooks. (1992, May
19). Patent D 326 189
[Online]. Available: NEXIS Library: LEXPAT
File: DES
Basic format for conference proceedings (published):
J. K. Author, “Title of paper,” in Abbreviated Name of Conf.,
32. City of Conf., Abbrev. State (if given), Country, year, pp.
xxxxxx.
Example:
D. B. Payne and J. R. Stern, “Wavelength-switched pas- sively
coupled single-mode optical network,” in Proc. IOOC-ECOC,
Boston, MA, USA,1985,
pp. 585–590.
Example for papers presented at conferences (unpublished):
D. Ebehard and E. Voges, “Digital single sideband detection for
interferometric sensors,” presented at the 2nd Int. Conf. Optical
Fiber Sensors, Stuttgart, Germany, Jan. 2-5, 1984.
Basic format for patents:
J. K. Author, “Title of patent,” U.S. Patent x xxx xxx, Abbrev.
Month, day, year.
Example:
G. Brandli and M. Dick, “Alternating current fed power
supply,” U.S. Patent 4 084 217, Nov. 4, 1978.
Basic formatfor theses (M.S.) and dissertations (Ph.D.):
a) J. K. Author, “Title of thesis,” M.S. thesis, Abbrev. Dept.,
Abbrev. Univ., City of Univ., Abbrev. State, year.
b) J. K. Author, “Title of dissertation,” Ph.D. dissertation,
Abbrev. Dept., Abbrev. Univ., City of Univ., Abbrev. State,
year.
Examples:
J. O. Williams, “Narrow-band analyzer,” Ph.D. dissertation,
Dept. Elect. Eng., Harvard Univ., Cambridge, MA, USA, 1993.
N. Kawasaki, “Parametric study of thermal and chemical
nonequilibrium nozzle flow,” M.S. thesis, Dept. Electron. Eng.,
Osaka Univ., Osaka, Japan, 1993.
Basic format for the most common types of unpublished
references:
a) J. K. Author, private communication, Abbrev. Month, year.
b) J. K. Author, “Title of paper,” unpublished.
33. c) J. K. Author, “Title of paper,” to be published.
Examples:
A. Harrison, private communication, May 1995.
B. Smith, “An approach to graphs of linear forms,” unpublished.
A. Brahms, “Representation error for real numbers in binary
computer arithmetic,” IEEE Computer Group Repository, Paper
R-67-85.
Basic formats for standards:
a) Title of Standard, Standard number, date.
b) Title of Standard, Standard number, Corporate author,
location, date.
Examples:
IEEE Criteria for Class IE Electric Systems, IEEE Standard
308, 1969.
Letter Symbols for Quantities, ANSI Standard Y10.5-1968.
Article number in reference examples:
R. Fardel, M. Nagel, F. Nuesch, T. Lippert, and A. Wokaun,
“Fabrication of organic light emitting diode pixels by laser-
assisted forward transfer,” Appl. Phys. Lett., vol. 91, no. 6,
Aug. 2007, Art. no. 061103.
J. Zhang and N. Tansu, “Optical gain and laser characteristics
of InGaN quantum wells on ternary InGaN substrates,” IEEE
Photon. J., vol. 5, no. 2, Apr. 2013, Art. no. 2600111
Example when using et al.:
S. Azodolmolky et al., Experimental demonstration of an
impairment aware network planning and operation tool for
transparent/translucent optical networks,” J. Lightw. Technol.,
vol. 29, no. 4, pp. 439–448, Sep. 2011.
First A. Author (M’76–SM’81–F’87) and all authors may
34. include biographies. Biographies are often not included in
conference-related papers. This author became a Member (M) of
IEEE in 1976, a Senior Member (SM) in 1981, and a Fellow (F)
in 1987. The first paragraph may contain a place and/or date of
birth (list place, then date). Next, the author’s educational
background is listed. The degrees should be listed with type of
degree in what field, which institution, city, state, and country,
and year the degree was earned. The author’s major field of
study should be lower-cased.
The second paragraph uses the pronoun of the person (he or she)
and not the author’s last name. It lists military and work
experience, including summer and fellowship jobs. Job titles are
capitalized. The current job must have a location; previous
positions may be listed without one. Information concerning
previous publications may be included. Try not to list more than
three books or published articles. The format for listing
publishers of a book within the biography is: title of book
(publisher name, year) similar to a reference. Current and
previous research interests end the paragraph.
The third paragraph begins with the author’s title and last name
(e.g., Dr. Smith, Prof. Jones, Mr. Kajor, Ms. Hunter). List any
memberships in professional societies other than the IEEE.
Finally, list any awards and work for IEEE committees and
publications. If a photograph is provided, it should be of good
quality, and professional-looking. Following are two examples
of an author’s biography.
Second B. Author was born in Greenwich Village, New York,
NY, USA in 1977. He received the B.S. and M.S. degrees in
aerospace engineering from the University of Virginia,
Charlottesville, in 2001 and the Ph.D. degree in mechanical
engineering from Drexel University, Philadelphia, PA, in 2008.
35. From 2001 to 2004, he was a Research Assistant with the
Princeton Plasma Physics Laboratory. Since 2009, he has been
an Assistant Professor with the Mechanical Engineering
Department, Texas A&M University, College Station. He is the
author of three books, more than 150 articles, and more than 70
inventions. His research interests include high-pressure and
high-density nonthermal plasma discharge processes and
applications, microscale plasma discharges, discharges in
liquids, spectroscopic diagnostics, plasma propulsion, and
innovation plasma applications. He is an Associate Editor of the
journal Earth, Moon, Planets, and holds two patents.
Dr. Author was a recipient of the International Association of
Geomagnetism and Aeronomy Young Scientist Award for
Excellence in 2008, and the IEEE Electromagnetic
Compatibility Society Best Symposium Paper Award in 2011.
1
> REPLACE THIS LINE WITH YOUR PAPER
IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO
EDIT) <
Third C. Author, Jr. (M’87) received the B.S. degree in
36. mechanical engineering from National Chung Cheng University,
Chiayi, Taiwan, in 2004 and the M.S. degree in mechanical
engineering from National Tsing Hua University, Hsinchu,
Taiwan, in 2006. He is currently pursuing the Ph.D. degree in
mechanical engineering at Texas A&M University, College
Station, TX, USA.
From 2008 to 2009, he was a Research Assistant with the
Institute of Physics, Academia Sinica, Tapei, Taiwan. His
research interest includes the development of surface processing
and biological/medical treatment techniques using nonthermal
atmospheric pressure plasmas, fundamental study of plasma
sources, and fabrication of micro- or nanostructured surfaces.
Mr. Author’s awards and honors include the Frew Fellowship
(Australian Academy of Science), the I. I. Rabi Prize (APS), the
European Frequency and Time Forum Award, the Carl Zeiss
Research Award, the William F. Meggers Award and the Adolph
Lomb Medal (OSA).
×
PAN final
draft_revised.pdf
A Disaster Recovery System for Location
Identification-based Low Power Wide Area
Networks (LPWAN)
James Jin Kang
School of IT & Engineering
37. Melbourne Institute of Technology
Melbourne, Australia
[email protected]
Iryna Khodasevych
School of IT & Engineering
Melbourne Institute of Technology
Melbourne, Australia
[email protected]
Sasan Adibi
School of Information Technology
Deakin University
Burwood, Australia
[email protected]
Abstract—Low Power Wide Area Networks (LPWAN) are
used in a number of applications, including disaster monitoring
and recovery networks. LPWAN sensors capture data bits and
transmit them via dedicated gateways, which are connected to
public carrier networks (e.g., cellular networks). One of the
challenges encountered in disaster management scenarios
38. revolves
around the carry/forward sensed data and geographical location
information dissemination to the disaster relief operatives
(Disaster Relief Agency; DRA) to identify, characterise, and
prioritise the affected areas. There are network topology
options,
including cellular, circuit switched, and peer-to-peer networks
to
reach the destination. From the disaster natural disaster
predictions point of view, collecting geographical location data
and
timestamp is vital. This paper proposes the usage of Pseudo A
Number (PAN), that is, the calling party address, which is used
by
every network to include the location information instead of the
actual calling party address of the gateway in LPWAN. This
PAN
information can further be analysed by the DRA to identify the
affected areas as well as to predict the complications of the
disaster
impacts in addition to the past history of the damages. This
paper
39. aims to propose a solution that can predict disaster proceedings
based on propagation and the velocity of impact using vector
calculation of location data and timestamp, which are
transmitted
by sensors through PAN of gateway in LPWAN.
Keywords—Pseudo A Number (PAN); Lower Power Wide Area
Network (LPWAN); Disaster Recovery System; Machine to
Machine
(M2M) interface; Disaster Recovery Assistance Agency (DRA)
I. INTRODUCTION
Disaster monitoring and recovery mechanisms have been in
demand for as long as natural disasters and their adverse effects
are known to humankind. The long list of natural and man-made
disaster includes: floods, heavy snowfalls, wild/bush fires,
storms/hurricanes, tsunamis, earthquakes, pandemics and
nuclear disasters [1, 2]. Even though there is a strong need to
implement communications between the affected disaster-
stricken areas and the disaster managing offices in local or
global agencies such as the United Nations and the European
Commission, the goal is to secure the necessary
communications
to support first responder activities in a damaged area with a
strategy to restore network services in the aftermath of the
initial
shock [3]. As the Internet is emerging with prevalent
technologies such as big data, cloud computing, Internet of
40. Things (IoT), and 5G cellular networks, it is now feasible to
provide low-cost networks covering broad and wide areas such
as LPWANs or long range (LoRa) networks [4, 5]. These
technologies allow sensors to be deployed and managed with a
low power (e.g. 25mW) wide area client and up to 25 km test
link for the operating areas for sensor networks [6]. When IoT
networks, which are predicted to have up to 50 – 100 billion
devices connected to the internet by 2020 [7], will be deployed
and converged with these sensor networks, it may be possible to
monitor virtually all habitable areas without requiring
additional
managing systems through self-communications amongst
devices such as machine-to-machine (M2M) interfaces and
device-to-device (D2D) communication technologies. For
example, a mobile device communicates with a peer-to-peer
wireless communications network via D2D communication
when the device is out of range of the cellular network. In an
emergency situation, it sends a message from the device to a
network element if a network connection between the mobile
device and network element exists. If no network connection
between the mobile device and a network element exists, the
device sends the message to a second mobile device, which will
connect to the third mobile device via D2D communication [8].
M2M communication technology is used in IoT for various
applications such as an alarm notification to mobile tower
monitoring system [9] and in mobile health (mHealth) alarming
applications via analysing health data sensed by personal sensor
devices [10-13]. Since LPWAN transmits small data volume to
save battery power, an inference system can also be used to
reduce the data size and the frequency of transmission [14]. In
disaster monitoring, it is crucial to identify the affected areas
and
their progress into other areas to predict the impact and
potential
damage. For this, it is required to know the geographical
location
41. information of individual sensor nodes, which may relay the
information (sensor measurements and Location IDentification;
LID) through the network until it has been received by the
LPWAN gateway, which will eventually be reached by the
Disaster Relief Agency (DRA) through the public network using
IP Multimedia System (IMS)- or VoIP-based networks
depending on the country or regions. This may cause a problem
of carrying the data (LID and sensor measurements) all the way
to the destination crossing various networks supporting
different
technologies with different signalling formats. To solve this
problem, we propose to use the ‘calling party’ address (A
number in a setup message to contain LID), which is used by all
network technologies along with called party address (B
number) by replacing the A number field (real calling party
address) by a pseudo A number (PAN) including LID.
The benefit of this proposal is that it may not require to
significantly modify or add a field to carry the LID within the
existing signalling system. However, it may require minimum
changes of the A number handling by a carrier network, whilst
the actual A number is not required for accounting during the
call setup as it will be regarded as an emergency call. If it is
normal to be charged, it may require charging arrangements by
the carrier when provisioning the service. To deliver the PAN,
the existing calling line identification presentation (CLIP)
feature can be used for data management by the DRA. For
implementation of the calling party numbers in multiple
networks, it will require collectively co-operation among the
network operators and service providers in a region or country.
Currently, there is no known activity of standardising
emergency call handling among countries whilst there are rules
on how to handle emergency numbers such as ‘000’ and ‘911’
42. in Australia for instance. For developing countries, this
proposal
may be useful to monitor disaster status with minimal
modifications in their carrier networks. Fig. 1 shows the
network
topology of LPWAN and carrier networks.
IoT
Ad-Hoc
Public Carrier
Networks
Gateway Data Centre
Applications
(Sensor)
Disaster Recovery
Agency (DRA)
Gateway
aggregation
Base Station
Fig. 1 End-to-End Network Topology for LPWAN and Carrier
Networks
II. PEER TO PEER AND AD-HOC NETWORKS
In a disaster situation and when the public network is not
available by the impact, peer-to-peer networks such as LPWAN,
Ad-Hoc and Balloon networks can be used to deliver the sensor
data. Those networks may be connected to IoT devices, which
43. can forward the information through the internet where
available.
A. Ad-Hoc Networks
In many cases, network connections cannot be preserved in
a disaster situation and Ad-Hoc networks can allow the rapid
deployment of connectivity. There are multiple wireless mobile
nodes dynamically forming a temporary network without using
the existing network infrastructure such as cellular or circuit
switched networks. As this Ad-Hoc network has the limitations
of wireless network interfaces, multiple hops are required,
which
also require routing protocols [15]. Since the protocol should
consider transmission range, limited buffer space for message
storage and hardware constraints, various mobility models have
been developed [16]. However, disaster sensors are mostly
located in fixed locations despite being able to be moved by
disasters. This is a unique trait as disaster sensors are not
mobile.
Therefore, it is required to consider the mobility when
designing
networks for disaster recovery networks.
B. Balloon Networks
As a special type of Ad-Hoc networks, aerial and
hierarchical balloon networks proved feasible from testing [17]
include optical and radio frequency links between balloons,
which consist of Super node and sub-nodes. Each super-node
balloon comprises a free-space optical communication system
for data communications with one or more other super-node
balloons, which comprises a radio-frequency communication
system operable for data communications [18, 19]. A wireless
telecommunications system with a base station positioned on an
44. airborne platform is provided and can communicate with
satellites based routing processes [20]. The system can also
utilise a ground-based wireless switching system to
communicate with a plurality of airborne base stations
positioned above a geographic area as well as the balloons’
geographic zones [21].
C. LPWANs
LPWANs basically provides low power-driven clients
(devices) for longer range coverage comparing to existing WAN
technologies whilst existing IoT protocols can work with short
range protocols such as Bluetooth, Zigbee and WiFi. There are
existing protocols and vendors (e.g. LoRa, NWave, OnRamp,
Platanus, SIGFOX, Telensa, Weightless, Amber Wireless and
M2M Spectrum Networks) for current standards, standards-in-
progress or proprietary [22] with different aspects and traits.
However, all of them aim to provide low-cost driven solutions
for longer range coverage, which is suitable for disaster
monitoring networks. LPWANs are unlikely to be controlled,
owned or managed by a carrier. Instead, a separate entity such
as a private network service provider can control the LPWAN
network except the gateway interconnection to the public carrier
networks. In this case, security issues will be limited to the
LPWAN operators, and will not be an issue for the carrier
networks. Fig. 3 depicts how LPWAN sensors are progressively
triggered in a disaster situation based on time changes, e.g.
from
T1, T2 to T3, the sensors are triggered in a timely manner by
each affected area. In this paper, LPWANs are used to
demonstrate an application scenario to forward location
information and timestamp to the gateway, which may then
connect to peer-to-peer networks or public carrier networks.
III. DESIGN AND IMPLEMENTATION
45. This section describes methodologies and implementation
for the generation and forwarding of LID utilising PAN within
LPWANs and transferring towards DRA.
A. Data Collection and Transmission in LPWANs
Deployed sensors capture data such as temperature,
humidity, air condition etc., and transmit them to neighbouring
devices which forward/relay them towards the gateway, which
is meant to collect data in its own network. There can be
multiple
gateways, which are aggregated by a customer edge to
communicate with a base station (BS). Whilst the internal
communications can be done by LPWAN protocols, the
interface from the CE to BS is done by the public network such
as 3G or 4G LTE.
B. Location ID
There are various formats for location such as Global
Positioning system (GPS) coordinates which can be used as an
LID, such as in the example below:
rees decimal minutes: 40° 26.767′ N 79° 58.933′ W.
As deployed sensors will not change their location in most
cases, it is not required to contact satellites to constantly update
46. the LID, in situations where the sensors’ computational capacity
is limited. If the capacity allows, the sensor can communicate
with satellites to keep accurate location information. Otherwise,
the LID can be pre-programmed when deployed. In the example
above, when the GPS coordinate is used for the LID, the format
should be defined on how to conform the content to the carrier
network. For example, when ITU-T E.164 is used, the format
can be as shown in Table I to accommodate the LID, e.g.
‘XY4044679982’ (12 digit), where XY can be an identification
of the network, whilst each country has its own national
numbering plan, and therefore XY format should follow the
scheme. Number structure for global service by the E.164 also
suggests 3 digits for the country code and 12 digits for the
global
subscriber number [23]. Alternatively, the LID can also be a
proprietary format as long as it can traverse the networks
without
being rejected. In this way, the number of 12 digits can be
further
granulised as it does not have to include the ‘degree’ portion of
the GPS coordinate, which saves 4 digits for other information,
e.g. sensor measurements.
TABLE I. NUMBER STRUCTURE FOR GEOGRAPHICAL
AREA (ADAPTED
FROM [23])
Country Code
National Destination
Code (optional)
Subscriber Number
National (significant)
cc = 1-3 digits maximum = 15 – cc = 12 to 14 digits
47. International public telecommunication number for geographic
areas
(maximum 15 digits)
C. Gateways
Whilst sensors transmit data to gateways, the collected data
is converted into a proper format at the gateway (or aggregation
gateway as a customer edge). There are two key data which are
processed at the gateway: (1) LID: location information such as
the GPS coordinate or proprietary location data format being
used by the DRA is converted into the A party address format in
the signalling field consisting of XY (network ID) and 10 digits
of numeric data for the location, as shown in Table II for
instance. (2) sensor measurements are included in the data
(payload) field. The gateway plays a key role in performing data
collection from the sensors, instructing the network to change
the status to an emergency mode when triggered, forming the
PAN field from data received from the sensors, and connecting
to carrier or peer-to-peer networks. It also interacts with other
gateways in the LPWAN for routing if required.
D. Call Setup in Mobile Station
There are normal Setup and Emergency Setup procedures
described by 3GPP 24.008. Depending on the subsequent
network interconnecting from the cellular network, a proper
Setup process can be used. In any case, every call should have
the ‘calling party’ address in a proper format. When a gateway
connects to a cellular network, it should format the Setup
message to generate and include the PAN in the A number field,
which will be used by the cellular network to forward to the
destination. Between mobile and circuit switched network,
48. proper procedures are described for the setup and for the
emergency setup. For example, Table 9.54/3GPP TS 24.008
summarises the messages for circuit-switched call control.
E. PAN (Calling party numbers)
In many networks, the calling party numbers are controlled
by the carrier and cannot be changed by the subscriber.
Sometimes networks have screening/filtering configuration
applied to the switch/base station so that their calling party
numbers need to conform to certain number ranges or be
positively vetted against a list of known numbers. For example,
a carrier exchange system or switch may reject the incoming
call
based on a calling party number, which has been classified as
invalid digits when analysing the calling party number by digit
analysis. This needs to be worked out with carriers such that
certain number ranges can be added to be in the digit analysis
processes for those disaster related calls. To present a PAN to
the carrier network, an example is shown in Table II provided it
still requires conforming of a carrier’s numbering scheme for
calling party numbers.
TABLE II. PAN PRESENTATION NUMBERING SCHEME:
EXAMPLE (12
DIGITS)
X (1) Y (1) ABCDE (5) JKLMN (5)
Network
ID
(0 -9)
Application
49. ID (0-9)
North Coordinate West Coordinate
Degree+minute+second Degree+minute+second
Minute+second Minute+second
Proprietary LID Proprietary LID
F. Call Types
When a call has arrived at the carrier network for the first
time from the LPWAN, it should be classified as an emergency
call type as it is an emergency in case of a disaster situation.
However, when it is not an emergency, the call may be treated
as a normal call. To differentiate the calls, there are three types
of calls from the LPWAN to the carrier network.
(1) Scheduled calls: LPWAN sensors transmit sensed data
on a regular basis as pre-programmed, e.g. every hour,
for checking of the sensor status.
(2) Urgent calls: When a disaster situation occurs, LPWAN
sensors will trigger the gateway with sensed data as
compared to the pre-defined threshold values. The
gateway in this case transmits the emergency data to the
destination.
(3) Recovery calls: When sensors capture measurements
that have become within the normal ranges against the
threshold values, they transmit the data as ‘recovered’
and the gateway transmits them to the disaster centre to
50. be marked as normal.
The type of call can also be in the form of short message
service (SMS), PSTN or Mobile termination, Answered or Not
answered, emergency call (000) etc.
G. Network Types for Origination and Termination
LPWAN gateways may transmit the calls to cellular or other
networks as needed and as applicable. For example, some areas
may not be covered by mobile networks but are covered by
circuit switched networks. In the case of a disaster situation,
some or all of the networks may not be available, and the
LPWAN may connect to peer networks such as the IoT network.
In any case, the destination network where the disaster centre is
connected to is likely to be in a carrier network such as 3G
mobile or PSTN numbers, depending on what number has been
dialed by the gateway. Fig. 2 shows emergency procedures of a
gateway and sensors in an LPWAN.
Start
Emergency
Situation?
No
G/W get sensor
data (L.ID)
Carrier network
connected?
Transmit data
Periodic reporting
51. Yes
Find peer to peer
network, M2M
IoT, D2D,
gateways
No
Sensors relay data
Successful?
Yes
No
End
Yes
G/W wake
sensors and
adjacent networks
Sensors change to
Emergency mode,
e.g. transfer often
Fig. 2 Emergency procedures of LPWAN Gateways
IV. APPLICATION
52. As an application demonstration, we consider a bushfire
disaster situation to simulate gateways collecting sensed data
and transmitting them to the DRA, which may use the data to
predict further areas of impact. Sensed Data within LPWANs
can be transferred and aggregated at a gateway which is done
independently from the public networks. Each sensor relays the
original (triggered) sensor’s LID and timestamp to the next
sensor, which will eventually arrive at a gateway. As shown in
Fig. 3, at a given time T1, Area1 has been affected by the
disaster, and has then expanded to Area2 by T2. When T3 shows
the affected area, our goal is to forecast the Area4 at T4 based
on the previous data including the areas affected (location
information) at each time such as T1, T2 and T3. The directions
of propagation are calculated and reflected into the forecast,
which will be recalculated for the next period, e.g. Area5 at T5.
In other words, areas of Area4 which have been (1) estimated
and (2) actually measured at T4 are used to forecast Area5 at
T5.
T1
T2
T3
LPWAN Sensors
G
a
te
w
ay
53. S11
S21
S1N
SM1 SMN
T4 forecast
Dp1
Dp: direction of propagation T5 forecast
Dp2
Fig. 3 LPWAN Sensors and Gateway triggered in a timely
manner. Triggered
sensors are grouped geographically at each time (Tn), and LID
and timestamp
are used to calculate the map of impact. Dp is used to predict
the future impact
To identify the disaster-affected areas, the LID and timestamp
are crucial information along with the signal status. For
instance,
sensor S1N in Fig. 3 is regarded as ‘affected’ when the sensor
returned value exceeding the trigger value or the gateway has
lost a signal by comparing to the previous time online [T = TN-
(TN-1)]. To predict potential areas of future impact of a
disaster-
stricken area, they can be calculated as follows. Parameter of
interest from each sensor can be represented as a matrix
54. mirroring sensor locations
MNM
N
PP
P
PPP
......
............
.........
...
1
21
11211
(1)
In case of bushfire monitoring, the parameter of interest PMN is
air temperature at each sensor. When some of the sensors return
the parameter values exceeding the allowed threshold, disaster
response is triggered. Knowing the geographical position (xy
coordinates) of the sensors that triggered the response and time
when this occurred xMN, yMN and T1 and then tracking the
propagation of the increased parameter values to the
surrounding
55. sensors at T2, velocity, rate of change and direction of
propagation of the disturbance can be calculated.
Consider the ambient temperature of 25°C. At T1, a number of
sensors shown in red at Fig. 4(a) have been triggered due to
exceeding the trigger temperature of 60°C.
Zones of medium (30°C - 60°C) and low impact (25°C - 30°C)
have been shown in yellow and blue respectively. Fig. 4(b)
shows by how much the temperature exceeds the ambient
temperature at each sensor location with affected sensors shown
in grey. Fig. 5 shows the progression of the temperature rise at
T2 assumed to be 1s after T1 with corresponding changes in
impact status at each location.
Fig. 4 (a) Sensor parameter measurement matrix showing
temperature
mesurement at T1. (b) Temperature in excess of ambient
temperature at T1.
Fig. 5 (a) Sensor parameter measurement matrix showing
temperature
mesurement at T2. (b) Temperature in excess of ambient
temperature at T2.
Rate of change of the parameter at each sensor location can be
found as
12
56. 1)()()(
TT
TPTP
TR NNNMN
Corresponding matrix for the rate of parameter change R can
be determined reflecting values at each sensor as
MNM
N
RR
R
RRR
......
............
.........
...
1
21
57. 11211
(3)
where RMN are rate of change values for individual sensors as
shown in Fig. 6. For example,
12
111211
211
)()(
)(
TT
TPTP
TR
Fig. 6 Rate of temperature change at each sensor S11 to SMN.
Fig. 7 shows the prediction of the temperature rise at T3
assumed
to be 1s after T2 with corresponding changes in impact status at
each location.
Sensors closer to the fire are affected to a greater extent and
experience a greater rate of change. Parameter values at time
TN+1 at each sensor can be predicted as
58. The predicted value can be compared with the actual value
measured at T N+1 and the rate of change can be corrected as
where
)()(
Fig. 7 Predicted temperatures at the next moment at time T3.
Isovalue contours (points with the same temperature) could be
plotted from sensor data for the creation of a 2D map of
parameter values, determination of propagation wavefront,
direction of disaster propagation and calculation of affected
areas as shown in Fig. 4 & 5. Direction of disaster propagation
is perpendicular to the isovalue contour. For example, in this
paper isovalue contour was approximated as a straight line and
the distance between sensors was assumed as 1 km. The
direction of propagation is determined by the angle that is
formed between vertical axis y and the line perpendicular to the
wave front or isovalue contour, which is the same as the angle
that is formed between the isovalue line and the horizontal axis
x.
59. 12
12atan
xx
yy
where x1 and y1 are coordinates of one of the ends of the
isovalue
front and x2 and y2 are coordinates of the other end of the front
with top right sensor considered to be at the origin of the
coordinate system. Fig. 8 shows the angles of propagation for
each disaster zone.
Fig. 8 Directions of disaster propagation for different zones of
impact at (a) for
T1, (b) for T2.
60. Velocity of disturbance propagation can be calculated along
each of the x and y axes as
where dx and dy are the distance between the sensors in x and y
directions and t is the time it took for the second sensor to reach
the same value as the first. To find the velocity for any
direction,
the vector sum can be used.
V. CONCLUSION
LPWAN is an emerging technology, which may connect to IoT
and public carrier networks for disaster monitoring and
recovery
networks. We proposed to use calling party numbers (PAN) to
forward location information (and measurements of sensors) of
individual sensors to a destination such as a disaster centre (e.g.
DRA) in order to be analysed and processed for disaster
management. This can be done by minimal changes to carrier
networks to allow the PAN to go through the networks. Despite
it may possibly requiring additional configuration in carrier
networks, it will be useful in developing countries where there
are less sophisticated network technologies. Using the PAN
carrying the location and timestamp data of sensors, we showed
an application of the idea in a bushfire situation. This is shown
by utilising isovalue contours and calculations of matrices for
rate of temperature change at each sensor as well as directions
of disaster propagation at each impact zone. The calculations
were used to predict spread to further areas of impact in time. It
can potentially be useful in remote areas utilising LPWAN for a
few hundred kilometres of coverage through a single gateway.
For future study, more comprehensive disaster scenarios
reflecting variables such as wind speed and direction, humidity,
density of flora and temperature may be developed and
61. modelled
to help real disaster situations.
REFERENCES
[1] M. Schuster, "National and International Disaster
Response," Austrian
Armed Forces NBC-Defence School 2011.
[2] S. Adibi, "A mobile health network disaster management
system," in
Ubiquitous and Future Networks (ICUFN), 2015 Seventh
International
Conference on, 2015, pp. 424-428.
[3] T. Gomes, J. Tapolcai, C. Esposito, D. Hutchison, F.
Kuipers, J. Rak, et
al., "A survey of strategies for communication networks to
protect against
large-scale natural disasters," in 2016 8th International
Workshop on
Resilient Networks Design and Modeling (RNDM), 2016, pp.
11-22.
[4] X. Xiong, K. Zheng, R. Xu, W. Xiang, and P. Chatzimisios,
"Low power
wide area machine-to-machine networks: Key techniques and
prototype,"
IEEE Communications Magazine, vol. 53, pp. 64-71, 2015.
[5] J. Petäjäjärvi, K. Mikhaylov, M. Hämäläinen, and J. Iinatti,
62. "Evaluation
of LoRa LPWAN technology for remote health and wellbeing
monitoring," in Medical Information and Communication
Technology
(ISMICT), 2016 10th International Symposium on, 2016, pp. 1-
5.
[6] K. E. Nolan, W. Guibene, and M. Y. Kelly, "An evaluation
of low power
wide area network technologies for the Internet of Things," in
2016
International Wireless Communications and Mobile Computing
Conference (IWCMC), 2016, pp. 439-444.
[7] Gartner.com. Gartner Says 4.9 Billion Connected. Available:
http://www.gartner.com/newsroom/id/2905717, [Accessed: 20
May
2015]
[8] S. Adibi, C. Labrador, and S. Simmons, "Method and system
for peer-to-
peer (P2P) ad-hoc location determination routing protocol," ed:
Google
Patents, 2014.
[9] P. K. Dalela, A. Yadav, S. Sachdev, A. Yadav, S. Basu, and
V. Tyagi,
"Alarm notification to tower monitoring system in oneM2M
based IoT
63. networks," in 2016 International Conference on Advances in
Computing,
Communications and Informatics (ICACCI), 2016, pp. 2405-
2409.
[10] J. J. Kang, T. H. Luan, and H. Larkin, "Alarm Notification
of Body
Sensors Utilising Activity Recognition and Smart Device
Application,"
presented at the Proceedings of the 14th International
Conference on
Advances in Mobile Computing and Multi Media, Singapore,
Singapore,
2016.
[11] J. J. Kang and H. Larkin, "Inference of Personal Sensors in
the Internet
of Things," International Journal of Information,
Communication
Technology and Applications, vol. 2, 2016.
[12] J. Kang, "An Inference System Framework for Personal
Sensor Devices
in Mobile Health and Internet of Things Networks," Doctor of
Philosophy, School of IT, Deakin University, Burwood Victoria,
2017.
[13] J. J. Kang, T. Luan, and H. Larkin, "Data Processing of
Physiological
Sensor Data and Alarm Determination Utilising Activity
64. Recognition,"
International Journal of Information, Communication
Technology and
Applications, vol. 2, p. 24, 2016-09-24 2016.
[14] J. J. Kang, H. Larkin, and T. H. Luan, "Enhancement of
Sensor Data
Transmission by Inference and Efficient Data Processing," in
Applications and Techniques in Information Security, L. Batten
and G.
Li, Eds.: Springer Singapore, 2016, pp. 81-92.
[15] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J.
Jetcheva, "A
performance comparison of multi-hop wireless ad hoc network
routing
protocols," in Proceedings of the 4th annual ACM/IEEE
international
conference on Mobile computing and networking, 1998, pp. 85-
97.
[16] T. Camp, J. Boleng, and V. Davies, "A survey of mobility
models for ad
hoc network research," Wireless communications and mobile
computing,
vol. 2, pp. 483-502, 2002.
[17] B. W. Walsh, "Balloon Network Test Successful," Taylor
University
News, 2007.
65. [18] R. W. DeVaul, E. Teller, C. L. Biffle, and J. Weaver,
"Balloon network
with free-space optical communication between super-node
balloons and
RF communication between super-node and sub-node balloons,"
ed:
Google Patents, 2014.
[19] J. S. Campbell, "Aerial communications network including
a plurality of
aerial platforms," ed: Google Patents, 2000.
[20] E. Teller, M. Cassidy, C. L. Biffle, and R. W. DeVaul,
"Use of satellite-
based routing processes with a balloon network," ed: Google
Patents,
2014.
[21] E. Teller, R. W. DeVaul, C. L. Biffle, and J. Weaver,
"Virtual pooling of
local resources in a balloon network," ed: Google Patents, 2015.
[22] B. Moyer. Low Power, Wide Area, A Survey of Longer-
Range IoT
Wireless Protocols. Available:
http://www.eejournal.com/article/20150907-lpwa/, [Accessed:
21 May
2017]
[23] ITU-T, "COMPLEMENT TO ITU-T RECOMMENDATION
E.164
66. (11/2010)," in Annex to ITU Operational Bulletin No. 991 –
1.XI.2011
ed: ITU, 2010.
Instruction for
Presentation.docx
Instruction for Presentation
1/ Submit your slides to Moodle to comply with the assignment
marking criteria. I suggest you include the format below [50%
of total mark]
· 1st slide: title, name, ID, date, Tutor etc
· 2nd slide: Introduction including definition, brief explanation
of the topic, and the structure of the remaining presentation
clearly
· 3rd slide: Figure/table to show the overview of the topic
· 4th and 5th slide: Detail explanation of the topic. This can be
extended by 1 or 2 more slides
· 6th slide: Advantages and Disadvantages, Problems,
Solution
s etc
· 7th slide: diagram, figures, pictures to support the previous
slides.
· 8th: Future works: what to be done, what are the trends? This
slide can be located after the conclusion.
· 9th: conclusion
67. · 10th: References: all references should have in citation and
properly referenced in text and references following IEEE
format.
2/ Presentation [50% of total mark]
You should present in clear English so that audience can
understand what you are talking about. Speak slowly, clearly
and loudly.
How will it be marked?
· As long as you conform the slides format as above, you may
get pass mark. Otherwise, you may get penalties. For example, 9
slides are perfect but missing 10th slides for reference. In this
case, 10% deduction will occur even though you presented 9
slides properly. Thus, I strongly suggest you prepare the slides
to 100% follow the format suggested.
· Do NOT read the slides but talk about your thoughts. You will
get penalty mark if you simply read the slides even though you
perfectly presented other aspects. Presentation and
communication skills will be mainly checked.
· Submit to Moodle and do not bring a memory stick or email
access for your presentation. You will not have a chance to
present unless you submitted it to Moodle as your tutor will
using the file in the Moodle for your presentation. No
exception.
· Make points with a few bullet points, and do not cut and paste
your article paragraph. You will lose marks for too many words.
68. Check the links below for preparation and google yourself to
learn:
http://www.deakin.edu.au/students/studying/study-
support/academic-skills/oral-presentations
https://www.topuniversities.com/blog/presentation-tips-
students-how-conquer-anxiety
https://www.kent.ac.uk/careers/presentationskills.htm