SlideShare a Scribd company logo
1 of 68
For the recipe below adjust the recipe from 17 gallons to 70
gallons. Convert all ingredients to pounds (show work) before
applying the percentage. Report the percentage; you can do this
in decimals. Report the adjusted ingredients in pounds and oz.
Example 1.5 pounds = 1 pound and 8 oz.
There are 111 oz in a 10# can of tomato paste
Yield: 17 gallons (one gallon = 42 3 oz servings)
Ground Beef, fine 85/15
8, 10 pounds chubs
Flour
9 1/2 C
Corn Starch
5 pounds
Chili Powder, ground
7 C
Cumin, ground
1 1/2 C
Black Pepper, ground
3/4 C
Onion Poser
7 C
Salt
1 C
Garlic Powder
2 1/2 C
Tomato Paste
3, 10# Can
Water
8 gal
MN610Virtual Private NetworksPage 3 of total pages
Assessment Details and Submission Guidelines
Trimester
T2, 2018
Unit Code
MN610
Unit Title
Virtual Private Networks
Assessment Author
Dr Ammar Alazab
Assessment Type
Individual (Assignment 1)
Assessment Title
Assignment 1 – VPN Technologies and Security issues
Unit Learning Outcomes covered in this assessment
Students should be able to demonstrate their achievements in
the following unit learning outcomes:
a. Analyse and discuss the significance of VPN for
contemporary organisations and how it addresses their concerns
and security issues.
b.Explain the role of VPN, its limitations and works done to
address these limitations as well as
to supporting the security of businesses and corporations
Weight
15% of Total Assessment
Total Marks
100
Word limit
See instructions
Due Date
6:00 PM, Wednesday 29 August 2018 (Week 7)
Submission Guidelines
· All work must be submitted on Moodle by the due date along
with a completed Assignment Cover Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-
pt Calibri (Body) font and 2 cm margins on all four sides of
your page with appropriate section headings.
· Reference sources must be cited in the text of the report, and
listed appropriately at the end in a reference list using APA or
IEEE referencing style for School of Business and School of
Information Technology and Engineering respectively.
Extension
· If an extension of time to submit work is required, a Special
Consideration Application must be submitted directly to the
School's Administration Officer, in Melbourne on Level 6 or in
Sydney on Level 7. You must submit this application three
working days prior to the due date of the assignment. Further
information is available at:
http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic Misconduct
· Academic Misconduct is a serious offence. Depending on the
seriousness of the case, penalties can vary from a written
warning or zero marks to exclusion from the course or
rescinding the degree. Students should make themselves
familiar with the full policy and procedure available
at:http://www.mit.edu.au/about-mit/institute-
publications/policies-procedures-and-guidelines/Plagiarism-
Academic-Misconduct-Policy-Procedure.For further
information, please refer to the Academic Integrity Section in
your Unit Description.
Assignment Description
Tasks:
There are two parts to this assignment, i.e. part A and part B.
A. Write a review article for the following topics depending on
the last digit of your ID: select Topic 1 if it ends in an ‘odd’
number or Topic 2 if it ends in an ‘even’ number.90 marks
B. Presentation
10 marks
Part A description:
1. Topic 1 - Significance of VPN for contemporary
organisations that have branches nationally and internationally
A virtual private network uses a public network’s infrastructure
to make the connections among geographically dispersed nodes,
instead of using cables owned or leased exclusively for one
single network’s use, eg using of network that as is typical for a
wide area network (WAN). To the user, a VPN looks like a
private network, even though it shares the network with other
users. There are several uses for a VPN. Analyse and discuss
the significance of VPN for these contemporary organisations.
List the concerns of contemporary organizations in
communicating among their employees and clients, and
comment if VPN can address their concerns. Discuss how VPN
can be advantageous for securing computer communications.
Address the issue of VPN security in details as described in
section 3.
2. Topic 2 – VPN Replacement Technologies
Legacy VPNs has had some major drawbacks and problems such
as the ones described below. There have been attempts to
resolve the issues, and some technologies are being deployed as
alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc.
List the limitations/problems existed in legacy VPNs and review
alternative options to resolve and overcome the problems of
legacy VPNs. Address the issue of VPN security in details as
described in section 3.
Common Part – VPN Security Issues
Fundamentally, VPN is known as being secure and safe;
however, there are still many issues with regards to security
aspects. A simple Google search of ‘VPN security’ displays 135
million results. Search the internet for relevant articles/papers,
and compare and analyze what these security issues are and
what solutions they propose.
· http://www.pcworld.com/article/2943472/vpn-users-beware-
you-may-not-be-as-safe-as-you-think-you-are.html
· https://www.digitaltrends.com/computing/commercial-vpn-
huge-security-flaws/
· https://security.stackexchange.com/questions/89017/what-are-
security-risks-of-connecting-to-my-home-vpn-from-my-work
· https://www.sans.org/reading-room/whitepapers/vpns/remote-
access-vpn-security-concerns-policy-enforcement-881
Instructions:
Prepare your article as below
1. Go to the IEEE website and download the WORD template
for the format.
https://www.ieee.org/publications_standards/publications/author
s/author_templates.html
2. Another link for the template:
https://www.ieee.org/publications_standards/publications/journ
mag/ieee_tj_template_17.pdf
3. Read and familiarize yourself with the instructions carefully.
4. Prepare a paper using the IEEE format and the example
attached. Follow the template if there are any confusions. Also,
refer to the link below to have ideas how to start (see section 6).
(https://www.ieee.org/publications_standards/publications/autho
rs/author_guide_interactive.pdf)
5. Complete the assignment (minimum 5 and maximum 8 pages)
including all the sections below. The number of words will be
counted thoroughly and you must keep the minimum number of
words to avoid any penalties.
· Title (maximum 15 words)
· Abstract (200 – 250 words)
· Introduction (500 – 1000 words)
· Literature Review (500 – 1000 words)
· Main body (1000 – 1500 words)
· Conclusion (200 – 300 words)
· Future Works (150 – 300 words)
· References (minimum 10 references)
6. The article must be a ‘Review’[footnoteRef:1] article
including at least 5 references and not more than 25. [1: See
http://www.editage.com/insights/6-article-types-that-journals-
publish-a-guide-for-early-career-researchers]
7. Strictly follow the IEEE reference format for in-body
citations and the references section.
8. See the attached files for guidance on how to prepare a
review paper. You can also find thorough instructions from
IEEE and the Internet.
9. Contents must include:
· History and background of the topic
· What are the challenges and drawbacks, what solutions and
workouts they found
· Possible options (solutions) and future research areas
proposed
· Scopes of topic, progress of developments such as
requirements, benchmarking, purposes & objectives,
stakeholders, owners, roles and responsibilities where
applicable.
· Flowchart
· Include a minimum of two (2) figures to show the overall
concept and summarized overview of the topic from the review
of minimum 10 – 15 (but not limited to) papers.
· Include a couple of tables to summarize the result of findings
· How each organization approaches, initiates, develops
procedures and ownerships, and what results they got, and how
it affected their businesses.
· What you conclude in terms of the topic/solutions to
implement in an organization. Consider other aspects to include
for a good review paper.
10. Remember to strictly follow the template and the
instructions above to avoid penalties.
Part B description:
Prepare slides (between 5 – 10 slides) for presentation during
the lab class. Read the instruction attached carefully.
Marking criteria:
Example of marking criteria is shown in following table. Marks
are allocated as follows:
Note: The marking criteria varies for each assignment
Section to be included in the report
Detailed Description of the Criteria
Marks
Conforming to the template and format
No marks will be given and severe penalties will apply for any
breach of the format and template. Fonts, sizes, spacing,
captions, headings etc. will also be checked thoroughly. Be
thorough and follow fully when using the template and format
instruction to avoid penalties.
10
Figures and tables created
They should be created yourself and not copied from elsewhere.
For full marks you should create at least 2 figures and 2 tables.
20
Main sections
Main body structures and contents quality including word limit.
40
Literature review
Severe penalties apply for simple listing and describing. It
should be a logically support analysis that reaches the review
conclusion that should be included at the end of the section.
Check word limit.
10
In body citation
Strictly follow the order and instruction by IEEE. Check
when/where to put the citation. See attached files and search the
internet for guidelines
5
References section
Check whether they follow the instruction. Otherwise, no marks
will be provided
5
Presentation
Presentation skills and materials quality
10
Total
100
Example Marking Rubric for Assignment #: Total Marks 100
Note: The marking criteria varies for each assignment
Marking Rubric Criteria/ Grades
High Distinction (HD) [Excellent]
>80%
Distinction (D) [Very Good]
70%-80%
Credits
(C) [Good]
60%-70%
Pass (P) [Satisfactory]
50%-60%
Fail (N) [Unsatisfactory]
<50%
Criteria 1
Concise and specific to the project
Topics are relevant and soundly analysed.
Generally relevant and analysed.
Some relevance and briefly presented.
This is not relevant to the assignment topic.
Criteria 2
Demonstrated excellent ability to think critically and sourced
reference material appropriately
Demonstrated excellent ability to think critically but did not
source reference material appropriately
Demonstrated ability to think critically and sourced reference
material appropriately
Demonstrated ability to think critically and did not source
reference material appropriately
Did not demonstrate ability to think critically and did not
source reference material appropriately
Criteria 3
Demonstrated excellent ability to think critically and sourced
reference material appropriately
Demonstrated excellent ability to think critically but did not
source reference material appropriately
Demonstrated ability to think critically and sourced reference
material appropriately
Demonstrated ability to think critically and did not source
reference material appropriately
Did not demonstrate ability to think critically and did not
source reference material appropriately
Criteria 4
All elements are present and very well integrated.
Components present with good cohesive
Components present and mostly well integrated
Most components present
Proposal lacks structure.
Criteria 5
Logic is clear and easy to follow with strong arguments
Consistency logical and convincing
Mostly consistent logical and convincing
Adequate cohesion and conviction
Argument is confused and disjointed
Criteria 6
Clear styles with excellent source of references.
Clear referencing style
Generally good referencing style
Sometimes clear referencing style
Lacks consistency with many errors
Prepared by: Dr. Ammar Alazab Moderated by: Dr Tony
JanJuly, 2018
Prepared by: Dr. Ammar Alazab Moderated by: Dr Tony
JanJuly, 2018
ieee_tj_template_17
.docx
[footnoteRef:1] [1: This paragraph of the first footnote will
contain the date on which you submitted your paper for review.
It will also contain support information, including sponsor and
financial support acknowledgment. For example, “This work
was supported in part by the U.S. Department of Commerce
under Grant BS123456.”
The next few paragraphs should contain the authors’ current
affiliations, including current address and e-mail. For example,
F. A. Author is with the National Institute of Standards and
Technology, Boulder, CO 80305 USA (e-mail: [email protected]
boulder.nist.gov).
S. B. Author, Jr., was with Rice University, Houston, TX 77005
USA. He is now with the Department of Physics, Colorado State
University, Fort Collins, CO 80523 USA (e-mail:
[email protected]).
T. C. Author is with the Electrical Engineering Department,
University of Colorado, Boulder, CO 80309 USA, on leave from
the National Research Institute for Metals, Tsukuba, Japan (e-
mail: [email protected]).]
Preparation of Papers for IEEE TRANSACTIONS and
JOURNALS(February 2017)
First A. Author, Fellow, IEEE, Second B. Author, and Third C.
Author, Jr., Member, IEEE
Abstract—These instructions give you guidelines for preparing
papers for IEEE Transactions and Journals. Use this document
as a template if you are using Microsoft Word 6.0 or later.
Otherwise, use this document as an instruction set. The
electronic file of your paper will be formatted further at IEEE.
Paper titles should be written in uppercase and lowercase
letters, not all uppercase. Avoid writing long formulas with
subscripts in the title; short formulas that identify the elements
are fine (e.g., "Nd–Fe–B"). Do not write “(Invited)” in the title.
Full names of authors are preferred in the author field, but are
not required. Put a space between authors’ initials. The abstract
must be a concise yet comprehensive reflection of what is in
your article. In particular, the abstract must be self-contained,
without abbreviations, footnotes, or references. It should be a
microcosm of the full article. The abstract must be between
150–250 words. Be sure that you adhere to these limits;
otherwise, you will need to edit your abstract accordingly. The
abstract must be written as one paragraph, and should not
contain displayed mathematical equations or tabular material.
The abstract should include three or four different keywords or
phrases, as this will help readers to find it. It is important to
avoid over-repetition of such phrases as this can result in a page
being rejected by search engines. Ensure that your abstract
reads well and is grammatically correct.
Index Terms—Enter key words or phrases in alphabetical order,
separated by commas. For a list of suggested keywords, send a
blank e-mail to [email protected] or visit
http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt
INTRODUCTION
T
HIS document is a template for Microsoft Word versions 6.0 or
later. If you are reading a paper or PDF version of this
document, please download the electronic file,
trans_jour.docx, from the IEEE Web site at
www.ieee.org/authortools so you can use it to prepare your
manuscript. If you would prefer to use LaTeX, download
IEEE’s LaTeX style and sample files from the same Web page.
You can also explore using the Overleaf editor at
https://www.overleaf.com/blog/278-how-to-use-overleaf-with-
ieee-collabratec-your-quick-guide-to-getting-
started#.Vp6tpPkrKM9
If your paper is intended for a conference, please contact your
conference editor concerning acceptable word processor formats
for your particular conference. Guidelines For Manuscript
Preparation
When you open trans_jour.docx, select “Page Layout” from the
“View” menu in the menu bar (View | Page Layout), (these
instructions assume MS 6.0. Some versions may have alternate
ways to access the same functionalities noted here). Then, type
over sections of trans_jour.docx or cut and paste from another
document and use markup styles. The pull-down style menu is
at the left of the Formatting Toolbar at the top of your Word
window (for example, the style at this point in the document is
“Text”). Highlight a section that you want to designate with a
certain style, and then select the appropriate name on the style
menu. The style will adjust your fonts and line spacing. Do not
change the font sizes or line spacing to squeeze more text into a
limited number of pages.Use italics for emphasis; do not
underline.
To insert images in Word, position the cursor at the insertion
point and either use Insert | Picture | From File or copy the
image to the Windows clipboard and then Edit | Paste Special |
Picture (with “float over text” unchecked).
IEEE will do the final formatting of your paper. If your paper is
intended for a conference, please observe the conference page
limits.
Abbreviations and Acronyms
Define abbreviations and acronyms the first time they are used
in the text, even after they have already been defined in the
abstract. Abbreviations such as IEEE, SI, ac, and dc do not have
to be defined. Abbreviations that incorporate periods should not
have spaces: write “C.N.R.S.,” not “C. N. R. S.” Do not use
abbreviations in the title unless they are unavoidable (for
example, “IEEE” in the title of this article).
Other Recommendations
Use one space after periods and colons. Hyphenate complex
modifiers: “zero-field-cooled magnetization.” Avoid dangling
participles, such as, “Using (1), the potential was calculated.”
[It is not clear who or what used (1).] Write instead, “The
potential was calculated by using (1),” or “Using (1), we
calculated the potential.”
Use a zero before decimal points: “0.25,” not “.25.” Use “cm3,”
not “cc.” Indicate sample dimensions as “0.1 cm 0.2 cm,” not
“0.1 0.2 cm2.” The abbreviation for “seconds” is “s,” not
“sec.” Use “Wb/m2” or “webers per square meter,” not
“webers/m2.” When expressing a range of values, write “7 to 9”
or “7-9,” not “7~9.”
A parenthetical statement at the end of a sentence is punctuated
outside of the closing parenthesis (like this). (A parenthetical
sentence is punctuated within the parentheses.) In American
English, periods and commas are within quotation marks, like
“this period.” Other punctuation is “outside”! Avoid
contractions; for example, write “do not” instead of “don’t.”
The serial comma is preferred: “A, B, and C” instead of “A, B
and C.”
If you wish, you may write in the first person singular or plural
and use the active voice (“I observed that ...” or “We observed
that ...” instead of “It was observed that ...”). Remember to
check spelling. If your native language is not English, please
get a native English-speaking colleague to carefully proofread
your paper.MATH
If you are using Word, use either the Microsoft Equation Editor
or the MathType add-on (http://www.mathtype.com) for
equations in your paper (Insert | Object | Create New | Microsoft
Equation or MathType Equation). “Float over text” should not
be selected.
Equations
Number equations consecutively with equation numbers in
parentheses flush with the right margin, as in (1). First use the
equation editor to create the equation. Then select the
“Equation” markup style. Press the tab key and write the
equation number in parentheses. To make your equations more
compact, you may use the solidus ( / ), the exp function, or
appropriate exponents. Use parentheses to avoid ambiguities in
denominators. Punctuate equations when they are part of a
sentence, as in
(1)
Be sure that the symbols in your equation have been defined
before the equation appears or immediately following. Italicize
symbols (T might refer to temperature, but T is the unit tesla).
Refer to “(1),” not “Eq. (1)” or “equation (1),” except at the
beginning of a sentence: “Equation (1) is ... .”Units
Use either SI (MKS) or CGS as primary units. (SI units are
strongly encouraged.) English units may be used as secondary
units (in parentheses). This applies to papers in data storage.
For example, write “15 Gb/cm2 (100 Gb/in2).” An exception is
when English units are used as identifiers in trade, such as “3½-
in disk drive.” Avoid combining SI and CGS units, such as
current in amperes and magnetic field in oersteds. This often
leads to confusion because equations do not balance
dimensionally. If you must use mixed units, clearly state the
units for each quantity in an equation.
The SI unit for magnetic field strength H is A/m. However, if
you wish to use units of T, either refer to magnetic flux density
B or magnetic field strength symbolized as µ0H. Use the center
dot to separate compound units, e.g., “A·m2.”Some Common
Mistakes
The word “data” is plural, not singular. The subscript for the
permeability of vacuum µ0 is zero, not a lowercase letter “o.”
The term for residual magnetization is “remanence”; the
adjective is “remanent”; do not write “remnance” or “remnant.”
Use the word “micrometer” instead of “micron.” A graph within
a graph is an “inset,” not an “insert.” The word “alternatively”
is preferred to the word “alternately” (unless you really mean
something that alternates). Use the word “whereas” instead of
“while” (unless you are referring to simultaneous events). Do
not use the word “essentially” to mean “approximately” or
“effectively.” Do not use the word “issue” as a euphemism for
“problem.” When compositions are not specified, separate
chemical symbols by en-dashes; for example, “NiMn” indicates
the intermetallic compound Ni0.5Mn0.5 whereas “Ni–Mn”
indicates an alloy of some composition NixMn1-x.
Be aware of the different meanings of the homophones “affect”
(usually a verb) and “effect” (usually a noun), “complement”
and “compliment,” “discreet” and “discrete,” “principal” (e.g.,
“principal investigator”) and “principle” (e.g., “principle of
measurement”). Do not confuse “imply” and “infer.”
Prefixes such as “non,” “sub,” “micro,” “multi,” and “ultra” are
not independent words; they should be joined to the words they
modify, usually without a hyphen. There is no period after the
“et” in the Latin abbreviation “et al.” (it is also italicized). The
abbreviation “i.e.,” means “that is,” and the abbreviation “e.g.,”
means “for example” (these abbreviations are not italicized).
A general IEEE styleguide is available at
www.ieee.org/authortools.
Fig. 1. Magnetization as a function of applied field. Note that
“Fig.” is abbreviated. There is a period after the figure number,
followed by two spaces. It is good practice to explain the
significance of the figure in the caption.
TABLE I
Units for Magnetic Properties
Vertical lines are optional in tables. Statements that serve as
captions for the entire table do not need footnote letters.
aGaussian units are the same as cg emu for magnetostatics; Mx
= maxwell, G = gauss, Oe = oersted; Wb = weber, V = volt, s =
second, T = tesla, m = meter, A = ampere, J = joule, kg =
kilogram, H = henry.
Guidelines for Graphics Preparation
and Submission
Types of Graphics
The following list outlines the different types of graphics
published in IEEE journals. They are categorized based on their
construction, and use of color / shades of gray:
Color/Grayscale figures
Figures that are meant to appear in color, or shades of
black/gray. Such figures may include photographs,
illustrations, multicolor graphs, and flowcharts.
Line Art figuresFigures that are composed of only black lines
and shapes. These figures should have no shades or half-tones
of gray, only black and white.
Author photosHead and shoulders shots of authors that appear at
the end of our papers.
Tables
Data charts which are typically black and white, but sometimes
include color.
Multipart figures
Figures compiled of more than one sub-figure presented side-
by-side, or stacked. If a multipart figure is made up of multiple
figure types (one part is lineart, and another is grayscale or
color) the figure should meet the stricter guidelines.
File Formats For Graphics
Format and save your graphics using a suitable graphics
processing program that will allow you to create the images as
PostScript (PS), Encapsulated PostScript (.EPS), Tagged Image
File Format (.TIFF), Portable Document Format (.PDF), or
Portable Network Graphics (.PNG) sizes them, and adjusts the
resolution settings. If you created your source files in one of the
following programs you will be able to submit the graphics
without converting to a PS, EPS, TIFF, PDF, or PNG file:
Microsoft Word, Microsoft PowerPoint, or Microsoft Excel.
Though it is not required, it is strongly recommended that these
files be saved in PDF format rather than DOC, XLS, or PPT.
Doing so will protect your figures from common font and arrow
stroke issues that occur when working on the files across
multiple platforms. When submitting your final paper, your
graphics should all be submitted individually in one of these
formats along with the manuscript.
Sizing of Graphics
Most charts, graphs, and tables are one column wide (3.5 inches
/ 88 millimeters / 21 picas) or page wide (7.16 inches / 181
millimeters / 43 picas). The maximum depth a graphic can be is
8.5 inches (216 millimeters / 54 picas). When choosing the
depth of a graphic, please allow space for a caption. Figures can
be sized between column and page widths if the author chooses,
however it is recommended that figures are not sized less than
column width unless when necessary.
There is currently one publication with column measurements
that do not coincide with those listed above. Proceedings of the
IEEE has a column measurement of 3.25 inches (82.5
millimeters / 19.5 picas).
The final printed size of author photographs is exactly
1 inch wide by 1.25 inches tall (25.4 millimeters x 31.75
millimeters / 6 picas x 7.5 picas). Author photos printed in
editorials measure 1.59 inches wide by 2 inches tall (40
millimeters x 50 millimeters / 9.5 picas x 12 picas).
Resolution
The proper resolution of your figures will depend on the type of
figure it is as defined in the “Types of Figures” section. Author
photographs, color, and grayscale figures should be at least
300dpi. Line art, including tables should be a minimum of
600dpi.
Vector Art
In order to preserve the figures’ integrity across multiple
computer platforms, we accept files in the following formats:
.EPS/.PDF/.PS. All fonts must be embedded or text converted to
outlines in order to achieve the best-quality results.
Color Space
The term color space refers to the entire sum of colors that can
be represented within the said medium. For our purposes, the
three main color spaces are Grayscale, RGB (red/green/blue)
and CMYK (cyan/magenta/yellow/black). RGB is generally used
with on-screen graphics, whereas CMYK is used for printing
purposes.
All color figures should be generated in RGB or CMYK color
space. Grayscale images should be submitted in Grayscale color
space. Line art may be provided in grayscale OR bitmap
colorspace. Note that “bitmap colorspace” and “bitmap file
format” are not the same thing. When bitmap color space is
selected, .TIF/.TIFF/.PNG are the recommended file formats.
Accepted Fonts Within Figures
When preparing your graphics IEEE suggests that you use of
one of the following Open Type fonts: Times New Roman,
Helvetica, Arial, Cambria, and Symbol. If you are supplying
EPS, PS, or PDF files all fonts must be embedded. Some fonts
may only be native to your operating system; without the fonts
embedded, parts of the graphic may be distorted or missing.
A safe option when finalizing your figures is to strip out the
fonts before you save the files, creating “outline” type. This
converts fonts to artwork what will appear uniformly on any
screen.
Using Labels Within FiguresFigure Axis labels
Figure axis labels are often a source of confusion. Use words
rather than symbols. As an example, write the quantity
“Magnetization,” or “Magnetization M,” not just “M.” Put units
in parentheses. Do not label axes only with units. As in Fig. 1,
for example, write “Magnetization (A/m)” or “Magnetization
(Am1),” not just “A/m.” Do not label axes with a ratio of
quantities and units. For example, write “Temperature (K),” not
“Temperature/K.”
Multipliers can be especially confusing. Write “Magnetization
(kA/m)” or “Magnetization (103 A/m).” Do not write
“Magnetization (A/m) 1000” because the reader would not
know whether the top axis label in Fig. 1 meant 16000 A/m or
0.016 A/m. Figure labels should be legible, approximately 8 to
10 point type.
Subfigure Labels in Multipart Figures and Tables
Multipart figures should be combined and labeled before final
submission. Labels should appear centered below each subfigure
in 8 point Times New Roman font in the format of (a) (b) (c).
File Naming
Figures (line artwork or photographs) should be named starting
with the first 5 letters of the author’s last name. The next
characters in the filename should be the number that represents
the sequential location of this image in your article. For
example, in author “Anderson’s” paper, the first three figures
would be named ander1.tif, ander2.tif, and ander3.ps.
Tables should contain only the body of the table (not the
caption) and should be named similarly to figures, except that
‘.t’ is inserted in-between the author’s name and the table
number. For example, author Anderson’s first three tables
would be named ander.t1.tif, ander.t2.ps, ander.t3.eps.
Author photographs should be named using the first five
characters of the pictured author’s last name. For example, four
author photographs for a paper may be named: oppen.ps,
moshc.tif, chen.eps, and duran.pdf.
If two authors or more have the same last name, their first
initial(s) can be substituted for the fifth, fourth, third... letters
of their surname until the degree where there is differentiation.
For example, two authors Michael and Monica Oppenheimer’s
photos would be named oppmi.tif, and oppmo.eps.
Referencing a Figure or Table Within Your Paper
When referencing your figures and tables within your paper, use
the abbreviation “Fig.” even at the beginning of a sentence. Do
not abbreviate “Table.” Tables should be numbered with Roman
Numerals.
Checking Your Figures: The IEEE Graphics Analyzer
The IEEE Graphics Analyzer enables authors to pre-screen their
graphics for compliance with IEEE Transactions and Journals
standards before submission. The online tool, located at
http://graphicsqc.ieee.org/, allows authors to upload their
graphics in order to check that each file is the correct file
format, resolution, size and colorspace; that no fonts are
missing or corrupt; that figures are not compiled in layers or
have transparency, and that they are named according to the
IEEE Transactions and Journals naming convention. At the end
of this automated process, authors are provided with a detailed
report on each graphic within the web applet, as well as by
email.
For more information on using the Graphics Analyzer
or any other graphics related topic, contact the IEEE Graphics
Help Desk by e-mail at [email protected].
Submitting Your Graphics
Because IEEE will do the final formatting of your paper,
you do not need to position figures and tables at the top and
bottom of each column. In fact, all figures, figure captions, and
tables can be placed at the end of your paper. In addition to, or
even in lieu of submitting figures within your final manuscript,
figures should be submitted individually, separate from the
manuscript in one of the file formats listed above in section VI-
J. Place figure captions below the figures; place table titles
above the tables. Please do not include captions as part of the
figures, or put them in “text boxes” linked to the figures. Also,
do not place borders around the outside of your figures.
Color Processing / Printing in IEEE Journals
All IEEE Transactions, Journals, and Letters allow an author to
publish color figures on IEEE Xplore® at no charge, and
automatically convert them to grayscale for print versions. In
most journals, figures and tables may alternatively be printed in
color if an author chooses to do so. Please note that this service
comes at an extra expense to the author. If you intend to have
print color graphics, include a note with your final paper
indicating which figures or tables you would like to be handled
that way, and stating that you are willing to pay the additional
fee.
Conclusion
A conclusion section is not required. Although a conclusion
may review the main points of the paper, do not replicate the
abstract as the conclusion. A conclusion might elaborate on the
importance of the work or suggest applications and extensions.
Appendix
Appendixes, if needed, appear before the acknowledgment.
Acknowledgment
The preferred spelling of the word “acknowledgment” in
American English is without an “e” after the “g.” Use the
singular heading even if you have many acknowledgments.
Avoid expressions such as “One of us (S.B.A.) would like to
thank ... .” Instead, write “F. A. Author thanks ... .” In most
cases, sponsor and financial support acknowledgments are
placed in the unnumbered footnote on the first page, not here.
References and Footnotes
A. References
References need not be cited in text. When they are, they appear
on the line, in square brackets, inside the punctuation. Multiple
references are each numbered with separate brackets. When
citing a section in a book, please give the relevant page
numbers. In text, refer simply to the reference number. Do not
use “Ref.” or “reference” except at the beginning of a sentence:
“Reference [3] shows ... .” Please do not use automatic endnotes
in Word, rather, type the reference list at the end of the paper
using the “References” style.
Reference numbers are set flush left and form a column of their
own, hanging out beyond the body of the reference. The
reference numbers are on the line, enclosed in square brackets.
In all references, the given name of the author or editor is
abbreviated to the initial only and precedes the last name. Use
them all; use et al. only if names are not given. Use commas
around Jr., Sr., and III in names. Abbreviate conference titles.
When citing IEEE transactions, provide the issue number, page
range, volume number, year, and/or month if available. When
referencing a patent, provide the day and the month of issue, or
application. References may not include all information; please
obtain and include relevant information. Do not combine
references. There must be only one reference with each number.
If there is a URL included with the print reference, it can be
included at the end of the reference.
Other than books, capitalize only the first word in a paper title,
except for proper nouns and element symbols. For papers
published in translation journals, please give the English
citation first, followed by the original foreign-language citation
See the end of this document for formats and examples of
common references. For a complete discussion of references and
their formats, see the IEEE style manual at
www.ieee.org/authortools.
Footnotes
Number footnotes separately in superscripts (Insert |
Footnote).[footnoteRef:2] Place the actual footnote at the
bottom of the column in which it is cited; do not put footnotes
in the reference list (endnotes). Use letters for table footnotes
(see Table I). [2: It is recommended that footnotes be avoided
(except for the unnumbered footnote with the receipt date on the
first page). Instead, try to integrate the footnote information
into the text.]
Submitting Your Paper for Review
Review Stage Using Word 6.0 or Higher
If you want to submit your file with one column electronically,
please do the following:
--First, click on the View menu and choose Print Layout.
--Second, place your cursor in the first paragraph. Go to the
Format menu, choose Columns, choose one column Layout, and
choose “apply to whole document” from the dropdown menu.
--Third, click and drag the right margin bar to just over 4 inches
in width.
The graphics will stay in the “second” column, but you can drag
them to the first column. Make the graphic wider to push out
any text that may try to fill in next to the graphic.
Final Stage Using Word 6.0
When you submit your final version (after your paper has been
accepted), print it in two-column format, including figures and
tables. You must also send your final manuscript on a disk, via
e-mail, or through a Web manuscript submission system as
directed by the society contact. You may use Zip for large files,
or compress files using Compress, Pkzip, Stuffit, or Gzip.
Also, send a sheet of paper or PDF with complete contact
information for all authors. Include full mailing addresses,
telephone numbers, fax numbers, and e-mail addresses. This
information will be used to send each author a complimentary
copy of the journal in which the paper appears. In addition,
designate one author as the “corresponding author.” This is the
author to whom proofs of the paper will be sent. Proofs are sent
to the corresponding author only.
Review Stage Using ScholarOne® Manuscripts
Contributions to the Transactions, Journals, and Letters may be
submitted electronically on IEEE’s on-line manuscript
submission and peer-review system, ScholarOne® Manuscripts.
You can get a listing of the publications that participate in
ScholarOne at
http://www.ieee.org/publications_standards/publications/authors
/authors_submission.html First check if you have an existing
account. If there is none, please create a new account. After
logging in, go to your Author Center and click “Submit First
Draft of a New Manuscript.”
Along with other information, you will be asked to select the
subject from a pull-down list. Depending on the journal, there
are various steps to the submission process; you must complete
all steps for a complete submission. At the end of each step you
must click “Save and Continue”; just uploading the paper is not
sufficient. After the last step, you should see a confirmation
that the submission is complete. You should also receive an e-
mail confirmation. For inquiries regarding the submission of
your paper on ScholarOne Manuscripts, please contact
[email protected] or call +1 732 465 5861.
ScholarOne Manuscripts will accept files for review in various
formats. Please check the guidelines of the specific journal for
which you plan to submit.
You will be asked to file an electronic copyright form
immediately upon completing the submission process (authors
are responsible for obtaining any security clearances). Failure to
submit the electronic copyright could result in publishing delays
later. You will also have the opportunity to designate your
article as “open access” if you agree to pay the IEEE open
access fee.
Final Stage Using ScholarOne Manuscripts
Upon acceptance, you will receive an email with specific
instructions regarding the submission of your final files. To
avoid any delays in publication, please be sure to follow these
instructions. Most journals require that final submissions be
uploaded through ScholarOne Manuscripts, although some may
still accept final submissions via email. Final submissions
should include source files of your accepted manuscript, high
quality graphic files, and a formatted pdf file. If you have any
questions regarding the final submission process, please contact
the administrative contact for the journal.
In addition to this, upload a file with complete contact
information for all authors. Include full mailing addresses,
telephone numbers, fax numbers, and e-mail addresses.
Designate the author who submitted the manuscript on
ScholarOne Manuscripts as the “corresponding author.” This is
the only author to whom proofs of the paper will be sent.
Copyright Form
Authors must submit an electronic IEEE Copyright Form (eCF)
upon submitting their final manuscript files. You can access the
eCF system through your manuscript submission system or
through the Author Gateway. You are responsible for obtaining
any necessary approvals and/or security clearances. For
additional information on intellectual property rights, visit the
IEEE Intellectual Property Rights department web page at
http://www.ieee.org/publications_standards/publications/rights/i
ndex.html. IEEE Publishing Policy
The general IEEE policy requires that authors should only
submit original work that has neither appeared elsewhere for
publication, nor is under review for another refereed
publication. The submitting author must disclose all prior
publication(s) and current submissions when submitting a
manuscript. Do not publish “preliminary” data or results. The
submitting author is responsible for obtaining agreement of all
coauthors and any consent required from employers or sponsors
before submitting an article. The IEEE Transactions and
Journals Department strongly discourages courtesy authorship;
it is the obligation of the authors to cite only relevant prior
work.
The IEEE Transactions and Journals Department does not
publish conference records or proceedings, but can publish
articles related to conferences that have undergone rigorous
peer review. Minimally, two reviews are required for every
article submitted for peer review.Publication Principles
The two types of contents of that are published are; 1) peer-
reviewed and 2) archival. The Transactions and Journals
Department publishes scholarly articles of archival value as
well as tutorial expositions and critical reviews of classical
subjects and topics of current interest.
Authors should consider the following points:
1) Technical papers submitted for publication must advance the
state of knowledge and must cite relevant prior work.
2) The length of a submitted paper should be commensurate
with the importance, or appropriate to the complexity, of the
work. For example, an obvious extension of previously
published work might not be appropriate for publication or
might be adequately treated in just a few pages.
3) Authors must convince both peer reviewers and the editors of
the scientific and technical merit of a paper; the standards of
proof are higher when extraordinary or unexpected results are
reported.
4) Because replication is required for scientific progress, papers
submitted for publication must provide sufficient information to
allow readers to perform similar experiments or calculations
and use the reported results. Although not everything need be
disclosed, a paper must contain new, useable, and fully
described information. For example, a specimen’s chemical
composition need not be reported if the main purpose of a paper
is to introduce a new measurement technique. Authors should
expect to be challenged by reviewers if the results are not
supported by adequate data and critical details.
5) Papers that describe ongoing work or announce the latest
technical achievement, which are suitable for presentation at a
professional conference, may not be appropriate for publication.
References
Basic format for books:
J. K. Author, “Title of chapter in the book,” in Title of His
Published Book, xth ed. City of Publisher, (only U.S. State),
Country: Abbrev. of Publisher, year, ch. x, sec. x, pp. xxx–xxx.
Examples:
G. O. Young, “Synthetic structure of industrial plastics,” in
Plastics, 2nd ed., vol. 3, J. Peters, Ed. New York, NY, USA:
McGraw-Hill, 1964, pp. 15–64.
W.-K. Chen, Linear Networks and Systems. Belmont, CA, USA:
Wadsworth, 1993, pp. 123–135.
Basic format for periodicals:
J. K. Author, “Name of paper,” Abbrev. Title of Periodical,
vol. x, no. x, pp. xxx-xxx, Abbrev. Month, year, DOI.
10.1109.XXX.123456.
Examples:
J. U. Duncombe, “Infrared navigation—Part I: An assessment of
feasibility,” IEEE Trans. Electron Devices, vol. ED-11, no. 1,
pp. 34–39, Jan. 1959, 10.1109/TED.2016.2628402.
E. P. Wigner, “Theory of traveling-wave optical laser,”
Phys. Rev.,
vol. 134, pp. A635–A646, Dec. 1965.
E. H. Miller, “A note on reflector arrays,” IEEE Trans.
Antennas Propagat., to be published.
Basic format for reports:
J. K. Author, “Title of report,” Abbrev. Name of Co., City of
Co., Abbrev. State, Country, Rep. xxx, year.
Examples:
E. E. Reber, R. L. Michell, and C. J. Carter, “Oxygen
absorption in the earth’s atmosphere,” Aerospace Corp., Los
Angeles, CA, USA, Tech. Rep. TR-0200 (4230-46)-3, Nov.
1988.
J. H. Davis and J. R. Cogdell, “Calibration program for the 16-
foot antenna,” Elect. Eng. Res. Lab., Univ. Texas, Austin, TX,
USA, Tech. Memo. NGL-006-69-3, Nov. 15, 1987.
Basic format for handbooks:
Name of Manual/Handbook, x ed., Abbrev. Name of Co., City
of Co., Abbrev. State, Country, year, pp. xxx-xxx.
Examples:
Transmission Systems for Communications, 3rd ed., Western
Electric Co., Winston-Salem, NC, USA, 1985, pp. 44–60.
Motorola Semiconductor Data Manual, Motorola Semiconductor
Products Inc., Phoenix, AZ, USA, 1989.
Basic format for books (when available online):
J. K. Author, “Title of chapter in the book,” in Title of
Published Book, xth ed. City of Publisher, State, Country:
Abbrev. of Publisher, year, ch. x, sec. x, pp. xxx–xxx. [Online].
Available: http://www.web.com
Examples:
G. O. Young, “Synthetic structure of industrial plastics,” in
Plastics, vol. 3, Polymers of Hexadromicon, J. Peters, Ed., 2nd
ed. New York, NY, USA: McGraw-Hill, 1964, pp. 15-64.
[Online]. Available: http://www.bookref.com.
The Founders’ Constitution, Philip B. Kurland and Ralph
Lerner, eds., Chicago, IL, USA: Univ. Chicago Press, 1987.
[Online]. Available: http://press-pubs.uchicago.edu/founders/
The Terahertz Wave eBook. ZOmega Terahertz Corp., 2014.
[Online]. Available: http://dl.z-
thz.com/eBook/zomega_ebook_pdf_1206_sr.pdf. Accessed on:
May 19, 2014.
Philip B. Kurland and Ralph Lerner, eds., The Founders’
Constitution. Chicago, IL, USA: Univ. of Chicago Press, 1987,
Accessed on: Feb. 28, 2010, [Online] Available: http://press-
pubs.uchicago.edu/founders/
Basic format for journals (when available online):
J. K. Author, “Name of paper,” Abbrev. Title of Periodical, vol.
x, no. x, pp. xxx-xxx, Abbrev. Month, year. Accessed on:
Month, Day, year, DOI: 10.1109.XXX.123456, [Online].
Examples:
J. S. Turner, “New directions in communications,” IEEE J. Sel.
Areas Commun., vol. 13, no. 1, pp. 11-23, Jan. 1995.
W. P. Risk, G. S. Kino, and H. J. Shaw, “Fiber-optic frequency
shifter using a surface acoustic wave incident at an oblique
angle,” Opt. Lett., vol. 11, no. 2, pp. 115–117, Feb. 1986.
P. Kopyt et al., “Electric properties of graphene-based
conductive layers from DC up to terahertz range,” IEEE THz
Sci. Technol., to be published. DOI:
10.1109/TTHZ.2016.2544142.
Basic format for papers presented at conferences (when
available online):
J.K. Author. (year, month). Title. presented at abbrev.
conference title. [Type of Medium]. Available: site/path/file
Example:
PROCESS Corporation, Boston, MA, USA. Intranets: Internet
technologies deployed behind the firewall for corporate
productivity. Presented at INET96 Annual Meeting. [Online].
Available: http://home.process.com/Intranets/wp2.htp
Basic format for reports and handbooks (when available
online):
J. K. Author. “Title of report,” Company. City, State, Country.
Rep. no., (optional: vol./issue), Date. [Online] Available:
site/path/file
Examples:
R. J. Hijmans and J. van Etten, “Raster: Geographic analysis
and modeling with raster data,” R Package Version 2.0-12, Jan.
12, 2012. [Online]. Available: http://CRAN.R-
project.org/package=raster
Teralyzer. Lytera UG, Kirchhain, Germany [Online]. Available:
http://www.lytera.de/Terahertz_THz_Spectroscopy.php?id=hom
e, Accessed on: Jun. 5, 2014
Basic format for computer programs and electronic documents
(when available online):
Legislative body. Number of Congress, Session. (year, month
day). Number of bill or resolution, Title. [Type of medium].
Available: site/path/file
NOTE: ISO recommends that capitalization follow the accepted
practice for the language or script in which the information is
given.
Example:
U.S. House. 102nd Congress, 1st Session. (1991, Jan. 11). H.
Con. Res. 1, Sense of the Congress on Approval of Military
Action. [Online]. Available: LEXIS Library: GENFED File:
BILLS
Basic format for patents (when available online):
Name of the invention, by inventor’s name. (year, month day).
Patent Number[Type of medium]. Available: site/path/file
Example:
Musical toothbrush with mirror, by L.M.R. Brooks. (1992, May
19). Patent D 326 189
[Online]. Available: NEXIS Library: LEXPAT
File: DES
Basic format for conference proceedings (published):
J. K. Author, “Title of paper,” in Abbreviated Name of Conf.,
City of Conf., Abbrev. State (if given), Country, year, pp.
xxxxxx.
Example:
D. B. Payne and J. R. Stern, “Wavelength-switched pas- sively
coupled single-mode optical network,” in Proc. IOOC-ECOC,
Boston, MA, USA,1985,
pp. 585–590.
Example for papers presented at conferences (unpublished):
D. Ebehard and E. Voges, “Digital single sideband detection for
interferometric sensors,” presented at the 2nd Int. Conf. Optical
Fiber Sensors, Stuttgart, Germany, Jan. 2-5, 1984.
Basic format for patents:
J. K. Author, “Title of patent,” U.S. Patent x xxx xxx, Abbrev.
Month, day, year.
Example:
G. Brandli and M. Dick, “Alternating current fed power
supply,” U.S. Patent 4 084 217, Nov. 4, 1978.
Basic formatfor theses (M.S.) and dissertations (Ph.D.):
a) J. K. Author, “Title of thesis,” M.S. thesis, Abbrev. Dept.,
Abbrev. Univ., City of Univ., Abbrev. State, year.
b) J. K. Author, “Title of dissertation,” Ph.D. dissertation,
Abbrev. Dept., Abbrev. Univ., City of Univ., Abbrev. State,
year.
Examples:
J. O. Williams, “Narrow-band analyzer,” Ph.D. dissertation,
Dept. Elect. Eng., Harvard Univ., Cambridge, MA, USA, 1993.
N. Kawasaki, “Parametric study of thermal and chemical
nonequilibrium nozzle flow,” M.S. thesis, Dept. Electron. Eng.,
Osaka Univ., Osaka, Japan, 1993.
Basic format for the most common types of unpublished
references:
a) J. K. Author, private communication, Abbrev. Month, year.
b) J. K. Author, “Title of paper,” unpublished.
c) J. K. Author, “Title of paper,” to be published.
Examples:
A. Harrison, private communication, May 1995.
B. Smith, “An approach to graphs of linear forms,” unpublished.
A. Brahms, “Representation error for real numbers in binary
computer arithmetic,” IEEE Computer Group Repository, Paper
R-67-85.
Basic formats for standards:
a) Title of Standard, Standard number, date.
b) Title of Standard, Standard number, Corporate author,
location, date.
Examples:
IEEE Criteria for Class IE Electric Systems, IEEE Standard
308, 1969.
Letter Symbols for Quantities, ANSI Standard Y10.5-1968.
Article number in reference examples:
R. Fardel, M. Nagel, F. Nuesch, T. Lippert, and A. Wokaun,
“Fabrication of organic light emitting diode pixels by laser-
assisted forward transfer,” Appl. Phys. Lett., vol. 91, no. 6,
Aug. 2007, Art. no. 061103.
J. Zhang and N. Tansu, “Optical gain and laser characteristics
of InGaN quantum wells on ternary InGaN substrates,” IEEE
Photon. J., vol. 5, no. 2, Apr. 2013, Art. no. 2600111
Example when using et al.:
S. Azodolmolky et al., Experimental demonstration of an
impairment aware network planning and operation tool for
transparent/translucent optical networks,” J. Lightw. Technol.,
vol. 29, no. 4, pp. 439–448, Sep. 2011.
First A. Author (M’76–SM’81–F’87) and all authors may
include biographies. Biographies are often not included in
conference-related papers. This author became a Member (M) of
IEEE in 1976, a Senior Member (SM) in 1981, and a Fellow (F)
in 1987. The first paragraph may contain a place and/or date of
birth (list place, then date). Next, the author’s educational
background is listed. The degrees should be listed with type of
degree in what field, which institution, city, state, and country,
and year the degree was earned. The author’s major field of
study should be lower-cased.
The second paragraph uses the pronoun of the person (he or she)
and not the author’s last name. It lists military and work
experience, including summer and fellowship jobs. Job titles are
capitalized. The current job must have a location; previous
positions may be listed without one. Information concerning
previous publications may be included. Try not to list more than
three books or published articles. The format for listing
publishers of a book within the biography is: title of book
(publisher name, year) similar to a reference. Current and
previous research interests end the paragraph.
The third paragraph begins with the author’s title and last name
(e.g., Dr. Smith, Prof. Jones, Mr. Kajor, Ms. Hunter). List any
memberships in professional societies other than the IEEE.
Finally, list any awards and work for IEEE committees and
publications. If a photograph is provided, it should be of good
quality, and professional-looking. Following are two examples
of an author’s biography.
Second B. Author was born in Greenwich Village, New York,
NY, USA in 1977. He received the B.S. and M.S. degrees in
aerospace engineering from the University of Virginia,
Charlottesville, in 2001 and the Ph.D. degree in mechanical
engineering from Drexel University, Philadelphia, PA, in 2008.
From 2001 to 2004, he was a Research Assistant with the
Princeton Plasma Physics Laboratory. Since 2009, he has been
an Assistant Professor with the Mechanical Engineering
Department, Texas A&M University, College Station. He is the
author of three books, more than 150 articles, and more than 70
inventions. His research interests include high-pressure and
high-density nonthermal plasma discharge processes and
applications, microscale plasma discharges, discharges in
liquids, spectroscopic diagnostics, plasma propulsion, and
innovation plasma applications. He is an Associate Editor of the
journal Earth, Moon, Planets, and holds two patents.
Dr. Author was a recipient of the International Association of
Geomagnetism and Aeronomy Young Scientist Award for
Excellence in 2008, and the IEEE Electromagnetic
Compatibility Society Best Symposium Paper Award in 2011.
1
> REPLACE THIS LINE WITH YOUR PAPER
IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO
EDIT) <
Third C. Author, Jr. (M’87) received the B.S. degree in
mechanical engineering from National Chung Cheng University,
Chiayi, Taiwan, in 2004 and the M.S. degree in mechanical
engineering from National Tsing Hua University, Hsinchu,
Taiwan, in 2006. He is currently pursuing the Ph.D. degree in
mechanical engineering at Texas A&M University, College
Station, TX, USA.
From 2008 to 2009, he was a Research Assistant with the
Institute of Physics, Academia Sinica, Tapei, Taiwan. His
research interest includes the development of surface processing
and biological/medical treatment techniques using nonthermal
atmospheric pressure plasmas, fundamental study of plasma
sources, and fabrication of micro- or nanostructured surfaces.
Mr. Author’s awards and honors include the Frew Fellowship
(Australian Academy of Science), the I. I. Rabi Prize (APS), the
European Frequency and Time Forum Award, the Carl Zeiss
Research Award, the William F. Meggers Award and the Adolph
Lomb Medal (OSA).
×
PAN final
draft_revised.pdf
A Disaster Recovery System for Location
Identification-based Low Power Wide Area
Networks (LPWAN)
James Jin Kang
School of IT & Engineering
Melbourne Institute of Technology
Melbourne, Australia
[email protected]
Iryna Khodasevych
School of IT & Engineering
Melbourne Institute of Technology
Melbourne, Australia
[email protected]
Sasan Adibi
School of Information Technology
Deakin University
Burwood, Australia
[email protected]
Abstract—Low Power Wide Area Networks (LPWAN) are
used in a number of applications, including disaster monitoring
and recovery networks. LPWAN sensors capture data bits and
transmit them via dedicated gateways, which are connected to
public carrier networks (e.g., cellular networks). One of the
challenges encountered in disaster management scenarios
revolves
around the carry/forward sensed data and geographical location
information dissemination to the disaster relief operatives
(Disaster Relief Agency; DRA) to identify, characterise, and
prioritise the affected areas. There are network topology
options,
including cellular, circuit switched, and peer-to-peer networks
to
reach the destination. From the disaster natural disaster
predictions point of view, collecting geographical location data
and
timestamp is vital. This paper proposes the usage of Pseudo A
Number (PAN), that is, the calling party address, which is used
by
every network to include the location information instead of the
actual calling party address of the gateway in LPWAN. This
PAN
information can further be analysed by the DRA to identify the
affected areas as well as to predict the complications of the
disaster
impacts in addition to the past history of the damages. This
paper
aims to propose a solution that can predict disaster proceedings
based on propagation and the velocity of impact using vector
calculation of location data and timestamp, which are
transmitted
by sensors through PAN of gateway in LPWAN.
Keywords—Pseudo A Number (PAN); Lower Power Wide Area
Network (LPWAN); Disaster Recovery System; Machine to
Machine
(M2M) interface; Disaster Recovery Assistance Agency (DRA)
I. INTRODUCTION
Disaster monitoring and recovery mechanisms have been in
demand for as long as natural disasters and their adverse effects
are known to humankind. The long list of natural and man-made
disaster includes: floods, heavy snowfalls, wild/bush fires,
storms/hurricanes, tsunamis, earthquakes, pandemics and
nuclear disasters [1, 2]. Even though there is a strong need to
implement communications between the affected disaster-
stricken areas and the disaster managing offices in local or
global agencies such as the United Nations and the European
Commission, the goal is to secure the necessary
communications
to support first responder activities in a damaged area with a
strategy to restore network services in the aftermath of the
initial
shock [3]. As the Internet is emerging with prevalent
technologies such as big data, cloud computing, Internet of
Things (IoT), and 5G cellular networks, it is now feasible to
provide low-cost networks covering broad and wide areas such
as LPWANs or long range (LoRa) networks [4, 5]. These
technologies allow sensors to be deployed and managed with a
low power (e.g. 25mW) wide area client and up to 25 km test
link for the operating areas for sensor networks [6]. When IoT
networks, which are predicted to have up to 50 – 100 billion
devices connected to the internet by 2020 [7], will be deployed
and converged with these sensor networks, it may be possible to
monitor virtually all habitable areas without requiring
additional
managing systems through self-communications amongst
devices such as machine-to-machine (M2M) interfaces and
device-to-device (D2D) communication technologies. For
example, a mobile device communicates with a peer-to-peer
wireless communications network via D2D communication
when the device is out of range of the cellular network. In an
emergency situation, it sends a message from the device to a
network element if a network connection between the mobile
device and network element exists. If no network connection
between the mobile device and a network element exists, the
device sends the message to a second mobile device, which will
connect to the third mobile device via D2D communication [8].
M2M communication technology is used in IoT for various
applications such as an alarm notification to mobile tower
monitoring system [9] and in mobile health (mHealth) alarming
applications via analysing health data sensed by personal sensor
devices [10-13]. Since LPWAN transmits small data volume to
save battery power, an inference system can also be used to
reduce the data size and the frequency of transmission [14]. In
disaster monitoring, it is crucial to identify the affected areas
and
their progress into other areas to predict the impact and
potential
damage. For this, it is required to know the geographical
location
information of individual sensor nodes, which may relay the
information (sensor measurements and Location IDentification;
LID) through the network until it has been received by the
LPWAN gateway, which will eventually be reached by the
Disaster Relief Agency (DRA) through the public network using
IP Multimedia System (IMS)- or VoIP-based networks
depending on the country or regions. This may cause a problem
of carrying the data (LID and sensor measurements) all the way
to the destination crossing various networks supporting
different
technologies with different signalling formats. To solve this
problem, we propose to use the ‘calling party’ address (A
number in a setup message to contain LID), which is used by all
network technologies along with called party address (B
number) by replacing the A number field (real calling party
address) by a pseudo A number (PAN) including LID.
The benefit of this proposal is that it may not require to
significantly modify or add a field to carry the LID within the
existing signalling system. However, it may require minimum
changes of the A number handling by a carrier network, whilst
the actual A number is not required for accounting during the
call setup as it will be regarded as an emergency call. If it is
normal to be charged, it may require charging arrangements by
the carrier when provisioning the service. To deliver the PAN,
the existing calling line identification presentation (CLIP)
feature can be used for data management by the DRA. For
implementation of the calling party numbers in multiple
networks, it will require collectively co-operation among the
network operators and service providers in a region or country.
Currently, there is no known activity of standardising
emergency call handling among countries whilst there are rules
on how to handle emergency numbers such as ‘000’ and ‘911’
in Australia for instance. For developing countries, this
proposal
may be useful to monitor disaster status with minimal
modifications in their carrier networks. Fig. 1 shows the
network
topology of LPWAN and carrier networks.
IoT
Ad-Hoc
Public Carrier
Networks
Gateway Data Centre
Applications
(Sensor)
Disaster Recovery
Agency (DRA)
Gateway
aggregation
Base Station
Fig. 1 End-to-End Network Topology for LPWAN and Carrier
Networks
II. PEER TO PEER AND AD-HOC NETWORKS
In a disaster situation and when the public network is not
available by the impact, peer-to-peer networks such as LPWAN,
Ad-Hoc and Balloon networks can be used to deliver the sensor
data. Those networks may be connected to IoT devices, which
can forward the information through the internet where
available.
A. Ad-Hoc Networks
In many cases, network connections cannot be preserved in
a disaster situation and Ad-Hoc networks can allow the rapid
deployment of connectivity. There are multiple wireless mobile
nodes dynamically forming a temporary network without using
the existing network infrastructure such as cellular or circuit
switched networks. As this Ad-Hoc network has the limitations
of wireless network interfaces, multiple hops are required,
which
also require routing protocols [15]. Since the protocol should
consider transmission range, limited buffer space for message
storage and hardware constraints, various mobility models have
been developed [16]. However, disaster sensors are mostly
located in fixed locations despite being able to be moved by
disasters. This is a unique trait as disaster sensors are not
mobile.
Therefore, it is required to consider the mobility when
designing
networks for disaster recovery networks.
B. Balloon Networks
As a special type of Ad-Hoc networks, aerial and
hierarchical balloon networks proved feasible from testing [17]
include optical and radio frequency links between balloons,
which consist of Super node and sub-nodes. Each super-node
balloon comprises a free-space optical communication system
for data communications with one or more other super-node
balloons, which comprises a radio-frequency communication
system operable for data communications [18, 19]. A wireless
telecommunications system with a base station positioned on an
airborne platform is provided and can communicate with
satellites based routing processes [20]. The system can also
utilise a ground-based wireless switching system to
communicate with a plurality of airborne base stations
positioned above a geographic area as well as the balloons’
geographic zones [21].
C. LPWANs
LPWANs basically provides low power-driven clients
(devices) for longer range coverage comparing to existing WAN
technologies whilst existing IoT protocols can work with short
range protocols such as Bluetooth, Zigbee and WiFi. There are
existing protocols and vendors (e.g. LoRa, NWave, OnRamp,
Platanus, SIGFOX, Telensa, Weightless, Amber Wireless and
M2M Spectrum Networks) for current standards, standards-in-
progress or proprietary [22] with different aspects and traits.
However, all of them aim to provide low-cost driven solutions
for longer range coverage, which is suitable for disaster
monitoring networks. LPWANs are unlikely to be controlled,
owned or managed by a carrier. Instead, a separate entity such
as a private network service provider can control the LPWAN
network except the gateway interconnection to the public carrier
networks. In this case, security issues will be limited to the
LPWAN operators, and will not be an issue for the carrier
networks. Fig. 3 depicts how LPWAN sensors are progressively
triggered in a disaster situation based on time changes, e.g.
from
T1, T2 to T3, the sensors are triggered in a timely manner by
each affected area. In this paper, LPWANs are used to
demonstrate an application scenario to forward location
information and timestamp to the gateway, which may then
connect to peer-to-peer networks or public carrier networks.
III. DESIGN AND IMPLEMENTATION
This section describes methodologies and implementation
for the generation and forwarding of LID utilising PAN within
LPWANs and transferring towards DRA.
A. Data Collection and Transmission in LPWANs
Deployed sensors capture data such as temperature,
humidity, air condition etc., and transmit them to neighbouring
devices which forward/relay them towards the gateway, which
is meant to collect data in its own network. There can be
multiple
gateways, which are aggregated by a customer edge to
communicate with a base station (BS). Whilst the internal
communications can be done by LPWAN protocols, the
interface from the CE to BS is done by the public network such
as 3G or 4G LTE.
B. Location ID
There are various formats for location such as Global
Positioning system (GPS) coordinates which can be used as an
LID, such as in the example below:
rees decimal minutes: 40° 26.767′ N 79° 58.933′ W.
As deployed sensors will not change their location in most
cases, it is not required to contact satellites to constantly update
the LID, in situations where the sensors’ computational capacity
is limited. If the capacity allows, the sensor can communicate
with satellites to keep accurate location information. Otherwise,
the LID can be pre-programmed when deployed. In the example
above, when the GPS coordinate is used for the LID, the format
should be defined on how to conform the content to the carrier
network. For example, when ITU-T E.164 is used, the format
can be as shown in Table I to accommodate the LID, e.g.
‘XY4044679982’ (12 digit), where XY can be an identification
of the network, whilst each country has its own national
numbering plan, and therefore XY format should follow the
scheme. Number structure for global service by the E.164 also
suggests 3 digits for the country code and 12 digits for the
global
subscriber number [23]. Alternatively, the LID can also be a
proprietary format as long as it can traverse the networks
without
being rejected. In this way, the number of 12 digits can be
further
granulised as it does not have to include the ‘degree’ portion of
the GPS coordinate, which saves 4 digits for other information,
e.g. sensor measurements.
TABLE I. NUMBER STRUCTURE FOR GEOGRAPHICAL
AREA (ADAPTED
FROM [23])
Country Code
National Destination
Code (optional)
Subscriber Number
National (significant)
cc = 1-3 digits maximum = 15 – cc = 12 to 14 digits
International public telecommunication number for geographic
areas
(maximum 15 digits)
C. Gateways
Whilst sensors transmit data to gateways, the collected data
is converted into a proper format at the gateway (or aggregation
gateway as a customer edge). There are two key data which are
processed at the gateway: (1) LID: location information such as
the GPS coordinate or proprietary location data format being
used by the DRA is converted into the A party address format in
the signalling field consisting of XY (network ID) and 10 digits
of numeric data for the location, as shown in Table II for
instance. (2) sensor measurements are included in the data
(payload) field. The gateway plays a key role in performing data
collection from the sensors, instructing the network to change
the status to an emergency mode when triggered, forming the
PAN field from data received from the sensors, and connecting
to carrier or peer-to-peer networks. It also interacts with other
gateways in the LPWAN for routing if required.
D. Call Setup in Mobile Station
There are normal Setup and Emergency Setup procedures
described by 3GPP 24.008. Depending on the subsequent
network interconnecting from the cellular network, a proper
Setup process can be used. In any case, every call should have
the ‘calling party’ address in a proper format. When a gateway
connects to a cellular network, it should format the Setup
message to generate and include the PAN in the A number field,
which will be used by the cellular network to forward to the
destination. Between mobile and circuit switched network,
proper procedures are described for the setup and for the
emergency setup. For example, Table 9.54/3GPP TS 24.008
summarises the messages for circuit-switched call control.
E. PAN (Calling party numbers)
In many networks, the calling party numbers are controlled
by the carrier and cannot be changed by the subscriber.
Sometimes networks have screening/filtering configuration
applied to the switch/base station so that their calling party
numbers need to conform to certain number ranges or be
positively vetted against a list of known numbers. For example,
a carrier exchange system or switch may reject the incoming
call
based on a calling party number, which has been classified as
invalid digits when analysing the calling party number by digit
analysis. This needs to be worked out with carriers such that
certain number ranges can be added to be in the digit analysis
processes for those disaster related calls. To present a PAN to
the carrier network, an example is shown in Table II provided it
still requires conforming of a carrier’s numbering scheme for
calling party numbers.
TABLE II. PAN PRESENTATION NUMBERING SCHEME:
EXAMPLE (12
DIGITS)
X (1) Y (1) ABCDE (5) JKLMN (5)
Network
ID
(0 -9)
Application
ID (0-9)
North Coordinate West Coordinate
Degree+minute+second Degree+minute+second
Minute+second Minute+second
Proprietary LID Proprietary LID
F. Call Types
When a call has arrived at the carrier network for the first
time from the LPWAN, it should be classified as an emergency
call type as it is an emergency in case of a disaster situation.
However, when it is not an emergency, the call may be treated
as a normal call. To differentiate the calls, there are three types
of calls from the LPWAN to the carrier network.
(1) Scheduled calls: LPWAN sensors transmit sensed data
on a regular basis as pre-programmed, e.g. every hour,
for checking of the sensor status.
(2) Urgent calls: When a disaster situation occurs, LPWAN
sensors will trigger the gateway with sensed data as
compared to the pre-defined threshold values. The
gateway in this case transmits the emergency data to the
destination.
(3) Recovery calls: When sensors capture measurements
that have become within the normal ranges against the
threshold values, they transmit the data as ‘recovered’
and the gateway transmits them to the disaster centre to
be marked as normal.
The type of call can also be in the form of short message
service (SMS), PSTN or Mobile termination, Answered or Not
answered, emergency call (000) etc.
G. Network Types for Origination and Termination
LPWAN gateways may transmit the calls to cellular or other
networks as needed and as applicable. For example, some areas
may not be covered by mobile networks but are covered by
circuit switched networks. In the case of a disaster situation,
some or all of the networks may not be available, and the
LPWAN may connect to peer networks such as the IoT network.
In any case, the destination network where the disaster centre is
connected to is likely to be in a carrier network such as 3G
mobile or PSTN numbers, depending on what number has been
dialed by the gateway. Fig. 2 shows emergency procedures of a
gateway and sensors in an LPWAN.
Start
Emergency
Situation?
No
G/W get sensor
data (L.ID)
Carrier network
connected?
Transmit data
Periodic reporting
Yes
Find peer to peer
network, M2M
IoT, D2D,
gateways
No
Sensors relay data
Successful?
Yes
No
End
Yes
G/W wake
sensors and
adjacent networks
Sensors change to
Emergency mode,
e.g. transfer often
Fig. 2 Emergency procedures of LPWAN Gateways
IV. APPLICATION
As an application demonstration, we consider a bushfire
disaster situation to simulate gateways collecting sensed data
and transmitting them to the DRA, which may use the data to
predict further areas of impact. Sensed Data within LPWANs
can be transferred and aggregated at a gateway which is done
independently from the public networks. Each sensor relays the
original (triggered) sensor’s LID and timestamp to the next
sensor, which will eventually arrive at a gateway. As shown in
Fig. 3, at a given time T1, Area1 has been affected by the
disaster, and has then expanded to Area2 by T2. When T3 shows
the affected area, our goal is to forecast the Area4 at T4 based
on the previous data including the areas affected (location
information) at each time such as T1, T2 and T3. The directions
of propagation are calculated and reflected into the forecast,
which will be recalculated for the next period, e.g. Area5 at T5.
In other words, areas of Area4 which have been (1) estimated
and (2) actually measured at T4 are used to forecast Area5 at
T5.
T1
T2
T3
LPWAN Sensors
G
a
te
w
ay
S11
S21
S1N
SM1 SMN
T4 forecast
Dp1
Dp: direction of propagation T5 forecast
Dp2
Fig. 3 LPWAN Sensors and Gateway triggered in a timely
manner. Triggered
sensors are grouped geographically at each time (Tn), and LID
and timestamp
are used to calculate the map of impact. Dp is used to predict
the future impact
To identify the disaster-affected areas, the LID and timestamp
are crucial information along with the signal status. For
instance,
sensor S1N in Fig. 3 is regarded as ‘affected’ when the sensor
returned value exceeding the trigger value or the gateway has
lost a signal by comparing to the previous time online [T = TN-
(TN-1)]. To predict potential areas of future impact of a
disaster-
stricken area, they can be calculated as follows. Parameter of
interest from each sensor can be represented as a matrix
mirroring sensor locations
MNM
N
PP
P
PPP
......
............
.........
...
1
21
11211
(1)
In case of bushfire monitoring, the parameter of interest PMN is
air temperature at each sensor. When some of the sensors return
the parameter values exceeding the allowed threshold, disaster
response is triggered. Knowing the geographical position (xy
coordinates) of the sensors that triggered the response and time
when this occurred xMN, yMN and T1 and then tracking the
propagation of the increased parameter values to the
surrounding
sensors at T2, velocity, rate of change and direction of
propagation of the disturbance can be calculated.
Consider the ambient temperature of 25°C. At T1, a number of
sensors shown in red at Fig. 4(a) have been triggered due to
exceeding the trigger temperature of 60°C.
Zones of medium (30°C - 60°C) and low impact (25°C - 30°C)
have been shown in yellow and blue respectively. Fig. 4(b)
shows by how much the temperature exceeds the ambient
temperature at each sensor location with affected sensors shown
in grey. Fig. 5 shows the progression of the temperature rise at
T2 assumed to be 1s after T1 with corresponding changes in
impact status at each location.
Fig. 4 (a) Sensor parameter measurement matrix showing
temperature
mesurement at T1. (b) Temperature in excess of ambient
temperature at T1.
Fig. 5 (a) Sensor parameter measurement matrix showing
temperature
mesurement at T2. (b) Temperature in excess of ambient
temperature at T2.
Rate of change of the parameter at each sensor location can be
found as
12
1)()()(
TT
TPTP
TR NNNMN
Corresponding matrix for the rate of parameter change R can
be determined reflecting values at each sensor as
MNM
N
RR
R
RRR
......
............
.........
...
1
21
11211
(3)
where RMN are rate of change values for individual sensors as
shown in Fig. 6. For example,
12
111211
211
)()(
)(
TT
TPTP
TR
Fig. 6 Rate of temperature change at each sensor S11 to SMN.
Fig. 7 shows the prediction of the temperature rise at T3
assumed
to be 1s after T2 with corresponding changes in impact status at
each location.
Sensors closer to the fire are affected to a greater extent and
experience a greater rate of change. Parameter values at time
TN+1 at each sensor can be predicted as
The predicted value can be compared with the actual value
measured at T N+1 and the rate of change can be corrected as
where
)()(
Fig. 7 Predicted temperatures at the next moment at time T3.
Isovalue contours (points with the same temperature) could be
plotted from sensor data for the creation of a 2D map of
parameter values, determination of propagation wavefront,
direction of disaster propagation and calculation of affected
areas as shown in Fig. 4 & 5. Direction of disaster propagation
is perpendicular to the isovalue contour. For example, in this
paper isovalue contour was approximated as a straight line and
the distance between sensors was assumed as 1 km. The
direction of propagation is determined by the angle that is
formed between vertical axis y and the line perpendicular to the
wave front or isovalue contour, which is the same as the angle
that is formed between the isovalue line and the horizontal axis
x.
12
12atan
xx
yy
where x1 and y1 are coordinates of one of the ends of the
isovalue
front and x2 and y2 are coordinates of the other end of the front
with top right sensor considered to be at the origin of the
coordinate system. Fig. 8 shows the angles of propagation for
each disaster zone.
Fig. 8 Directions of disaster propagation for different zones of
impact at (a) for
T1, (b) for T2.
Velocity of disturbance propagation can be calculated along
each of the x and y axes as
where dx and dy are the distance between the sensors in x and y
directions and t is the time it took for the second sensor to reach
the same value as the first. To find the velocity for any
direction,
the vector sum can be used.
V. CONCLUSION
LPWAN is an emerging technology, which may connect to IoT
and public carrier networks for disaster monitoring and
recovery
networks. We proposed to use calling party numbers (PAN) to
forward location information (and measurements of sensors) of
individual sensors to a destination such as a disaster centre (e.g.
DRA) in order to be analysed and processed for disaster
management. This can be done by minimal changes to carrier
networks to allow the PAN to go through the networks. Despite
it may possibly requiring additional configuration in carrier
networks, it will be useful in developing countries where there
are less sophisticated network technologies. Using the PAN
carrying the location and timestamp data of sensors, we showed
an application of the idea in a bushfire situation. This is shown
by utilising isovalue contours and calculations of matrices for
rate of temperature change at each sensor as well as directions
of disaster propagation at each impact zone. The calculations
were used to predict spread to further areas of impact in time. It
can potentially be useful in remote areas utilising LPWAN for a
few hundred kilometres of coverage through a single gateway.
For future study, more comprehensive disaster scenarios
reflecting variables such as wind speed and direction, humidity,
density of flora and temperature may be developed and
modelled
to help real disaster situations.
REFERENCES
[1] M. Schuster, "National and International Disaster
Response," Austrian
Armed Forces NBC-Defence School 2011.
[2] S. Adibi, "A mobile health network disaster management
system," in
Ubiquitous and Future Networks (ICUFN), 2015 Seventh
International
Conference on, 2015, pp. 424-428.
[3] T. Gomes, J. Tapolcai, C. Esposito, D. Hutchison, F.
Kuipers, J. Rak, et
al., "A survey of strategies for communication networks to
protect against
large-scale natural disasters," in 2016 8th International
Workshop on
Resilient Networks Design and Modeling (RNDM), 2016, pp.
11-22.
[4] X. Xiong, K. Zheng, R. Xu, W. Xiang, and P. Chatzimisios,
"Low power
wide area machine-to-machine networks: Key techniques and
prototype,"
IEEE Communications Magazine, vol. 53, pp. 64-71, 2015.
[5] J. Petäjäjärvi, K. Mikhaylov, M. Hämäläinen, and J. Iinatti,
"Evaluation
of LoRa LPWAN technology for remote health and wellbeing
monitoring," in Medical Information and Communication
Technology
(ISMICT), 2016 10th International Symposium on, 2016, pp. 1-
5.
[6] K. E. Nolan, W. Guibene, and M. Y. Kelly, "An evaluation
of low power
wide area network technologies for the Internet of Things," in
2016
International Wireless Communications and Mobile Computing
Conference (IWCMC), 2016, pp. 439-444.
[7] Gartner.com. Gartner Says 4.9 Billion Connected. Available:
http://www.gartner.com/newsroom/id/2905717, [Accessed: 20
May
2015]
[8] S. Adibi, C. Labrador, and S. Simmons, "Method and system
for peer-to-
peer (P2P) ad-hoc location determination routing protocol," ed:
Google
Patents, 2014.
[9] P. K. Dalela, A. Yadav, S. Sachdev, A. Yadav, S. Basu, and
V. Tyagi,
"Alarm notification to tower monitoring system in oneM2M
based IoT
networks," in 2016 International Conference on Advances in
Computing,
Communications and Informatics (ICACCI), 2016, pp. 2405-
2409.
[10] J. J. Kang, T. H. Luan, and H. Larkin, "Alarm Notification
of Body
Sensors Utilising Activity Recognition and Smart Device
Application,"
presented at the Proceedings of the 14th International
Conference on
Advances in Mobile Computing and Multi Media, Singapore,
Singapore,
2016.
[11] J. J. Kang and H. Larkin, "Inference of Personal Sensors in
the Internet
of Things," International Journal of Information,
Communication
Technology and Applications, vol. 2, 2016.
[12] J. Kang, "An Inference System Framework for Personal
Sensor Devices
in Mobile Health and Internet of Things Networks," Doctor of
Philosophy, School of IT, Deakin University, Burwood Victoria,
2017.
[13] J. J. Kang, T. Luan, and H. Larkin, "Data Processing of
Physiological
Sensor Data and Alarm Determination Utilising Activity
Recognition,"
International Journal of Information, Communication
Technology and
Applications, vol. 2, p. 24, 2016-09-24 2016.
[14] J. J. Kang, H. Larkin, and T. H. Luan, "Enhancement of
Sensor Data
Transmission by Inference and Efficient Data Processing," in
Applications and Techniques in Information Security, L. Batten
and G.
Li, Eds.: Springer Singapore, 2016, pp. 81-92.
[15] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J.
Jetcheva, "A
performance comparison of multi-hop wireless ad hoc network
routing
protocols," in Proceedings of the 4th annual ACM/IEEE
international
conference on Mobile computing and networking, 1998, pp. 85-
97.
[16] T. Camp, J. Boleng, and V. Davies, "A survey of mobility
models for ad
hoc network research," Wireless communications and mobile
computing,
vol. 2, pp. 483-502, 2002.
[17] B. W. Walsh, "Balloon Network Test Successful," Taylor
University
News, 2007.
[18] R. W. DeVaul, E. Teller, C. L. Biffle, and J. Weaver,
"Balloon network
with free-space optical communication between super-node
balloons and
RF communication between super-node and sub-node balloons,"
ed:
Google Patents, 2014.
[19] J. S. Campbell, "Aerial communications network including
a plurality of
aerial platforms," ed: Google Patents, 2000.
[20] E. Teller, M. Cassidy, C. L. Biffle, and R. W. DeVaul,
"Use of satellite-
based routing processes with a balloon network," ed: Google
Patents,
2014.
[21] E. Teller, R. W. DeVaul, C. L. Biffle, and J. Weaver,
"Virtual pooling of
local resources in a balloon network," ed: Google Patents, 2015.
[22] B. Moyer. Low Power, Wide Area, A Survey of Longer-
Range IoT
Wireless Protocols. Available:
http://www.eejournal.com/article/20150907-lpwa/, [Accessed:
21 May
2017]
[23] ITU-T, "COMPLEMENT TO ITU-T RECOMMENDATION
E.164
(11/2010)," in Annex to ITU Operational Bulletin No. 991 –
1.XI.2011
ed: ITU, 2010.
Instruction for
Presentation.docx
Instruction for Presentation
1/ Submit your slides to Moodle to comply with the assignment
marking criteria. I suggest you include the format below [50%
of total mark]
· 1st slide: title, name, ID, date, Tutor etc
· 2nd slide: Introduction including definition, brief explanation
of the topic, and the structure of the remaining presentation
clearly
· 3rd slide: Figure/table to show the overview of the topic
· 4th and 5th slide: Detail explanation of the topic. This can be
extended by 1 or 2 more slides
· 6th slide: Advantages and Disadvantages, Problems,
Solution
s etc
· 7th slide: diagram, figures, pictures to support the previous
slides.
· 8th: Future works: what to be done, what are the trends? This
slide can be located after the conclusion.
· 9th: conclusion
· 10th: References: all references should have in citation and
properly referenced in text and references following IEEE
format.
2/ Presentation [50% of total mark]
You should present in clear English so that audience can
understand what you are talking about. Speak slowly, clearly
and loudly.
How will it be marked?
· As long as you conform the slides format as above, you may
get pass mark. Otherwise, you may get penalties. For example, 9
slides are perfect but missing 10th slides for reference. In this
case, 10% deduction will occur even though you presented 9
slides properly. Thus, I strongly suggest you prepare the slides
to 100% follow the format suggested.
· Do NOT read the slides but talk about your thoughts. You will
get penalty mark if you simply read the slides even though you
perfectly presented other aspects. Presentation and
communication skills will be mainly checked.
· Submit to Moodle and do not bring a memory stick or email
access for your presentation. You will not have a chance to
present unless you submitted it to Moodle as your tutor will
using the file in the Moodle for your presentation. No
exception.
· Make points with a few bullet points, and do not cut and paste
your article paragraph. You will lose marks for too many words.
Check the links below for preparation and google yourself to
learn:
http://www.deakin.edu.au/students/studying/study-
support/academic-skills/oral-presentations
https://www.topuniversities.com/blog/presentation-tips-
students-how-conquer-anxiety
https://www.kent.ac.uk/careers/presentationskills.htm

More Related Content

Similar to For the recipe below adjust the recipe from 17 gallons to 70 gal.docx

Page 1 of 9 school of engineering uc lan cou
Page 1 of 9  school of engineering uc lan couPage 1 of 9  school of engineering uc lan cou
Page 1 of 9 school of engineering uc lan coussuser562afc1
 
Some notes - My company is LSS warehouse logistic company.docx
Some notes - My company is LSS warehouse logistic company.docxSome notes - My company is LSS warehouse logistic company.docx
Some notes - My company is LSS warehouse logistic company.docxwhitneyleman54422
 
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docxProject Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docxanitramcroberts
 
How to Prepare for Information Technology
How to Prepare for Information TechnologyHow to Prepare for Information Technology
How to Prepare for Information TechnologySudheer Paidi
 
Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentAaravSunak
 
Running Head VB ProposalVB Proposal.docx
Running Head VB ProposalVB Proposal.docxRunning Head VB ProposalVB Proposal.docx
Running Head VB ProposalVB Proposal.docxrtodd599
 
Introduction to Security ManagementDirections Be sure to make .docx
Introduction to Security ManagementDirections  Be sure to make .docxIntroduction to Security ManagementDirections  Be sure to make .docx
Introduction to Security ManagementDirections Be sure to make .docxnormanibarber20063
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docxodiliagilby
 
6062 comp cwk2 17 18 new template
6062 comp cwk2 17 18 new template6062 comp cwk2 17 18 new template
6062 comp cwk2 17 18 new templateElliot Byrne
 
The Outline of a ResponseThesis Statement (Write the sentence i.docx
The Outline of a ResponseThesis Statement (Write the sentence i.docxThe Outline of a ResponseThesis Statement (Write the sentence i.docx
The Outline of a ResponseThesis Statement (Write the sentence i.docxoreo10
 
ECOM1000 – Project Part 2 Final Report ECOM1000 Analytic
ECOM1000 – Project Part 2 Final Report ECOM1000 AnalyticECOM1000 – Project Part 2 Final Report ECOM1000 Analytic
ECOM1000 – Project Part 2 Final Report ECOM1000 AnalyticEvonCanales257
 
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docxGG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docxshericehewat
 
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxMN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxraju957290
 
Assessment Worksheet Aligning Risks, Threats, and Vuln.docx
Assessment Worksheet Aligning Risks, Threats, and Vuln.docxAssessment Worksheet Aligning Risks, Threats, and Vuln.docx
Assessment Worksheet Aligning Risks, Threats, and Vuln.docxdavezstarr61655
 
MATH233 Unit 3 This assignment features an exponential functio.docx
MATH233 Unit 3 This assignment features an exponential functio.docxMATH233 Unit 3 This assignment features an exponential functio.docx
MATH233 Unit 3 This assignment features an exponential functio.docxandreecapon
 

Similar to For the recipe below adjust the recipe from 17 gallons to 70 gal.docx (15)

Page 1 of 9 school of engineering uc lan cou
Page 1 of 9  school of engineering uc lan couPage 1 of 9  school of engineering uc lan cou
Page 1 of 9 school of engineering uc lan cou
 
Some notes - My company is LSS warehouse logistic company.docx
Some notes - My company is LSS warehouse logistic company.docxSome notes - My company is LSS warehouse logistic company.docx
Some notes - My company is LSS warehouse logistic company.docx
 
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docxProject Deliverable 2 Business RequirementsDue Week 4 and wor.docx
Project Deliverable 2 Business RequirementsDue Week 4 and wor.docx
 
How to Prepare for Information Technology
How to Prepare for Information TechnologyHow to Prepare for Information Technology
How to Prepare for Information Technology
 
Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure Assignment
 
Running Head VB ProposalVB Proposal.docx
Running Head VB ProposalVB Proposal.docxRunning Head VB ProposalVB Proposal.docx
Running Head VB ProposalVB Proposal.docx
 
Introduction to Security ManagementDirections Be sure to make .docx
Introduction to Security ManagementDirections  Be sure to make .docxIntroduction to Security ManagementDirections  Be sure to make .docx
Introduction to Security ManagementDirections Be sure to make .docx
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
6062 comp cwk2 17 18 new template
6062 comp cwk2 17 18 new template6062 comp cwk2 17 18 new template
6062 comp cwk2 17 18 new template
 
The Outline of a ResponseThesis Statement (Write the sentence i.docx
The Outline of a ResponseThesis Statement (Write the sentence i.docxThe Outline of a ResponseThesis Statement (Write the sentence i.docx
The Outline of a ResponseThesis Statement (Write the sentence i.docx
 
ECOM1000 – Project Part 2 Final Report ECOM1000 Analytic
ECOM1000 – Project Part 2 Final Report ECOM1000 AnalyticECOM1000 – Project Part 2 Final Report ECOM1000 Analytic
ECOM1000 – Project Part 2 Final Report ECOM1000 Analytic
 
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docxGG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
GG Freightways (GGFRT) IT Decision Paper AssignmentBefore you be.docx
 
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docxMN502Overview of Network SecurityPage 6 of 6Assessment D.docx
MN502Overview of Network SecurityPage 6 of 6Assessment D.docx
 
Assessment Worksheet Aligning Risks, Threats, and Vuln.docx
Assessment Worksheet Aligning Risks, Threats, and Vuln.docxAssessment Worksheet Aligning Risks, Threats, and Vuln.docx
Assessment Worksheet Aligning Risks, Threats, and Vuln.docx
 
MATH233 Unit 3 This assignment features an exponential functio.docx
MATH233 Unit 3 This assignment features an exponential functio.docxMATH233 Unit 3 This assignment features an exponential functio.docx
MATH233 Unit 3 This assignment features an exponential functio.docx
 

More from mecklenburgstrelitzh

Discussion - Week 3Elements of the Craft of WritingThe narra.docx
Discussion - Week 3Elements of the Craft of WritingThe narra.docxDiscussion - Week 3Elements of the Craft of WritingThe narra.docx
Discussion - Week 3Elements of the Craft of WritingThe narra.docxmecklenburgstrelitzh
 
Discussion - Microbial ClassificationGive names of bacteria in.docx
Discussion - Microbial ClassificationGive names of bacteria in.docxDiscussion - Microbial ClassificationGive names of bacteria in.docx
Discussion - Microbial ClassificationGive names of bacteria in.docxmecklenburgstrelitzh
 
Discussion (Chapter 7) What are the common challenges with which se.docx
Discussion (Chapter 7) What are the common challenges with which se.docxDiscussion (Chapter 7) What are the common challenges with which se.docx
Discussion (Chapter 7) What are the common challenges with which se.docxmecklenburgstrelitzh
 
Discussion - Big Data Visualization toolsSeveral Big Data Visu.docx
Discussion - Big Data Visualization toolsSeveral Big Data Visu.docxDiscussion - Big Data Visualization toolsSeveral Big Data Visu.docx
Discussion - Big Data Visualization toolsSeveral Big Data Visu.docxmecklenburgstrelitzh
 
Discussion - 1 Pick 2 different department team members and descri.docx
Discussion - 1  Pick 2 different department team members and descri.docxDiscussion - 1  Pick 2 different department team members and descri.docx
Discussion - 1 Pick 2 different department team members and descri.docxmecklenburgstrelitzh
 
Discussion (Chapter 7) What are the common challenges with which .docx
Discussion (Chapter 7) What are the common challenges with which .docxDiscussion (Chapter 7) What are the common challenges with which .docx
Discussion (Chapter 7) What are the common challenges with which .docxmecklenburgstrelitzh
 
Discussion (Chapter 7) What are the common challenges with whic.docx
Discussion (Chapter 7) What are the common challenges with whic.docxDiscussion (Chapter 7) What are the common challenges with whic.docx
Discussion (Chapter 7) What are the common challenges with whic.docxmecklenburgstrelitzh
 
Discussion (Chapter 6) List and briefly describe the nine-step .docx
Discussion (Chapter 6) List and briefly describe the nine-step .docxDiscussion (Chapter 6) List and briefly describe the nine-step .docx
Discussion (Chapter 6) List and briefly describe the nine-step .docxmecklenburgstrelitzh
 
Discussion (Chapter 5) What is the relationship between Naïve Bayes.docx
Discussion (Chapter 5) What is the relationship between Naïve Bayes.docxDiscussion (Chapter 5) What is the relationship between Naïve Bayes.docx
Discussion (Chapter 5) What is the relationship between Naïve Bayes.docxmecklenburgstrelitzh
 
Discussion (Chapter 4) What are the privacy issues with data mini.docx
Discussion (Chapter 4) What are the privacy issues with data mini.docxDiscussion (Chapter 4) What are the privacy issues with data mini.docx
Discussion (Chapter 4) What are the privacy issues with data mini.docxmecklenburgstrelitzh
 
Discussion (Chapter 3) Why are the originalraw data not readily us.docx
Discussion (Chapter 3) Why are the originalraw data not readily us.docxDiscussion (Chapter 3) Why are the originalraw data not readily us.docx
Discussion (Chapter 3) Why are the originalraw data not readily us.docxmecklenburgstrelitzh
 
Discussion (Chapter 5) What is the relationship between Naïve B.docx
Discussion (Chapter 5) What is the relationship between Naïve B.docxDiscussion (Chapter 5) What is the relationship between Naïve B.docx
Discussion (Chapter 5) What is the relationship between Naïve B.docxmecklenburgstrelitzh
 
Discussion (Chapter 10 in the textbook or see the ppt) For ea.docx
Discussion (Chapter 10 in the textbook  or see the ppt) For ea.docxDiscussion (Chapter 10 in the textbook  or see the ppt) For ea.docx
Discussion (Chapter 10 in the textbook or see the ppt) For ea.docxmecklenburgstrelitzh
 
Discussion (Chapter 1) Compare and contrast predictive analytics wi.docx
Discussion (Chapter 1) Compare and contrast predictive analytics wi.docxDiscussion (Chapter 1) Compare and contrast predictive analytics wi.docx
Discussion (Chapter 1) Compare and contrast predictive analytics wi.docxmecklenburgstrelitzh
 
Discussion (400 words discussion + 150 words student response)Co.docx
Discussion (400 words discussion + 150 words student response)Co.docxDiscussion (400 words discussion + 150 words student response)Co.docx
Discussion (400 words discussion + 150 words student response)Co.docxmecklenburgstrelitzh
 
Discussion (150-200 words) Why do you think so much emphasis is pla.docx
Discussion (150-200 words) Why do you think so much emphasis is pla.docxDiscussion (150-200 words) Why do you think so much emphasis is pla.docx
Discussion (150-200 words) Why do you think so much emphasis is pla.docxmecklenburgstrelitzh
 
discussion (11)explain the concept of information stores as th.docx
discussion (11)explain the concept of information stores as th.docxdiscussion (11)explain the concept of information stores as th.docx
discussion (11)explain the concept of information stores as th.docxmecklenburgstrelitzh
 
Discussion #5 How progressive was the Progressive EraThe Progres.docx
Discussion #5 How progressive was the Progressive EraThe Progres.docxDiscussion #5 How progressive was the Progressive EraThe Progres.docx
Discussion #5 How progressive was the Progressive EraThe Progres.docxmecklenburgstrelitzh
 
Discussion #4, Continued Work on VygotskyA. Why is it important .docx
Discussion #4, Continued Work on VygotskyA. Why is it important .docxDiscussion #4, Continued Work on VygotskyA. Why is it important .docx
Discussion #4, Continued Work on VygotskyA. Why is it important .docxmecklenburgstrelitzh
 
Discussion #4 What are the most common metrics that make for an.docx
Discussion #4 What are the most common metrics that make for an.docxDiscussion #4 What are the most common metrics that make for an.docx
Discussion #4 What are the most common metrics that make for an.docxmecklenburgstrelitzh
 

More from mecklenburgstrelitzh (20)

Discussion - Week 3Elements of the Craft of WritingThe narra.docx
Discussion - Week 3Elements of the Craft of WritingThe narra.docxDiscussion - Week 3Elements of the Craft of WritingThe narra.docx
Discussion - Week 3Elements of the Craft of WritingThe narra.docx
 
Discussion - Microbial ClassificationGive names of bacteria in.docx
Discussion - Microbial ClassificationGive names of bacteria in.docxDiscussion - Microbial ClassificationGive names of bacteria in.docx
Discussion - Microbial ClassificationGive names of bacteria in.docx
 
Discussion (Chapter 7) What are the common challenges with which se.docx
Discussion (Chapter 7) What are the common challenges with which se.docxDiscussion (Chapter 7) What are the common challenges with which se.docx
Discussion (Chapter 7) What are the common challenges with which se.docx
 
Discussion - Big Data Visualization toolsSeveral Big Data Visu.docx
Discussion - Big Data Visualization toolsSeveral Big Data Visu.docxDiscussion - Big Data Visualization toolsSeveral Big Data Visu.docx
Discussion - Big Data Visualization toolsSeveral Big Data Visu.docx
 
Discussion - 1 Pick 2 different department team members and descri.docx
Discussion - 1  Pick 2 different department team members and descri.docxDiscussion - 1  Pick 2 different department team members and descri.docx
Discussion - 1 Pick 2 different department team members and descri.docx
 
Discussion (Chapter 7) What are the common challenges with which .docx
Discussion (Chapter 7) What are the common challenges with which .docxDiscussion (Chapter 7) What are the common challenges with which .docx
Discussion (Chapter 7) What are the common challenges with which .docx
 
Discussion (Chapter 7) What are the common challenges with whic.docx
Discussion (Chapter 7) What are the common challenges with whic.docxDiscussion (Chapter 7) What are the common challenges with whic.docx
Discussion (Chapter 7) What are the common challenges with whic.docx
 
Discussion (Chapter 6) List and briefly describe the nine-step .docx
Discussion (Chapter 6) List and briefly describe the nine-step .docxDiscussion (Chapter 6) List and briefly describe the nine-step .docx
Discussion (Chapter 6) List and briefly describe the nine-step .docx
 
Discussion (Chapter 5) What is the relationship between Naïve Bayes.docx
Discussion (Chapter 5) What is the relationship between Naïve Bayes.docxDiscussion (Chapter 5) What is the relationship between Naïve Bayes.docx
Discussion (Chapter 5) What is the relationship between Naïve Bayes.docx
 
Discussion (Chapter 4) What are the privacy issues with data mini.docx
Discussion (Chapter 4) What are the privacy issues with data mini.docxDiscussion (Chapter 4) What are the privacy issues with data mini.docx
Discussion (Chapter 4) What are the privacy issues with data mini.docx
 
Discussion (Chapter 3) Why are the originalraw data not readily us.docx
Discussion (Chapter 3) Why are the originalraw data not readily us.docxDiscussion (Chapter 3) Why are the originalraw data not readily us.docx
Discussion (Chapter 3) Why are the originalraw data not readily us.docx
 
Discussion (Chapter 5) What is the relationship between Naïve B.docx
Discussion (Chapter 5) What is the relationship between Naïve B.docxDiscussion (Chapter 5) What is the relationship between Naïve B.docx
Discussion (Chapter 5) What is the relationship between Naïve B.docx
 
Discussion (Chapter 10 in the textbook or see the ppt) For ea.docx
Discussion (Chapter 10 in the textbook  or see the ppt) For ea.docxDiscussion (Chapter 10 in the textbook  or see the ppt) For ea.docx
Discussion (Chapter 10 in the textbook or see the ppt) For ea.docx
 
Discussion (Chapter 1) Compare and contrast predictive analytics wi.docx
Discussion (Chapter 1) Compare and contrast predictive analytics wi.docxDiscussion (Chapter 1) Compare and contrast predictive analytics wi.docx
Discussion (Chapter 1) Compare and contrast predictive analytics wi.docx
 
Discussion (400 words discussion + 150 words student response)Co.docx
Discussion (400 words discussion + 150 words student response)Co.docxDiscussion (400 words discussion + 150 words student response)Co.docx
Discussion (400 words discussion + 150 words student response)Co.docx
 
Discussion (150-200 words) Why do you think so much emphasis is pla.docx
Discussion (150-200 words) Why do you think so much emphasis is pla.docxDiscussion (150-200 words) Why do you think so much emphasis is pla.docx
Discussion (150-200 words) Why do you think so much emphasis is pla.docx
 
discussion (11)explain the concept of information stores as th.docx
discussion (11)explain the concept of information stores as th.docxdiscussion (11)explain the concept of information stores as th.docx
discussion (11)explain the concept of information stores as th.docx
 
Discussion #5 How progressive was the Progressive EraThe Progres.docx
Discussion #5 How progressive was the Progressive EraThe Progres.docxDiscussion #5 How progressive was the Progressive EraThe Progres.docx
Discussion #5 How progressive was the Progressive EraThe Progres.docx
 
Discussion #4, Continued Work on VygotskyA. Why is it important .docx
Discussion #4, Continued Work on VygotskyA. Why is it important .docxDiscussion #4, Continued Work on VygotskyA. Why is it important .docx
Discussion #4, Continued Work on VygotskyA. Why is it important .docx
 
Discussion #4 What are the most common metrics that make for an.docx
Discussion #4 What are the most common metrics that make for an.docxDiscussion #4 What are the most common metrics that make for an.docx
Discussion #4 What are the most common metrics that make for an.docx
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

For the recipe below adjust the recipe from 17 gallons to 70 gal.docx

  • 1. For the recipe below adjust the recipe from 17 gallons to 70 gallons. Convert all ingredients to pounds (show work) before applying the percentage. Report the percentage; you can do this in decimals. Report the adjusted ingredients in pounds and oz. Example 1.5 pounds = 1 pound and 8 oz. There are 111 oz in a 10# can of tomato paste Yield: 17 gallons (one gallon = 42 3 oz servings) Ground Beef, fine 85/15 8, 10 pounds chubs Flour 9 1/2 C Corn Starch 5 pounds Chili Powder, ground 7 C Cumin, ground 1 1/2 C Black Pepper, ground 3/4 C Onion Poser 7 C Salt 1 C Garlic Powder 2 1/2 C Tomato Paste 3, 10# Can Water 8 gal
  • 2. MN610Virtual Private NetworksPage 3 of total pages Assessment Details and Submission Guidelines Trimester T2, 2018 Unit Code MN610 Unit Title Virtual Private Networks Assessment Author Dr Ammar Alazab Assessment Type Individual (Assignment 1) Assessment Title Assignment 1 – VPN Technologies and Security issues Unit Learning Outcomes covered in this assessment Students should be able to demonstrate their achievements in the following unit learning outcomes: a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues. b.Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations Weight 15% of Total Assessment Total Marks 100 Word limit See instructions Due Date 6:00 PM, Wednesday 29 August 2018 (Week 7) Submission Guidelines
  • 3. · All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. · The assignment must be in MS Word format, 1.5 spacing, 11- pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. · Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using APA or IEEE referencing style for School of Business and School of Information Technology and Engineering respectively. Extension · If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct · Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and-guidelines/Plagiarism- Academic-Misconduct-Policy-Procedure.For further information, please refer to the Academic Integrity Section in your Unit Description. Assignment Description
  • 4. Tasks: There are two parts to this assignment, i.e. part A and part B. A. Write a review article for the following topics depending on the last digit of your ID: select Topic 1 if it ends in an ‘odd’ number or Topic 2 if it ends in an ‘even’ number.90 marks B. Presentation 10 marks Part A description: 1. Topic 1 - Significance of VPN for contemporary organisations that have branches nationally and internationally A virtual private network uses a public network’s infrastructure to make the connections among geographically dispersed nodes, instead of using cables owned or leased exclusively for one single network’s use, eg using of network that as is typical for a wide area network (WAN). To the user, a VPN looks like a private network, even though it shares the network with other users. There are several uses for a VPN. Analyse and discuss the significance of VPN for these contemporary organisations. List the concerns of contemporary organizations in communicating among their employees and clients, and comment if VPN can address their concerns. Discuss how VPN can be advantageous for securing computer communications. Address the issue of VPN security in details as described in section 3. 2. Topic 2 – VPN Replacement Technologies Legacy VPNs has had some major drawbacks and problems such as the ones described below. There have been attempts to resolve the issues, and some technologies are being deployed as alternatives, e.g. Microsoft DirectAccess, SoftEther VPN etc. List the limitations/problems existed in legacy VPNs and review alternative options to resolve and overcome the problems of legacy VPNs. Address the issue of VPN security in details as described in section 3.
  • 5. Common Part – VPN Security Issues Fundamentally, VPN is known as being secure and safe; however, there are still many issues with regards to security aspects. A simple Google search of ‘VPN security’ displays 135 million results. Search the internet for relevant articles/papers, and compare and analyze what these security issues are and what solutions they propose. · http://www.pcworld.com/article/2943472/vpn-users-beware- you-may-not-be-as-safe-as-you-think-you-are.html · https://www.digitaltrends.com/computing/commercial-vpn- huge-security-flaws/ · https://security.stackexchange.com/questions/89017/what-are- security-risks-of-connecting-to-my-home-vpn-from-my-work · https://www.sans.org/reading-room/whitepapers/vpns/remote- access-vpn-security-concerns-policy-enforcement-881 Instructions: Prepare your article as below 1. Go to the IEEE website and download the WORD template for the format. https://www.ieee.org/publications_standards/publications/author s/author_templates.html 2. Another link for the template: https://www.ieee.org/publications_standards/publications/journ mag/ieee_tj_template_17.pdf 3. Read and familiarize yourself with the instructions carefully. 4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any confusions. Also, refer to the link below to have ideas how to start (see section 6). (https://www.ieee.org/publications_standards/publications/autho rs/author_guide_interactive.pdf) 5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
  • 6. · Title (maximum 15 words) · Abstract (200 – 250 words) · Introduction (500 – 1000 words) · Literature Review (500 – 1000 words) · Main body (1000 – 1500 words) · Conclusion (200 – 300 words) · Future Works (150 – 300 words) · References (minimum 10 references) 6. The article must be a ‘Review’[footnoteRef:1] article including at least 5 references and not more than 25. [1: See http://www.editage.com/insights/6-article-types-that-journals- publish-a-guide-for-early-career-researchers] 7. Strictly follow the IEEE reference format for in-body citations and the references section. 8. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet. 9. Contents must include: · History and background of the topic · What are the challenges and drawbacks, what solutions and workouts they found · Possible options (solutions) and future research areas proposed · Scopes of topic, progress of developments such as requirements, benchmarking, purposes & objectives, stakeholders, owners, roles and responsibilities where applicable. · Flowchart · Include a minimum of two (2) figures to show the overall concept and summarized overview of the topic from the review of minimum 10 – 15 (but not limited to) papers. · Include a couple of tables to summarize the result of findings · How each organization approaches, initiates, develops procedures and ownerships, and what results they got, and how it affected their businesses.
  • 7. · What you conclude in terms of the topic/solutions to implement in an organization. Consider other aspects to include for a good review paper. 10. Remember to strictly follow the template and the instructions above to avoid penalties. Part B description: Prepare slides (between 5 – 10 slides) for presentation during the lab class. Read the instruction attached carefully. Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment Section to be included in the report Detailed Description of the Criteria Marks Conforming to the template and format No marks will be given and severe penalties will apply for any breach of the format and template. Fonts, sizes, spacing, captions, headings etc. will also be checked thoroughly. Be thorough and follow fully when using the template and format instruction to avoid penalties. 10 Figures and tables created They should be created yourself and not copied from elsewhere. For full marks you should create at least 2 figures and 2 tables. 20 Main sections
  • 8. Main body structures and contents quality including word limit. 40 Literature review Severe penalties apply for simple listing and describing. It should be a logically support analysis that reaches the review conclusion that should be included at the end of the section. Check word limit. 10 In body citation Strictly follow the order and instruction by IEEE. Check when/where to put the citation. See attached files and search the internet for guidelines 5 References section Check whether they follow the instruction. Otherwise, no marks will be provided 5 Presentation Presentation skills and materials quality 10 Total 100 Example Marking Rubric for Assignment #: Total Marks 100 Note: The marking criteria varies for each assignment Marking Rubric Criteria/ Grades High Distinction (HD) [Excellent] >80% Distinction (D) [Very Good] 70%-80% Credits (C) [Good] 60%-70% Pass (P) [Satisfactory] 50%-60% Fail (N) [Unsatisfactory]
  • 9. <50% Criteria 1 Concise and specific to the project Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Criteria 2 Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately Criteria 3 Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrated excellent ability to think critically but did not source reference material appropriately Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not
  • 10. source reference material appropriately Criteria 4 All elements are present and very well integrated. Components present with good cohesive Components present and mostly well integrated Most components present Proposal lacks structure. Criteria 5 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Criteria 6 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Prepared by: Dr. Ammar Alazab Moderated by: Dr Tony JanJuly, 2018 Prepared by: Dr. Ammar Alazab Moderated by: Dr Tony JanJuly, 2018 ieee_tj_template_17 .docx [footnoteRef:1] [1: This paragraph of the first footnote will
  • 11. contain the date on which you submitted your paper for review. It will also contain support information, including sponsor and financial support acknowledgment. For example, “This work was supported in part by the U.S. Department of Commerce under Grant BS123456.” The next few paragraphs should contain the authors’ current affiliations, including current address and e-mail. For example, F. A. Author is with the National Institute of Standards and Technology, Boulder, CO 80305 USA (e-mail: [email protected] boulder.nist.gov). S. B. Author, Jr., was with Rice University, Houston, TX 77005 USA. He is now with the Department of Physics, Colorado State University, Fort Collins, CO 80523 USA (e-mail: [email protected]). T. C. Author is with the Electrical Engineering Department, University of Colorado, Boulder, CO 80309 USA, on leave from the National Research Institute for Metals, Tsukuba, Japan (e- mail: [email protected]).] Preparation of Papers for IEEE TRANSACTIONS and JOURNALS(February 2017) First A. Author, Fellow, IEEE, Second B. Author, and Third C. Author, Jr., Member, IEEE Abstract—These instructions give you guidelines for preparing papers for IEEE Transactions and Journals. Use this document as a template if you are using Microsoft Word 6.0 or later. Otherwise, use this document as an instruction set. The electronic file of your paper will be formatted further at IEEE. Paper titles should be written in uppercase and lowercase letters, not all uppercase. Avoid writing long formulas with subscripts in the title; short formulas that identify the elements are fine (e.g., "Nd–Fe–B"). Do not write “(Invited)” in the title. Full names of authors are preferred in the author field, but are not required. Put a space between authors’ initials. The abstract must be a concise yet comprehensive reflection of what is in your article. In particular, the abstract must be self-contained, without abbreviations, footnotes, or references. It should be a
  • 12. microcosm of the full article. The abstract must be between 150–250 words. Be sure that you adhere to these limits; otherwise, you will need to edit your abstract accordingly. The abstract must be written as one paragraph, and should not contain displayed mathematical equations or tabular material. The abstract should include three or four different keywords or phrases, as this will help readers to find it. It is important to avoid over-repetition of such phrases as this can result in a page being rejected by search engines. Ensure that your abstract reads well and is grammatically correct. Index Terms—Enter key words or phrases in alphabetical order, separated by commas. For a list of suggested keywords, send a blank e-mail to [email protected] or visit http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt INTRODUCTION T HIS document is a template for Microsoft Word versions 6.0 or later. If you are reading a paper or PDF version of this document, please download the electronic file, trans_jour.docx, from the IEEE Web site at www.ieee.org/authortools so you can use it to prepare your manuscript. If you would prefer to use LaTeX, download IEEE’s LaTeX style and sample files from the same Web page. You can also explore using the Overleaf editor at https://www.overleaf.com/blog/278-how-to-use-overleaf-with- ieee-collabratec-your-quick-guide-to-getting- started#.Vp6tpPkrKM9 If your paper is intended for a conference, please contact your conference editor concerning acceptable word processor formats for your particular conference. Guidelines For Manuscript Preparation When you open trans_jour.docx, select “Page Layout” from the “View” menu in the menu bar (View | Page Layout), (these instructions assume MS 6.0. Some versions may have alternate ways to access the same functionalities noted here). Then, type
  • 13. over sections of trans_jour.docx or cut and paste from another document and use markup styles. The pull-down style menu is at the left of the Formatting Toolbar at the top of your Word window (for example, the style at this point in the document is “Text”). Highlight a section that you want to designate with a certain style, and then select the appropriate name on the style menu. The style will adjust your fonts and line spacing. Do not change the font sizes or line spacing to squeeze more text into a limited number of pages.Use italics for emphasis; do not underline. To insert images in Word, position the cursor at the insertion point and either use Insert | Picture | From File or copy the image to the Windows clipboard and then Edit | Paste Special | Picture (with “float over text” unchecked). IEEE will do the final formatting of your paper. If your paper is intended for a conference, please observe the conference page limits. Abbreviations and Acronyms Define abbreviations and acronyms the first time they are used in the text, even after they have already been defined in the abstract. Abbreviations such as IEEE, SI, ac, and dc do not have to be defined. Abbreviations that incorporate periods should not have spaces: write “C.N.R.S.,” not “C. N. R. S.” Do not use abbreviations in the title unless they are unavoidable (for example, “IEEE” in the title of this article). Other Recommendations Use one space after periods and colons. Hyphenate complex modifiers: “zero-field-cooled magnetization.” Avoid dangling participles, such as, “Using (1), the potential was calculated.” [It is not clear who or what used (1).] Write instead, “The potential was calculated by using (1),” or “Using (1), we calculated the potential.” Use a zero before decimal points: “0.25,” not “.25.” Use “cm3,”
  • 14. not “cc.” Indicate sample dimensions as “0.1 cm 0.2 cm,” not “0.1 0.2 cm2.” The abbreviation for “seconds” is “s,” not “sec.” Use “Wb/m2” or “webers per square meter,” not “webers/m2.” When expressing a range of values, write “7 to 9” or “7-9,” not “7~9.” A parenthetical statement at the end of a sentence is punctuated outside of the closing parenthesis (like this). (A parenthetical sentence is punctuated within the parentheses.) In American English, periods and commas are within quotation marks, like “this period.” Other punctuation is “outside”! Avoid contractions; for example, write “do not” instead of “don’t.” The serial comma is preferred: “A, B, and C” instead of “A, B and C.” If you wish, you may write in the first person singular or plural and use the active voice (“I observed that ...” or “We observed that ...” instead of “It was observed that ...”). Remember to check spelling. If your native language is not English, please get a native English-speaking colleague to carefully proofread your paper.MATH If you are using Word, use either the Microsoft Equation Editor or the MathType add-on (http://www.mathtype.com) for equations in your paper (Insert | Object | Create New | Microsoft Equation or MathType Equation). “Float over text” should not be selected. Equations Number equations consecutively with equation numbers in parentheses flush with the right margin, as in (1). First use the equation editor to create the equation. Then select the “Equation” markup style. Press the tab key and write the equation number in parentheses. To make your equations more compact, you may use the solidus ( / ), the exp function, or appropriate exponents. Use parentheses to avoid ambiguities in denominators. Punctuate equations when they are part of a sentence, as in
  • 15. (1) Be sure that the symbols in your equation have been defined before the equation appears or immediately following. Italicize symbols (T might refer to temperature, but T is the unit tesla). Refer to “(1),” not “Eq. (1)” or “equation (1),” except at the beginning of a sentence: “Equation (1) is ... .”Units Use either SI (MKS) or CGS as primary units. (SI units are strongly encouraged.) English units may be used as secondary units (in parentheses). This applies to papers in data storage. For example, write “15 Gb/cm2 (100 Gb/in2).” An exception is when English units are used as identifiers in trade, such as “3½- in disk drive.” Avoid combining SI and CGS units, such as current in amperes and magnetic field in oersteds. This often leads to confusion because equations do not balance dimensionally. If you must use mixed units, clearly state the units for each quantity in an equation. The SI unit for magnetic field strength H is A/m. However, if you wish to use units of T, either refer to magnetic flux density B or magnetic field strength symbolized as µ0H. Use the center dot to separate compound units, e.g., “A·m2.”Some Common Mistakes The word “data” is plural, not singular. The subscript for the permeability of vacuum µ0 is zero, not a lowercase letter “o.” The term for residual magnetization is “remanence”; the adjective is “remanent”; do not write “remnance” or “remnant.” Use the word “micrometer” instead of “micron.” A graph within a graph is an “inset,” not an “insert.” The word “alternatively” is preferred to the word “alternately” (unless you really mean something that alternates). Use the word “whereas” instead of “while” (unless you are referring to simultaneous events). Do not use the word “essentially” to mean “approximately” or “effectively.” Do not use the word “issue” as a euphemism for “problem.” When compositions are not specified, separate chemical symbols by en-dashes; for example, “NiMn” indicates the intermetallic compound Ni0.5Mn0.5 whereas “Ni–Mn”
  • 16. indicates an alloy of some composition NixMn1-x. Be aware of the different meanings of the homophones “affect” (usually a verb) and “effect” (usually a noun), “complement” and “compliment,” “discreet” and “discrete,” “principal” (e.g., “principal investigator”) and “principle” (e.g., “principle of measurement”). Do not confuse “imply” and “infer.” Prefixes such as “non,” “sub,” “micro,” “multi,” and “ultra” are not independent words; they should be joined to the words they modify, usually without a hyphen. There is no period after the “et” in the Latin abbreviation “et al.” (it is also italicized). The abbreviation “i.e.,” means “that is,” and the abbreviation “e.g.,” means “for example” (these abbreviations are not italicized). A general IEEE styleguide is available at www.ieee.org/authortools. Fig. 1. Magnetization as a function of applied field. Note that “Fig.” is abbreviated. There is a period after the figure number, followed by two spaces. It is good practice to explain the significance of the figure in the caption. TABLE I Units for Magnetic Properties Vertical lines are optional in tables. Statements that serve as captions for the entire table do not need footnote letters. aGaussian units are the same as cg emu for magnetostatics; Mx = maxwell, G = gauss, Oe = oersted; Wb = weber, V = volt, s = second, T = tesla, m = meter, A = ampere, J = joule, kg = kilogram, H = henry. Guidelines for Graphics Preparation and Submission Types of Graphics The following list outlines the different types of graphics published in IEEE journals. They are categorized based on their construction, and use of color / shades of gray:
  • 17. Color/Grayscale figures Figures that are meant to appear in color, or shades of black/gray. Such figures may include photographs, illustrations, multicolor graphs, and flowcharts. Line Art figuresFigures that are composed of only black lines and shapes. These figures should have no shades or half-tones of gray, only black and white. Author photosHead and shoulders shots of authors that appear at the end of our papers. Tables Data charts which are typically black and white, but sometimes include color. Multipart figures Figures compiled of more than one sub-figure presented side- by-side, or stacked. If a multipart figure is made up of multiple figure types (one part is lineart, and another is grayscale or color) the figure should meet the stricter guidelines. File Formats For Graphics Format and save your graphics using a suitable graphics processing program that will allow you to create the images as PostScript (PS), Encapsulated PostScript (.EPS), Tagged Image File Format (.TIFF), Portable Document Format (.PDF), or Portable Network Graphics (.PNG) sizes them, and adjusts the resolution settings. If you created your source files in one of the following programs you will be able to submit the graphics without converting to a PS, EPS, TIFF, PDF, or PNG file: Microsoft Word, Microsoft PowerPoint, or Microsoft Excel. Though it is not required, it is strongly recommended that these
  • 18. files be saved in PDF format rather than DOC, XLS, or PPT. Doing so will protect your figures from common font and arrow stroke issues that occur when working on the files across multiple platforms. When submitting your final paper, your graphics should all be submitted individually in one of these formats along with the manuscript. Sizing of Graphics Most charts, graphs, and tables are one column wide (3.5 inches / 88 millimeters / 21 picas) or page wide (7.16 inches / 181 millimeters / 43 picas). The maximum depth a graphic can be is 8.5 inches (216 millimeters / 54 picas). When choosing the depth of a graphic, please allow space for a caption. Figures can be sized between column and page widths if the author chooses, however it is recommended that figures are not sized less than column width unless when necessary. There is currently one publication with column measurements that do not coincide with those listed above. Proceedings of the IEEE has a column measurement of 3.25 inches (82.5 millimeters / 19.5 picas). The final printed size of author photographs is exactly 1 inch wide by 1.25 inches tall (25.4 millimeters x 31.75 millimeters / 6 picas x 7.5 picas). Author photos printed in editorials measure 1.59 inches wide by 2 inches tall (40 millimeters x 50 millimeters / 9.5 picas x 12 picas). Resolution The proper resolution of your figures will depend on the type of figure it is as defined in the “Types of Figures” section. Author photographs, color, and grayscale figures should be at least 300dpi. Line art, including tables should be a minimum of 600dpi. Vector Art In order to preserve the figures’ integrity across multiple computer platforms, we accept files in the following formats:
  • 19. .EPS/.PDF/.PS. All fonts must be embedded or text converted to outlines in order to achieve the best-quality results. Color Space The term color space refers to the entire sum of colors that can be represented within the said medium. For our purposes, the three main color spaces are Grayscale, RGB (red/green/blue) and CMYK (cyan/magenta/yellow/black). RGB is generally used with on-screen graphics, whereas CMYK is used for printing purposes. All color figures should be generated in RGB or CMYK color space. Grayscale images should be submitted in Grayscale color space. Line art may be provided in grayscale OR bitmap colorspace. Note that “bitmap colorspace” and “bitmap file format” are not the same thing. When bitmap color space is selected, .TIF/.TIFF/.PNG are the recommended file formats. Accepted Fonts Within Figures When preparing your graphics IEEE suggests that you use of one of the following Open Type fonts: Times New Roman, Helvetica, Arial, Cambria, and Symbol. If you are supplying EPS, PS, or PDF files all fonts must be embedded. Some fonts may only be native to your operating system; without the fonts embedded, parts of the graphic may be distorted or missing. A safe option when finalizing your figures is to strip out the fonts before you save the files, creating “outline” type. This converts fonts to artwork what will appear uniformly on any screen. Using Labels Within FiguresFigure Axis labels Figure axis labels are often a source of confusion. Use words
  • 20. rather than symbols. As an example, write the quantity “Magnetization,” or “Magnetization M,” not just “M.” Put units in parentheses. Do not label axes only with units. As in Fig. 1, for example, write “Magnetization (A/m)” or “Magnetization (Am1),” not just “A/m.” Do not label axes with a ratio of quantities and units. For example, write “Temperature (K),” not “Temperature/K.” Multipliers can be especially confusing. Write “Magnetization (kA/m)” or “Magnetization (103 A/m).” Do not write “Magnetization (A/m) 1000” because the reader would not know whether the top axis label in Fig. 1 meant 16000 A/m or 0.016 A/m. Figure labels should be legible, approximately 8 to 10 point type. Subfigure Labels in Multipart Figures and Tables Multipart figures should be combined and labeled before final submission. Labels should appear centered below each subfigure in 8 point Times New Roman font in the format of (a) (b) (c). File Naming Figures (line artwork or photographs) should be named starting with the first 5 letters of the author’s last name. The next characters in the filename should be the number that represents the sequential location of this image in your article. For example, in author “Anderson’s” paper, the first three figures would be named ander1.tif, ander2.tif, and ander3.ps. Tables should contain only the body of the table (not the caption) and should be named similarly to figures, except that ‘.t’ is inserted in-between the author’s name and the table number. For example, author Anderson’s first three tables would be named ander.t1.tif, ander.t2.ps, ander.t3.eps. Author photographs should be named using the first five characters of the pictured author’s last name. For example, four author photographs for a paper may be named: oppen.ps, moshc.tif, chen.eps, and duran.pdf. If two authors or more have the same last name, their first
  • 21. initial(s) can be substituted for the fifth, fourth, third... letters of their surname until the degree where there is differentiation. For example, two authors Michael and Monica Oppenheimer’s photos would be named oppmi.tif, and oppmo.eps. Referencing a Figure or Table Within Your Paper When referencing your figures and tables within your paper, use the abbreviation “Fig.” even at the beginning of a sentence. Do not abbreviate “Table.” Tables should be numbered with Roman Numerals. Checking Your Figures: The IEEE Graphics Analyzer The IEEE Graphics Analyzer enables authors to pre-screen their graphics for compliance with IEEE Transactions and Journals standards before submission. The online tool, located at http://graphicsqc.ieee.org/, allows authors to upload their graphics in order to check that each file is the correct file format, resolution, size and colorspace; that no fonts are missing or corrupt; that figures are not compiled in layers or have transparency, and that they are named according to the IEEE Transactions and Journals naming convention. At the end of this automated process, authors are provided with a detailed report on each graphic within the web applet, as well as by email. For more information on using the Graphics Analyzer or any other graphics related topic, contact the IEEE Graphics Help Desk by e-mail at [email protected]. Submitting Your Graphics Because IEEE will do the final formatting of your paper, you do not need to position figures and tables at the top and bottom of each column. In fact, all figures, figure captions, and tables can be placed at the end of your paper. In addition to, or even in lieu of submitting figures within your final manuscript,
  • 22. figures should be submitted individually, separate from the manuscript in one of the file formats listed above in section VI- J. Place figure captions below the figures; place table titles above the tables. Please do not include captions as part of the figures, or put them in “text boxes” linked to the figures. Also, do not place borders around the outside of your figures. Color Processing / Printing in IEEE Journals All IEEE Transactions, Journals, and Letters allow an author to publish color figures on IEEE Xplore® at no charge, and automatically convert them to grayscale for print versions. In most journals, figures and tables may alternatively be printed in color if an author chooses to do so. Please note that this service comes at an extra expense to the author. If you intend to have print color graphics, include a note with your final paper indicating which figures or tables you would like to be handled that way, and stating that you are willing to pay the additional fee. Conclusion A conclusion section is not required. Although a conclusion may review the main points of the paper, do not replicate the abstract as the conclusion. A conclusion might elaborate on the importance of the work or suggest applications and extensions. Appendix Appendixes, if needed, appear before the acknowledgment. Acknowledgment The preferred spelling of the word “acknowledgment” in American English is without an “e” after the “g.” Use the singular heading even if you have many acknowledgments. Avoid expressions such as “One of us (S.B.A.) would like to thank ... .” Instead, write “F. A. Author thanks ... .” In most cases, sponsor and financial support acknowledgments are placed in the unnumbered footnote on the first page, not here. References and Footnotes
  • 23. A. References References need not be cited in text. When they are, they appear on the line, in square brackets, inside the punctuation. Multiple references are each numbered with separate brackets. When citing a section in a book, please give the relevant page numbers. In text, refer simply to the reference number. Do not use “Ref.” or “reference” except at the beginning of a sentence: “Reference [3] shows ... .” Please do not use automatic endnotes in Word, rather, type the reference list at the end of the paper using the “References” style. Reference numbers are set flush left and form a column of their own, hanging out beyond the body of the reference. The reference numbers are on the line, enclosed in square brackets. In all references, the given name of the author or editor is abbreviated to the initial only and precedes the last name. Use them all; use et al. only if names are not given. Use commas around Jr., Sr., and III in names. Abbreviate conference titles. When citing IEEE transactions, provide the issue number, page range, volume number, year, and/or month if available. When referencing a patent, provide the day and the month of issue, or application. References may not include all information; please obtain and include relevant information. Do not combine references. There must be only one reference with each number. If there is a URL included with the print reference, it can be included at the end of the reference. Other than books, capitalize only the first word in a paper title, except for proper nouns and element symbols. For papers published in translation journals, please give the English citation first, followed by the original foreign-language citation See the end of this document for formats and examples of common references. For a complete discussion of references and their formats, see the IEEE style manual at www.ieee.org/authortools. Footnotes
  • 24. Number footnotes separately in superscripts (Insert | Footnote).[footnoteRef:2] Place the actual footnote at the bottom of the column in which it is cited; do not put footnotes in the reference list (endnotes). Use letters for table footnotes (see Table I). [2: It is recommended that footnotes be avoided (except for the unnumbered footnote with the receipt date on the first page). Instead, try to integrate the footnote information into the text.] Submitting Your Paper for Review Review Stage Using Word 6.0 or Higher If you want to submit your file with one column electronically, please do the following: --First, click on the View menu and choose Print Layout. --Second, place your cursor in the first paragraph. Go to the Format menu, choose Columns, choose one column Layout, and choose “apply to whole document” from the dropdown menu. --Third, click and drag the right margin bar to just over 4 inches in width. The graphics will stay in the “second” column, but you can drag them to the first column. Make the graphic wider to push out any text that may try to fill in next to the graphic. Final Stage Using Word 6.0 When you submit your final version (after your paper has been accepted), print it in two-column format, including figures and tables. You must also send your final manuscript on a disk, via e-mail, or through a Web manuscript submission system as directed by the society contact. You may use Zip for large files, or compress files using Compress, Pkzip, Stuffit, or Gzip. Also, send a sheet of paper or PDF with complete contact information for all authors. Include full mailing addresses, telephone numbers, fax numbers, and e-mail addresses. This information will be used to send each author a complimentary copy of the journal in which the paper appears. In addition,
  • 25. designate one author as the “corresponding author.” This is the author to whom proofs of the paper will be sent. Proofs are sent to the corresponding author only. Review Stage Using ScholarOne® Manuscripts Contributions to the Transactions, Journals, and Letters may be submitted electronically on IEEE’s on-line manuscript submission and peer-review system, ScholarOne® Manuscripts. You can get a listing of the publications that participate in ScholarOne at http://www.ieee.org/publications_standards/publications/authors /authors_submission.html First check if you have an existing account. If there is none, please create a new account. After logging in, go to your Author Center and click “Submit First Draft of a New Manuscript.” Along with other information, you will be asked to select the subject from a pull-down list. Depending on the journal, there are various steps to the submission process; you must complete all steps for a complete submission. At the end of each step you must click “Save and Continue”; just uploading the paper is not sufficient. After the last step, you should see a confirmation that the submission is complete. You should also receive an e- mail confirmation. For inquiries regarding the submission of your paper on ScholarOne Manuscripts, please contact [email protected] or call +1 732 465 5861. ScholarOne Manuscripts will accept files for review in various formats. Please check the guidelines of the specific journal for which you plan to submit. You will be asked to file an electronic copyright form immediately upon completing the submission process (authors are responsible for obtaining any security clearances). Failure to submit the electronic copyright could result in publishing delays later. You will also have the opportunity to designate your article as “open access” if you agree to pay the IEEE open access fee.
  • 26. Final Stage Using ScholarOne Manuscripts Upon acceptance, you will receive an email with specific instructions regarding the submission of your final files. To avoid any delays in publication, please be sure to follow these instructions. Most journals require that final submissions be uploaded through ScholarOne Manuscripts, although some may still accept final submissions via email. Final submissions should include source files of your accepted manuscript, high quality graphic files, and a formatted pdf file. If you have any questions regarding the final submission process, please contact the administrative contact for the journal. In addition to this, upload a file with complete contact information for all authors. Include full mailing addresses, telephone numbers, fax numbers, and e-mail addresses. Designate the author who submitted the manuscript on ScholarOne Manuscripts as the “corresponding author.” This is the only author to whom proofs of the paper will be sent. Copyright Form Authors must submit an electronic IEEE Copyright Form (eCF) upon submitting their final manuscript files. You can access the eCF system through your manuscript submission system or through the Author Gateway. You are responsible for obtaining any necessary approvals and/or security clearances. For additional information on intellectual property rights, visit the IEEE Intellectual Property Rights department web page at http://www.ieee.org/publications_standards/publications/rights/i ndex.html. IEEE Publishing Policy The general IEEE policy requires that authors should only submit original work that has neither appeared elsewhere for publication, nor is under review for another refereed publication. The submitting author must disclose all prior publication(s) and current submissions when submitting a manuscript. Do not publish “preliminary” data or results. The
  • 27. submitting author is responsible for obtaining agreement of all coauthors and any consent required from employers or sponsors before submitting an article. The IEEE Transactions and Journals Department strongly discourages courtesy authorship; it is the obligation of the authors to cite only relevant prior work. The IEEE Transactions and Journals Department does not publish conference records or proceedings, but can publish articles related to conferences that have undergone rigorous peer review. Minimally, two reviews are required for every article submitted for peer review.Publication Principles The two types of contents of that are published are; 1) peer- reviewed and 2) archival. The Transactions and Journals Department publishes scholarly articles of archival value as well as tutorial expositions and critical reviews of classical subjects and topics of current interest. Authors should consider the following points: 1) Technical papers submitted for publication must advance the state of knowledge and must cite relevant prior work. 2) The length of a submitted paper should be commensurate with the importance, or appropriate to the complexity, of the work. For example, an obvious extension of previously published work might not be appropriate for publication or might be adequately treated in just a few pages. 3) Authors must convince both peer reviewers and the editors of the scientific and technical merit of a paper; the standards of proof are higher when extraordinary or unexpected results are reported. 4) Because replication is required for scientific progress, papers submitted for publication must provide sufficient information to allow readers to perform similar experiments or calculations and use the reported results. Although not everything need be disclosed, a paper must contain new, useable, and fully described information. For example, a specimen’s chemical composition need not be reported if the main purpose of a paper
  • 28. is to introduce a new measurement technique. Authors should expect to be challenged by reviewers if the results are not supported by adequate data and critical details. 5) Papers that describe ongoing work or announce the latest technical achievement, which are suitable for presentation at a professional conference, may not be appropriate for publication. References Basic format for books: J. K. Author, “Title of chapter in the book,” in Title of His Published Book, xth ed. City of Publisher, (only U.S. State), Country: Abbrev. of Publisher, year, ch. x, sec. x, pp. xxx–xxx. Examples: G. O. Young, “Synthetic structure of industrial plastics,” in Plastics, 2nd ed., vol. 3, J. Peters, Ed. New York, NY, USA: McGraw-Hill, 1964, pp. 15–64. W.-K. Chen, Linear Networks and Systems. Belmont, CA, USA: Wadsworth, 1993, pp. 123–135. Basic format for periodicals: J. K. Author, “Name of paper,” Abbrev. Title of Periodical, vol. x, no. x, pp. xxx-xxx, Abbrev. Month, year, DOI. 10.1109.XXX.123456. Examples: J. U. Duncombe, “Infrared navigation—Part I: An assessment of feasibility,” IEEE Trans. Electron Devices, vol. ED-11, no. 1, pp. 34–39, Jan. 1959, 10.1109/TED.2016.2628402. E. P. Wigner, “Theory of traveling-wave optical laser,” Phys. Rev., vol. 134, pp. A635–A646, Dec. 1965. E. H. Miller, “A note on reflector arrays,” IEEE Trans. Antennas Propagat., to be published. Basic format for reports: J. K. Author, “Title of report,” Abbrev. Name of Co., City of
  • 29. Co., Abbrev. State, Country, Rep. xxx, year. Examples: E. E. Reber, R. L. Michell, and C. J. Carter, “Oxygen absorption in the earth’s atmosphere,” Aerospace Corp., Los Angeles, CA, USA, Tech. Rep. TR-0200 (4230-46)-3, Nov. 1988. J. H. Davis and J. R. Cogdell, “Calibration program for the 16- foot antenna,” Elect. Eng. Res. Lab., Univ. Texas, Austin, TX, USA, Tech. Memo. NGL-006-69-3, Nov. 15, 1987. Basic format for handbooks: Name of Manual/Handbook, x ed., Abbrev. Name of Co., City of Co., Abbrev. State, Country, year, pp. xxx-xxx. Examples: Transmission Systems for Communications, 3rd ed., Western Electric Co., Winston-Salem, NC, USA, 1985, pp. 44–60. Motorola Semiconductor Data Manual, Motorola Semiconductor Products Inc., Phoenix, AZ, USA, 1989. Basic format for books (when available online): J. K. Author, “Title of chapter in the book,” in Title of Published Book, xth ed. City of Publisher, State, Country: Abbrev. of Publisher, year, ch. x, sec. x, pp. xxx–xxx. [Online]. Available: http://www.web.com Examples: G. O. Young, “Synthetic structure of industrial plastics,” in Plastics, vol. 3, Polymers of Hexadromicon, J. Peters, Ed., 2nd ed. New York, NY, USA: McGraw-Hill, 1964, pp. 15-64. [Online]. Available: http://www.bookref.com. The Founders’ Constitution, Philip B. Kurland and Ralph Lerner, eds., Chicago, IL, USA: Univ. Chicago Press, 1987. [Online]. Available: http://press-pubs.uchicago.edu/founders/ The Terahertz Wave eBook. ZOmega Terahertz Corp., 2014. [Online]. Available: http://dl.z- thz.com/eBook/zomega_ebook_pdf_1206_sr.pdf. Accessed on: May 19, 2014.
  • 30. Philip B. Kurland and Ralph Lerner, eds., The Founders’ Constitution. Chicago, IL, USA: Univ. of Chicago Press, 1987, Accessed on: Feb. 28, 2010, [Online] Available: http://press- pubs.uchicago.edu/founders/ Basic format for journals (when available online): J. K. Author, “Name of paper,” Abbrev. Title of Periodical, vol. x, no. x, pp. xxx-xxx, Abbrev. Month, year. Accessed on: Month, Day, year, DOI: 10.1109.XXX.123456, [Online]. Examples: J. S. Turner, “New directions in communications,” IEEE J. Sel. Areas Commun., vol. 13, no. 1, pp. 11-23, Jan. 1995. W. P. Risk, G. S. Kino, and H. J. Shaw, “Fiber-optic frequency shifter using a surface acoustic wave incident at an oblique angle,” Opt. Lett., vol. 11, no. 2, pp. 115–117, Feb. 1986. P. Kopyt et al., “Electric properties of graphene-based conductive layers from DC up to terahertz range,” IEEE THz Sci. Technol., to be published. DOI: 10.1109/TTHZ.2016.2544142. Basic format for papers presented at conferences (when available online): J.K. Author. (year, month). Title. presented at abbrev. conference title. [Type of Medium]. Available: site/path/file Example: PROCESS Corporation, Boston, MA, USA. Intranets: Internet technologies deployed behind the firewall for corporate productivity. Presented at INET96 Annual Meeting. [Online]. Available: http://home.process.com/Intranets/wp2.htp Basic format for reports and handbooks (when available online): J. K. Author. “Title of report,” Company. City, State, Country. Rep. no., (optional: vol./issue), Date. [Online] Available: site/path/file Examples:
  • 31. R. J. Hijmans and J. van Etten, “Raster: Geographic analysis and modeling with raster data,” R Package Version 2.0-12, Jan. 12, 2012. [Online]. Available: http://CRAN.R- project.org/package=raster Teralyzer. Lytera UG, Kirchhain, Germany [Online]. Available: http://www.lytera.de/Terahertz_THz_Spectroscopy.php?id=hom e, Accessed on: Jun. 5, 2014 Basic format for computer programs and electronic documents (when available online): Legislative body. Number of Congress, Session. (year, month day). Number of bill or resolution, Title. [Type of medium]. Available: site/path/file NOTE: ISO recommends that capitalization follow the accepted practice for the language or script in which the information is given. Example: U.S. House. 102nd Congress, 1st Session. (1991, Jan. 11). H. Con. Res. 1, Sense of the Congress on Approval of Military Action. [Online]. Available: LEXIS Library: GENFED File: BILLS Basic format for patents (when available online): Name of the invention, by inventor’s name. (year, month day). Patent Number[Type of medium]. Available: site/path/file Example: Musical toothbrush with mirror, by L.M.R. Brooks. (1992, May 19). Patent D 326 189 [Online]. Available: NEXIS Library: LEXPAT File: DES Basic format for conference proceedings (published): J. K. Author, “Title of paper,” in Abbreviated Name of Conf.,
  • 32. City of Conf., Abbrev. State (if given), Country, year, pp. xxxxxx. Example: D. B. Payne and J. R. Stern, “Wavelength-switched pas- sively coupled single-mode optical network,” in Proc. IOOC-ECOC, Boston, MA, USA,1985, pp. 585–590. Example for papers presented at conferences (unpublished): D. Ebehard and E. Voges, “Digital single sideband detection for interferometric sensors,” presented at the 2nd Int. Conf. Optical Fiber Sensors, Stuttgart, Germany, Jan. 2-5, 1984. Basic format for patents: J. K. Author, “Title of patent,” U.S. Patent x xxx xxx, Abbrev. Month, day, year. Example: G. Brandli and M. Dick, “Alternating current fed power supply,” U.S. Patent 4 084 217, Nov. 4, 1978. Basic formatfor theses (M.S.) and dissertations (Ph.D.): a) J. K. Author, “Title of thesis,” M.S. thesis, Abbrev. Dept., Abbrev. Univ., City of Univ., Abbrev. State, year. b) J. K. Author, “Title of dissertation,” Ph.D. dissertation, Abbrev. Dept., Abbrev. Univ., City of Univ., Abbrev. State, year. Examples: J. O. Williams, “Narrow-band analyzer,” Ph.D. dissertation, Dept. Elect. Eng., Harvard Univ., Cambridge, MA, USA, 1993. N. Kawasaki, “Parametric study of thermal and chemical nonequilibrium nozzle flow,” M.S. thesis, Dept. Electron. Eng., Osaka Univ., Osaka, Japan, 1993. Basic format for the most common types of unpublished references: a) J. K. Author, private communication, Abbrev. Month, year. b) J. K. Author, “Title of paper,” unpublished.
  • 33. c) J. K. Author, “Title of paper,” to be published. Examples: A. Harrison, private communication, May 1995. B. Smith, “An approach to graphs of linear forms,” unpublished. A. Brahms, “Representation error for real numbers in binary computer arithmetic,” IEEE Computer Group Repository, Paper R-67-85. Basic formats for standards: a) Title of Standard, Standard number, date. b) Title of Standard, Standard number, Corporate author, location, date. Examples: IEEE Criteria for Class IE Electric Systems, IEEE Standard 308, 1969. Letter Symbols for Quantities, ANSI Standard Y10.5-1968. Article number in reference examples: R. Fardel, M. Nagel, F. Nuesch, T. Lippert, and A. Wokaun, “Fabrication of organic light emitting diode pixels by laser- assisted forward transfer,” Appl. Phys. Lett., vol. 91, no. 6, Aug. 2007, Art. no. 061103. J. Zhang and N. Tansu, “Optical gain and laser characteristics of InGaN quantum wells on ternary InGaN substrates,” IEEE Photon. J., vol. 5, no. 2, Apr. 2013, Art. no. 2600111 Example when using et al.: S. Azodolmolky et al., Experimental demonstration of an impairment aware network planning and operation tool for transparent/translucent optical networks,” J. Lightw. Technol., vol. 29, no. 4, pp. 439–448, Sep. 2011. First A. Author (M’76–SM’81–F’87) and all authors may
  • 34. include biographies. Biographies are often not included in conference-related papers. This author became a Member (M) of IEEE in 1976, a Senior Member (SM) in 1981, and a Fellow (F) in 1987. The first paragraph may contain a place and/or date of birth (list place, then date). Next, the author’s educational background is listed. The degrees should be listed with type of degree in what field, which institution, city, state, and country, and year the degree was earned. The author’s major field of study should be lower-cased. The second paragraph uses the pronoun of the person (he or she) and not the author’s last name. It lists military and work experience, including summer and fellowship jobs. Job titles are capitalized. The current job must have a location; previous positions may be listed without one. Information concerning previous publications may be included. Try not to list more than three books or published articles. The format for listing publishers of a book within the biography is: title of book (publisher name, year) similar to a reference. Current and previous research interests end the paragraph. The third paragraph begins with the author’s title and last name (e.g., Dr. Smith, Prof. Jones, Mr. Kajor, Ms. Hunter). List any memberships in professional societies other than the IEEE. Finally, list any awards and work for IEEE committees and publications. If a photograph is provided, it should be of good quality, and professional-looking. Following are two examples of an author’s biography. Second B. Author was born in Greenwich Village, New York, NY, USA in 1977. He received the B.S. and M.S. degrees in aerospace engineering from the University of Virginia, Charlottesville, in 2001 and the Ph.D. degree in mechanical engineering from Drexel University, Philadelphia, PA, in 2008.
  • 35. From 2001 to 2004, he was a Research Assistant with the Princeton Plasma Physics Laboratory. Since 2009, he has been an Assistant Professor with the Mechanical Engineering Department, Texas A&M University, College Station. He is the author of three books, more than 150 articles, and more than 70 inventions. His research interests include high-pressure and high-density nonthermal plasma discharge processes and applications, microscale plasma discharges, discharges in liquids, spectroscopic diagnostics, plasma propulsion, and innovation plasma applications. He is an Associate Editor of the journal Earth, Moon, Planets, and holds two patents. Dr. Author was a recipient of the International Association of Geomagnetism and Aeronomy Young Scientist Award for Excellence in 2008, and the IEEE Electromagnetic Compatibility Society Best Symposium Paper Award in 2011. 1 > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Third C. Author, Jr. (M’87) received the B.S. degree in
  • 36. mechanical engineering from National Chung Cheng University, Chiayi, Taiwan, in 2004 and the M.S. degree in mechanical engineering from National Tsing Hua University, Hsinchu, Taiwan, in 2006. He is currently pursuing the Ph.D. degree in mechanical engineering at Texas A&M University, College Station, TX, USA. From 2008 to 2009, he was a Research Assistant with the Institute of Physics, Academia Sinica, Tapei, Taiwan. His research interest includes the development of surface processing and biological/medical treatment techniques using nonthermal atmospheric pressure plasmas, fundamental study of plasma sources, and fabrication of micro- or nanostructured surfaces. Mr. Author’s awards and honors include the Frew Fellowship (Australian Academy of Science), the I. I. Rabi Prize (APS), the European Frequency and Time Forum Award, the Carl Zeiss Research Award, the William F. Meggers Award and the Adolph Lomb Medal (OSA). × PAN final draft_revised.pdf A Disaster Recovery System for Location Identification-based Low Power Wide Area Networks (LPWAN) James Jin Kang School of IT & Engineering
  • 37. Melbourne Institute of Technology Melbourne, Australia [email protected] Iryna Khodasevych School of IT & Engineering Melbourne Institute of Technology Melbourne, Australia [email protected] Sasan Adibi School of Information Technology Deakin University Burwood, Australia [email protected] Abstract—Low Power Wide Area Networks (LPWAN) are used in a number of applications, including disaster monitoring and recovery networks. LPWAN sensors capture data bits and transmit them via dedicated gateways, which are connected to public carrier networks (e.g., cellular networks). One of the challenges encountered in disaster management scenarios
  • 38. revolves around the carry/forward sensed data and geographical location information dissemination to the disaster relief operatives (Disaster Relief Agency; DRA) to identify, characterise, and prioritise the affected areas. There are network topology options, including cellular, circuit switched, and peer-to-peer networks to reach the destination. From the disaster natural disaster predictions point of view, collecting geographical location data and timestamp is vital. This paper proposes the usage of Pseudo A Number (PAN), that is, the calling party address, which is used by every network to include the location information instead of the actual calling party address of the gateway in LPWAN. This PAN information can further be analysed by the DRA to identify the affected areas as well as to predict the complications of the disaster impacts in addition to the past history of the damages. This paper
  • 39. aims to propose a solution that can predict disaster proceedings based on propagation and the velocity of impact using vector calculation of location data and timestamp, which are transmitted by sensors through PAN of gateway in LPWAN. Keywords—Pseudo A Number (PAN); Lower Power Wide Area Network (LPWAN); Disaster Recovery System; Machine to Machine (M2M) interface; Disaster Recovery Assistance Agency (DRA) I. INTRODUCTION Disaster monitoring and recovery mechanisms have been in demand for as long as natural disasters and their adverse effects are known to humankind. The long list of natural and man-made disaster includes: floods, heavy snowfalls, wild/bush fires, storms/hurricanes, tsunamis, earthquakes, pandemics and nuclear disasters [1, 2]. Even though there is a strong need to implement communications between the affected disaster- stricken areas and the disaster managing offices in local or global agencies such as the United Nations and the European Commission, the goal is to secure the necessary communications to support first responder activities in a damaged area with a strategy to restore network services in the aftermath of the initial shock [3]. As the Internet is emerging with prevalent technologies such as big data, cloud computing, Internet of
  • 40. Things (IoT), and 5G cellular networks, it is now feasible to provide low-cost networks covering broad and wide areas such as LPWANs or long range (LoRa) networks [4, 5]. These technologies allow sensors to be deployed and managed with a low power (e.g. 25mW) wide area client and up to 25 km test link for the operating areas for sensor networks [6]. When IoT networks, which are predicted to have up to 50 – 100 billion devices connected to the internet by 2020 [7], will be deployed and converged with these sensor networks, it may be possible to monitor virtually all habitable areas without requiring additional managing systems through self-communications amongst devices such as machine-to-machine (M2M) interfaces and device-to-device (D2D) communication technologies. For example, a mobile device communicates with a peer-to-peer wireless communications network via D2D communication when the device is out of range of the cellular network. In an emergency situation, it sends a message from the device to a network element if a network connection between the mobile device and network element exists. If no network connection between the mobile device and a network element exists, the device sends the message to a second mobile device, which will connect to the third mobile device via D2D communication [8]. M2M communication technology is used in IoT for various applications such as an alarm notification to mobile tower monitoring system [9] and in mobile health (mHealth) alarming applications via analysing health data sensed by personal sensor devices [10-13]. Since LPWAN transmits small data volume to save battery power, an inference system can also be used to reduce the data size and the frequency of transmission [14]. In disaster monitoring, it is crucial to identify the affected areas and their progress into other areas to predict the impact and potential damage. For this, it is required to know the geographical location
  • 41. information of individual sensor nodes, which may relay the information (sensor measurements and Location IDentification; LID) through the network until it has been received by the LPWAN gateway, which will eventually be reached by the Disaster Relief Agency (DRA) through the public network using IP Multimedia System (IMS)- or VoIP-based networks depending on the country or regions. This may cause a problem of carrying the data (LID and sensor measurements) all the way to the destination crossing various networks supporting different technologies with different signalling formats. To solve this problem, we propose to use the ‘calling party’ address (A number in a setup message to contain LID), which is used by all network technologies along with called party address (B number) by replacing the A number field (real calling party address) by a pseudo A number (PAN) including LID. The benefit of this proposal is that it may not require to significantly modify or add a field to carry the LID within the existing signalling system. However, it may require minimum changes of the A number handling by a carrier network, whilst the actual A number is not required for accounting during the call setup as it will be regarded as an emergency call. If it is normal to be charged, it may require charging arrangements by the carrier when provisioning the service. To deliver the PAN, the existing calling line identification presentation (CLIP) feature can be used for data management by the DRA. For implementation of the calling party numbers in multiple networks, it will require collectively co-operation among the network operators and service providers in a region or country. Currently, there is no known activity of standardising emergency call handling among countries whilst there are rules on how to handle emergency numbers such as ‘000’ and ‘911’
  • 42. in Australia for instance. For developing countries, this proposal may be useful to monitor disaster status with minimal modifications in their carrier networks. Fig. 1 shows the network topology of LPWAN and carrier networks. IoT Ad-Hoc Public Carrier Networks Gateway Data Centre Applications (Sensor) Disaster Recovery Agency (DRA) Gateway aggregation Base Station Fig. 1 End-to-End Network Topology for LPWAN and Carrier Networks II. PEER TO PEER AND AD-HOC NETWORKS In a disaster situation and when the public network is not available by the impact, peer-to-peer networks such as LPWAN, Ad-Hoc and Balloon networks can be used to deliver the sensor data. Those networks may be connected to IoT devices, which
  • 43. can forward the information through the internet where available. A. Ad-Hoc Networks In many cases, network connections cannot be preserved in a disaster situation and Ad-Hoc networks can allow the rapid deployment of connectivity. There are multiple wireless mobile nodes dynamically forming a temporary network without using the existing network infrastructure such as cellular or circuit switched networks. As this Ad-Hoc network has the limitations of wireless network interfaces, multiple hops are required, which also require routing protocols [15]. Since the protocol should consider transmission range, limited buffer space for message storage and hardware constraints, various mobility models have been developed [16]. However, disaster sensors are mostly located in fixed locations despite being able to be moved by disasters. This is a unique trait as disaster sensors are not mobile. Therefore, it is required to consider the mobility when designing networks for disaster recovery networks. B. Balloon Networks As a special type of Ad-Hoc networks, aerial and hierarchical balloon networks proved feasible from testing [17] include optical and radio frequency links between balloons, which consist of Super node and sub-nodes. Each super-node balloon comprises a free-space optical communication system for data communications with one or more other super-node balloons, which comprises a radio-frequency communication system operable for data communications [18, 19]. A wireless telecommunications system with a base station positioned on an
  • 44. airborne platform is provided and can communicate with satellites based routing processes [20]. The system can also utilise a ground-based wireless switching system to communicate with a plurality of airborne base stations positioned above a geographic area as well as the balloons’ geographic zones [21]. C. LPWANs LPWANs basically provides low power-driven clients (devices) for longer range coverage comparing to existing WAN technologies whilst existing IoT protocols can work with short range protocols such as Bluetooth, Zigbee and WiFi. There are existing protocols and vendors (e.g. LoRa, NWave, OnRamp, Platanus, SIGFOX, Telensa, Weightless, Amber Wireless and M2M Spectrum Networks) for current standards, standards-in- progress or proprietary [22] with different aspects and traits. However, all of them aim to provide low-cost driven solutions for longer range coverage, which is suitable for disaster monitoring networks. LPWANs are unlikely to be controlled, owned or managed by a carrier. Instead, a separate entity such as a private network service provider can control the LPWAN network except the gateway interconnection to the public carrier networks. In this case, security issues will be limited to the LPWAN operators, and will not be an issue for the carrier networks. Fig. 3 depicts how LPWAN sensors are progressively triggered in a disaster situation based on time changes, e.g. from T1, T2 to T3, the sensors are triggered in a timely manner by each affected area. In this paper, LPWANs are used to demonstrate an application scenario to forward location information and timestamp to the gateway, which may then connect to peer-to-peer networks or public carrier networks. III. DESIGN AND IMPLEMENTATION
  • 45. This section describes methodologies and implementation for the generation and forwarding of LID utilising PAN within LPWANs and transferring towards DRA. A. Data Collection and Transmission in LPWANs Deployed sensors capture data such as temperature, humidity, air condition etc., and transmit them to neighbouring devices which forward/relay them towards the gateway, which is meant to collect data in its own network. There can be multiple gateways, which are aggregated by a customer edge to communicate with a base station (BS). Whilst the internal communications can be done by LPWAN protocols, the interface from the CE to BS is done by the public network such as 3G or 4G LTE. B. Location ID There are various formats for location such as Global Positioning system (GPS) coordinates which can be used as an LID, such as in the example below: rees decimal minutes: 40° 26.767′ N 79° 58.933′ W. As deployed sensors will not change their location in most cases, it is not required to contact satellites to constantly update
  • 46. the LID, in situations where the sensors’ computational capacity is limited. If the capacity allows, the sensor can communicate with satellites to keep accurate location information. Otherwise, the LID can be pre-programmed when deployed. In the example above, when the GPS coordinate is used for the LID, the format should be defined on how to conform the content to the carrier network. For example, when ITU-T E.164 is used, the format can be as shown in Table I to accommodate the LID, e.g. ‘XY4044679982’ (12 digit), where XY can be an identification of the network, whilst each country has its own national numbering plan, and therefore XY format should follow the scheme. Number structure for global service by the E.164 also suggests 3 digits for the country code and 12 digits for the global subscriber number [23]. Alternatively, the LID can also be a proprietary format as long as it can traverse the networks without being rejected. In this way, the number of 12 digits can be further granulised as it does not have to include the ‘degree’ portion of the GPS coordinate, which saves 4 digits for other information, e.g. sensor measurements. TABLE I. NUMBER STRUCTURE FOR GEOGRAPHICAL AREA (ADAPTED FROM [23]) Country Code National Destination Code (optional) Subscriber Number National (significant) cc = 1-3 digits maximum = 15 – cc = 12 to 14 digits
  • 47. International public telecommunication number for geographic areas (maximum 15 digits) C. Gateways Whilst sensors transmit data to gateways, the collected data is converted into a proper format at the gateway (or aggregation gateway as a customer edge). There are two key data which are processed at the gateway: (1) LID: location information such as the GPS coordinate or proprietary location data format being used by the DRA is converted into the A party address format in the signalling field consisting of XY (network ID) and 10 digits of numeric data for the location, as shown in Table II for instance. (2) sensor measurements are included in the data (payload) field. The gateway plays a key role in performing data collection from the sensors, instructing the network to change the status to an emergency mode when triggered, forming the PAN field from data received from the sensors, and connecting to carrier or peer-to-peer networks. It also interacts with other gateways in the LPWAN for routing if required. D. Call Setup in Mobile Station There are normal Setup and Emergency Setup procedures described by 3GPP 24.008. Depending on the subsequent network interconnecting from the cellular network, a proper Setup process can be used. In any case, every call should have the ‘calling party’ address in a proper format. When a gateway connects to a cellular network, it should format the Setup message to generate and include the PAN in the A number field, which will be used by the cellular network to forward to the destination. Between mobile and circuit switched network,
  • 48. proper procedures are described for the setup and for the emergency setup. For example, Table 9.54/3GPP TS 24.008 summarises the messages for circuit-switched call control. E. PAN (Calling party numbers) In many networks, the calling party numbers are controlled by the carrier and cannot be changed by the subscriber. Sometimes networks have screening/filtering configuration applied to the switch/base station so that their calling party numbers need to conform to certain number ranges or be positively vetted against a list of known numbers. For example, a carrier exchange system or switch may reject the incoming call based on a calling party number, which has been classified as invalid digits when analysing the calling party number by digit analysis. This needs to be worked out with carriers such that certain number ranges can be added to be in the digit analysis processes for those disaster related calls. To present a PAN to the carrier network, an example is shown in Table II provided it still requires conforming of a carrier’s numbering scheme for calling party numbers. TABLE II. PAN PRESENTATION NUMBERING SCHEME: EXAMPLE (12 DIGITS) X (1) Y (1) ABCDE (5) JKLMN (5) Network ID (0 -9) Application
  • 49. ID (0-9) North Coordinate West Coordinate Degree+minute+second Degree+minute+second Minute+second Minute+second Proprietary LID Proprietary LID F. Call Types When a call has arrived at the carrier network for the first time from the LPWAN, it should be classified as an emergency call type as it is an emergency in case of a disaster situation. However, when it is not an emergency, the call may be treated as a normal call. To differentiate the calls, there are three types of calls from the LPWAN to the carrier network. (1) Scheduled calls: LPWAN sensors transmit sensed data on a regular basis as pre-programmed, e.g. every hour, for checking of the sensor status. (2) Urgent calls: When a disaster situation occurs, LPWAN sensors will trigger the gateway with sensed data as compared to the pre-defined threshold values. The gateway in this case transmits the emergency data to the destination. (3) Recovery calls: When sensors capture measurements that have become within the normal ranges against the threshold values, they transmit the data as ‘recovered’ and the gateway transmits them to the disaster centre to
  • 50. be marked as normal. The type of call can also be in the form of short message service (SMS), PSTN or Mobile termination, Answered or Not answered, emergency call (000) etc. G. Network Types for Origination and Termination LPWAN gateways may transmit the calls to cellular or other networks as needed and as applicable. For example, some areas may not be covered by mobile networks but are covered by circuit switched networks. In the case of a disaster situation, some or all of the networks may not be available, and the LPWAN may connect to peer networks such as the IoT network. In any case, the destination network where the disaster centre is connected to is likely to be in a carrier network such as 3G mobile or PSTN numbers, depending on what number has been dialed by the gateway. Fig. 2 shows emergency procedures of a gateway and sensors in an LPWAN. Start Emergency Situation? No G/W get sensor data (L.ID) Carrier network connected? Transmit data Periodic reporting
  • 51. Yes Find peer to peer network, M2M IoT, D2D, gateways No Sensors relay data Successful? Yes No End Yes G/W wake sensors and adjacent networks Sensors change to Emergency mode, e.g. transfer often Fig. 2 Emergency procedures of LPWAN Gateways IV. APPLICATION
  • 52. As an application demonstration, we consider a bushfire disaster situation to simulate gateways collecting sensed data and transmitting them to the DRA, which may use the data to predict further areas of impact. Sensed Data within LPWANs can be transferred and aggregated at a gateway which is done independently from the public networks. Each sensor relays the original (triggered) sensor’s LID and timestamp to the next sensor, which will eventually arrive at a gateway. As shown in Fig. 3, at a given time T1, Area1 has been affected by the disaster, and has then expanded to Area2 by T2. When T3 shows the affected area, our goal is to forecast the Area4 at T4 based on the previous data including the areas affected (location information) at each time such as T1, T2 and T3. The directions of propagation are calculated and reflected into the forecast, which will be recalculated for the next period, e.g. Area5 at T5. In other words, areas of Area4 which have been (1) estimated and (2) actually measured at T4 are used to forecast Area5 at T5. T1 T2 T3 LPWAN Sensors G a te w ay
  • 53. S11 S21 S1N SM1 SMN T4 forecast Dp1 Dp: direction of propagation T5 forecast Dp2 Fig. 3 LPWAN Sensors and Gateway triggered in a timely manner. Triggered sensors are grouped geographically at each time (Tn), and LID and timestamp are used to calculate the map of impact. Dp is used to predict the future impact To identify the disaster-affected areas, the LID and timestamp are crucial information along with the signal status. For instance, sensor S1N in Fig. 3 is regarded as ‘affected’ when the sensor returned value exceeding the trigger value or the gateway has lost a signal by comparing to the previous time online [T = TN- (TN-1)]. To predict potential areas of future impact of a disaster- stricken area, they can be calculated as follows. Parameter of interest from each sensor can be represented as a matrix
  • 54. mirroring sensor locations MNM N PP P PPP ...... ............ ......... ... 1 21 11211 (1) In case of bushfire monitoring, the parameter of interest PMN is air temperature at each sensor. When some of the sensors return the parameter values exceeding the allowed threshold, disaster response is triggered. Knowing the geographical position (xy coordinates) of the sensors that triggered the response and time when this occurred xMN, yMN and T1 and then tracking the propagation of the increased parameter values to the surrounding
  • 55. sensors at T2, velocity, rate of change and direction of propagation of the disturbance can be calculated. Consider the ambient temperature of 25°C. At T1, a number of sensors shown in red at Fig. 4(a) have been triggered due to exceeding the trigger temperature of 60°C. Zones of medium (30°C - 60°C) and low impact (25°C - 30°C) have been shown in yellow and blue respectively. Fig. 4(b) shows by how much the temperature exceeds the ambient temperature at each sensor location with affected sensors shown in grey. Fig. 5 shows the progression of the temperature rise at T2 assumed to be 1s after T1 with corresponding changes in impact status at each location. Fig. 4 (a) Sensor parameter measurement matrix showing temperature mesurement at T1. (b) Temperature in excess of ambient temperature at T1. Fig. 5 (a) Sensor parameter measurement matrix showing temperature mesurement at T2. (b) Temperature in excess of ambient temperature at T2. Rate of change of the parameter at each sensor location can be found as 12
  • 56. 1)()()( TT TPTP TR NNNMN Corresponding matrix for the rate of parameter change R can be determined reflecting values at each sensor as MNM N RR R RRR ...... ............ ......... ... 1 21
  • 57. 11211 (3) where RMN are rate of change values for individual sensors as shown in Fig. 6. For example, 12 111211 211 )()( )( TT TPTP TR Fig. 6 Rate of temperature change at each sensor S11 to SMN. Fig. 7 shows the prediction of the temperature rise at T3 assumed to be 1s after T2 with corresponding changes in impact status at each location. Sensors closer to the fire are affected to a greater extent and experience a greater rate of change. Parameter values at time TN+1 at each sensor can be predicted as
  • 58. The predicted value can be compared with the actual value measured at T N+1 and the rate of change can be corrected as where )()( Fig. 7 Predicted temperatures at the next moment at time T3. Isovalue contours (points with the same temperature) could be plotted from sensor data for the creation of a 2D map of parameter values, determination of propagation wavefront, direction of disaster propagation and calculation of affected areas as shown in Fig. 4 & 5. Direction of disaster propagation is perpendicular to the isovalue contour. For example, in this paper isovalue contour was approximated as a straight line and the distance between sensors was assumed as 1 km. The direction of propagation is determined by the angle that is formed between vertical axis y and the line perpendicular to the wave front or isovalue contour, which is the same as the angle that is formed between the isovalue line and the horizontal axis x.
  • 59. 12 12atan xx yy where x1 and y1 are coordinates of one of the ends of the isovalue front and x2 and y2 are coordinates of the other end of the front with top right sensor considered to be at the origin of the coordinate system. Fig. 8 shows the angles of propagation for each disaster zone. Fig. 8 Directions of disaster propagation for different zones of impact at (a) for T1, (b) for T2.
  • 60. Velocity of disturbance propagation can be calculated along each of the x and y axes as where dx and dy are the distance between the sensors in x and y directions and t is the time it took for the second sensor to reach the same value as the first. To find the velocity for any direction, the vector sum can be used. V. CONCLUSION LPWAN is an emerging technology, which may connect to IoT and public carrier networks for disaster monitoring and recovery networks. We proposed to use calling party numbers (PAN) to forward location information (and measurements of sensors) of individual sensors to a destination such as a disaster centre (e.g. DRA) in order to be analysed and processed for disaster management. This can be done by minimal changes to carrier networks to allow the PAN to go through the networks. Despite it may possibly requiring additional configuration in carrier networks, it will be useful in developing countries where there are less sophisticated network technologies. Using the PAN carrying the location and timestamp data of sensors, we showed an application of the idea in a bushfire situation. This is shown by utilising isovalue contours and calculations of matrices for rate of temperature change at each sensor as well as directions of disaster propagation at each impact zone. The calculations were used to predict spread to further areas of impact in time. It can potentially be useful in remote areas utilising LPWAN for a few hundred kilometres of coverage through a single gateway. For future study, more comprehensive disaster scenarios reflecting variables such as wind speed and direction, humidity, density of flora and temperature may be developed and
  • 61. modelled to help real disaster situations. REFERENCES [1] M. Schuster, "National and International Disaster Response," Austrian Armed Forces NBC-Defence School 2011. [2] S. Adibi, "A mobile health network disaster management system," in Ubiquitous and Future Networks (ICUFN), 2015 Seventh International Conference on, 2015, pp. 424-428. [3] T. Gomes, J. Tapolcai, C. Esposito, D. Hutchison, F. Kuipers, J. Rak, et al., "A survey of strategies for communication networks to protect against large-scale natural disasters," in 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), 2016, pp. 11-22. [4] X. Xiong, K. Zheng, R. Xu, W. Xiang, and P. Chatzimisios, "Low power wide area machine-to-machine networks: Key techniques and prototype," IEEE Communications Magazine, vol. 53, pp. 64-71, 2015. [5] J. Petäjäjärvi, K. Mikhaylov, M. Hämäläinen, and J. Iinatti,
  • 62. "Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring," in Medical Information and Communication Technology (ISMICT), 2016 10th International Symposium on, 2016, pp. 1- 5. [6] K. E. Nolan, W. Guibene, and M. Y. Kelly, "An evaluation of low power wide area network technologies for the Internet of Things," in 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016, pp. 439-444. [7] Gartner.com. Gartner Says 4.9 Billion Connected. Available: http://www.gartner.com/newsroom/id/2905717, [Accessed: 20 May 2015] [8] S. Adibi, C. Labrador, and S. Simmons, "Method and system for peer-to- peer (P2P) ad-hoc location determination routing protocol," ed: Google Patents, 2014. [9] P. K. Dalela, A. Yadav, S. Sachdev, A. Yadav, S. Basu, and V. Tyagi, "Alarm notification to tower monitoring system in oneM2M based IoT
  • 63. networks," in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016, pp. 2405- 2409. [10] J. J. Kang, T. H. Luan, and H. Larkin, "Alarm Notification of Body Sensors Utilising Activity Recognition and Smart Device Application," presented at the Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, Singapore, Singapore, 2016. [11] J. J. Kang and H. Larkin, "Inference of Personal Sensors in the Internet of Things," International Journal of Information, Communication Technology and Applications, vol. 2, 2016. [12] J. Kang, "An Inference System Framework for Personal Sensor Devices in Mobile Health and Internet of Things Networks," Doctor of Philosophy, School of IT, Deakin University, Burwood Victoria, 2017. [13] J. J. Kang, T. Luan, and H. Larkin, "Data Processing of Physiological Sensor Data and Alarm Determination Utilising Activity
  • 64. Recognition," International Journal of Information, Communication Technology and Applications, vol. 2, p. 24, 2016-09-24 2016. [14] J. J. Kang, H. Larkin, and T. H. Luan, "Enhancement of Sensor Data Transmission by Inference and Efficient Data Processing," in Applications and Techniques in Information Security, L. Batten and G. Li, Eds.: Springer Singapore, 2016, pp. 81-92. [15] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, 1998, pp. 85- 97. [16] T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless communications and mobile computing, vol. 2, pp. 483-502, 2002. [17] B. W. Walsh, "Balloon Network Test Successful," Taylor University News, 2007.
  • 65. [18] R. W. DeVaul, E. Teller, C. L. Biffle, and J. Weaver, "Balloon network with free-space optical communication between super-node balloons and RF communication between super-node and sub-node balloons," ed: Google Patents, 2014. [19] J. S. Campbell, "Aerial communications network including a plurality of aerial platforms," ed: Google Patents, 2000. [20] E. Teller, M. Cassidy, C. L. Biffle, and R. W. DeVaul, "Use of satellite- based routing processes with a balloon network," ed: Google Patents, 2014. [21] E. Teller, R. W. DeVaul, C. L. Biffle, and J. Weaver, "Virtual pooling of local resources in a balloon network," ed: Google Patents, 2015. [22] B. Moyer. Low Power, Wide Area, A Survey of Longer- Range IoT Wireless Protocols. Available: http://www.eejournal.com/article/20150907-lpwa/, [Accessed: 21 May 2017] [23] ITU-T, "COMPLEMENT TO ITU-T RECOMMENDATION E.164
  • 66. (11/2010)," in Annex to ITU Operational Bulletin No. 991 – 1.XI.2011 ed: ITU, 2010. Instruction for Presentation.docx Instruction for Presentation 1/ Submit your slides to Moodle to comply with the assignment marking criteria. I suggest you include the format below [50% of total mark] · 1st slide: title, name, ID, date, Tutor etc · 2nd slide: Introduction including definition, brief explanation of the topic, and the structure of the remaining presentation clearly · 3rd slide: Figure/table to show the overview of the topic · 4th and 5th slide: Detail explanation of the topic. This can be extended by 1 or 2 more slides · 6th slide: Advantages and Disadvantages, Problems, Solution s etc · 7th slide: diagram, figures, pictures to support the previous slides. · 8th: Future works: what to be done, what are the trends? This slide can be located after the conclusion. · 9th: conclusion
  • 67. · 10th: References: all references should have in citation and properly referenced in text and references following IEEE format. 2/ Presentation [50% of total mark] You should present in clear English so that audience can understand what you are talking about. Speak slowly, clearly and loudly. How will it be marked? · As long as you conform the slides format as above, you may get pass mark. Otherwise, you may get penalties. For example, 9 slides are perfect but missing 10th slides for reference. In this case, 10% deduction will occur even though you presented 9 slides properly. Thus, I strongly suggest you prepare the slides to 100% follow the format suggested. · Do NOT read the slides but talk about your thoughts. You will get penalty mark if you simply read the slides even though you perfectly presented other aspects. Presentation and communication skills will be mainly checked. · Submit to Moodle and do not bring a memory stick or email access for your presentation. You will not have a chance to present unless you submitted it to Moodle as your tutor will using the file in the Moodle for your presentation. No exception. · Make points with a few bullet points, and do not cut and paste your article paragraph. You will lose marks for too many words.
  • 68. Check the links below for preparation and google yourself to learn: http://www.deakin.edu.au/students/studying/study- support/academic-skills/oral-presentations https://www.topuniversities.com/blog/presentation-tips- students-how-conquer-anxiety https://www.kent.ac.uk/careers/presentationskills.htm