2,765 research outputs found

    Performance Review of Selected Topology-Aware Routing Strategies for Clustering Sensor Networks

    Get PDF
    In this paper, cluster-based routing (CBR) protocols for addressing issues pertinent to energy consumption, network lifespan, resource allocation and network coverage are reviewed. The paper presents an indepth  performance analysis and critical review of selected CBR algorithms. The study is domain-specific and simulation-based with emphasis on the tripartite trade-off between coverage, connectivity and lifespan. The rigorous statistical analysis of selected CBR schemes was also presented. Network simulation was conducted with Java-based Atarraya discrete-event simulation toolkit while statistical analysis was carried out using MATLAB. It was observed that the Periodic, Event-Driven and Query-Based Routing (PEQ) schemes performs better than Low-Energy Adaptive Clustering Hierarchy (LEACH), Threshold-Sensitive Energy-Efficient Sensor Network (TEEN) and Geographic Adaptive Fidelity (GAF) in terms of network lifespan, energy consumption and network throughput.Keywords: Wireless sensor network, Hierarchical topologies, Cluster-based routing, Statistical analysis, Network simulatio

    Analysis of Monitoring Tools for Java Applications

    Get PDF
    Abstract. Runtime Monitoring is performed during the execution of software to detect anomalies in them. Currently several tools are available that help in developing the monitors. We analyze the prominent monitoring tools available for Java applications based on two features, the properties that can be monitored using these tools and the specification language used to specify the monitorable properties. The analysis performed will help the users and developers better evaluate the characteristics of different monitoring tools available in order to select the one suitable for their application

    Distributed Computing for Ubiquitous Systems

    Get PDF
    Distributed computing provides a strong foundation on top of which a powerful ubiquitous system can be realized. However, distributed computing is not solely sufficient for the ubiquitous systems –a completely new era of computer world which is not based on the conventional mainframes or PCs but on the virtually intelligent silent objects/devices used for dayto- day human activities. This article de scribes basics of ubiquitous systems at introductory level and discusses developing a ubiquitous system as an extension to DIICS (Distributed Intelligent Instrument Control System) – a temperature monitor and control system developed by t he author. Moreover, it also discusses significant role of Tini InterNet Interface - a technology used in DIICS, for embedded device support in ubiquitous systems. It also discusses how distributed system fundamentals best fits for ubiquitous systems. Furthermore, it discusses various distributed system goals and specifies how these goals can contribute to ubiquitous systems solely or partially. It also specifies respective changes, and demand for new or adapted architecture/platform, to accommodate it for an efficient ubiquitous system. Towards the end it describes Remote Process Call (RPC) and Event Notification model, two powerful distributed system techniques

    An evaluation of galaxy and ruffus-scripting workflows system for DNA-seq analysis

    Get PDF
    >Magister Scientiae - MScFunctional genomics determines the biological functions of genes on a global scale by using large volumes of data obtained through techniques including next-generation sequencing (NGS). The application of NGS in biomedical research is gaining in momentum, and with its adoption becoming more widespread, there is an increasing need for access to customizable computational workflows that can simplify, and offer access to, computer intensive analyses of genomic data. In this study, the Galaxy and Ruffus frameworks were designed and implemented with a view to address the challenges faced in biomedical research. Galaxy, a graphical web-based framework, allows researchers to build a graphical NGS data analysis pipeline for accessible, reproducible, and collaborative data-sharing. Ruffus, a UNIX command-line framework used by bioinformaticians as Python library to write scripts in object-oriented style, allows for building a workflow in terms of task dependencies and execution logic. In this study, a dual data analysis technique was explored which focuses on a comparative evaluation of Galaxy and Ruffus frameworks that are used in composing analysis pipelines. To this end, we developed an analysis pipeline in Galaxy, and Ruffus, for the analysis of Mycobacterium tuberculosis sequence data. Furthermore, this study aimed to compare the Galaxy framework to Ruffus with preliminary analysis revealing that the analysis pipeline in Galaxy displayed a higher percentage of load and store instructions. In comparison, pipelines in Ruffus tended to be CPU bound and memory intensive. The CPU usage, memory utilization, and runtime execution are graphically represented in this study. Our evaluation suggests that workflow frameworks have distinctly different features from ease of use, flexibility, and portability, to architectural designs

    FUZZY BASED SECURITY ALGORITHM FOR WIRELESS SENSOR NETWORKS IN THE INTERNET OF THINGS PARADIGM

    Get PDF
    Published ThesisThe world is embracing the idea of Internet of Things and Industrial Revolution 4.0. However, this acceptance of computerised evolution is met with a myriad of challenges, where consumers of this technology are also growing ever so anxious about the security of their personal data as well as reliability of data collected by the millions and even billions of sensors surrounding them. Wireless sensor networks are the main baseline technology driving Internet of things; by their very inherent nature, these networks are too vulnerable to attacks and yet the network security tools designed for conventional computer networks are not effective in countering these attacks. Wireless sensors have low computational resources, may be highly mobile and in most cases, these networks do not have a central point which can be marked as an authentication point for the sensors, any node can join or leave whenever they want. This leaves the sensors and the internet of things applications depending on them highly susceptible to attacks, which may compromise consumer information and leave security breaches in situation that need absolute security such as homes or even the cars they drive. There are many possibilities of things that could go wrong when hackers gain control of sensors in a car or a house. There have been many solutions offered to address security of Wireless Sensor Networks; however, most of those solutions are often not customised for African context. Given that most African countries have not kept pace with the development of these underlying technologies, blanket adoption of the solutions developed for consumption in the developed world has not yielded optimal results. The focus of this research was the development of an Intrusion Detection System that works in a hierarchical network structured Wireless Sensor Network, where cluster heads oversee groups of nodes and relay their data packets all the way to the sink node. This is a reactive Intrusion Detection System (IDS) that makes use of a fuzzy logic based algorithm for verification of intrusion detections. This system borrows characteristics of traditional Wireless Sensor Networks in that it is hosted external to the nodes; that is, on a computer or server connected to the sink node. The rational for this is the premise that developing the system in this manner optimises the power and processing resource of nodes because no part of the IDS is found in the nodes and they are left to focus purely on sensing. The Intrusion Detection System makes use of remote Over The Air programming to communicate with compromised nodes, to either shut down or reboot and is designed with the ZigBee protocol in mind. Additionally, this Intrusion Detection System is intended to being part of a larger Internet of Things integration framework being proposed at the Central University of Technology. This framework is aimed at developing an Internet of Things adoption strategy customised for African needs and regionally local consumers. To evaluate the effectiveness of the solution, the rate of false detections being picked out by the security algorithm were reduced through the use of fuzzy logic systems; this resulted in an accuracies of above 90 %. The algorithm is also very light when asymptotic notation is applied, making it ideal for Wireless Sensors. Lastly, we also put forward the Xbee version of the Triple Modular Redundancy architecture, customised for Wireless sensor networks in order to beef-up on the security solution presented in this dissertation

    Recent advances in industrial wireless sensor networks towards efficient management in IoT

    Get PDF
    With the accelerated development of Internet-of- Things (IoT), wireless sensor networks (WSN) are gaining importance in the continued advancement of information and communication technologies, and have been connected and integrated with Internet in vast industrial applications. However, given the fact that most wireless sensor devices are resource constrained and operate on batteries, the communication overhead and power consumption are therefore important issues for wireless sensor networks design. In order to efficiently manage these wireless sensor devices in a unified manner, the industrial authorities should be able to provide a network infrastructure supporting various WSN applications and services that facilitate the management of sensor-equipped real-world entities. This paper presents an overview of industrial ecosystem, technical architecture, industrial device management standards and our latest research activity in developing a WSN management system. The key approach to enable efficient and reliable management of WSN within such an infrastructure is a cross layer design of lightweight and cloud-based RESTful web service

    Context Sensor Data on Demand for Mobile Users Supported by XMPP

    Get PDF
    TĂ€napĂ€eval vĂ”imaldavad tehnoloogilised edusammud kasutaja kĂ€itumise seiremeetodites automatiseerida teatud arvutusĂŒlesandeid, mis tĂ€idetakse kasutaja kavatsust prognoosides. Nutitelefonid rikastavad mobiilseid rakendusi prognoosiva kĂ€itumisega kasutatavuses, mis vĂ”imaldab kĂ€itumismustritega sammu pidada. Üldiselt on sellist kĂ€itumist vĂ”imalik saavutada nutitelefoni enda vahenditega, kasutades telefoni sisse ehitatud mikromehaanilisi seadmeid, mis vĂ”imaldavad keskkonda tajuda. Lisaks vĂ”ivad mobiilsed rakendused kasutaja mobiilse kogemuse rikastamiseks lĂ”igata kasu keskkonda integreeritud hajuslausteenustest, nagu nĂ€iteks ĂŒmbrustundlike mĂ€ngude, kodu automatiseerimise tarkvara jms puhul. Ent mobiilikasutajatele suunatud lausteenuseid pakkuvatel elektroonilistel seadmetel, mis koguvad sensorite abi keskkonnast informatsiooni, on teatavad riistvaralised piirangud (arvutusjĂ”udlus, mĂ€lu, salvestusmeedia, energiatarbimine jne). Seega, lausĂŒsteemid ei ole vĂ”imelised nĂ”udluse suurenemisel skaleeruma ega rakendama suurt arvutusjĂ”udlust. Töö eesmĂ€rgiks on pakkuda lahendus ĂŒletamaks skaleeruvuse, andmete terviklikkuse sĂ€ilitamise ja vĂ€hese arvutusjĂ”udluse probleeme ning rikastada nutitelefoni rakendusi detailsete kasutajapĂ”histe andmetega. EesmĂ€rgi saavutamiseks transporditakse sensoritelt kogutud informatsioon optimiseeritud XMPP protokolli abiga Arduino mikrokontrollerist pilvesĂŒsteemi. SĂŒsteemi ehitamiseks kasutatakse Arduino poolt pakutavat odavat riistvara, samas kui pilvesĂŒsteemi usaldusvÀÀrset ja kĂ”rge kĂ€ttesaadavusega vahendeid kasutatakse mikrokontrollerist saadetud andmete salvestamiseks ja edaspidiseks töötlemiseks. Töö kĂ€igus testiti mikrokontrolleri energia nĂ”udlust, kasutades 9V patareid, nii juhtme kui ka juhtmevaba liidesega. Tulemused tĂ”estasid eeldustele vastupidiselt, et juhtmevaba sĂŒsteemi energia nĂ”udlus on suurem. Lisaks testiti vabavara XMPP serveri jĂ”udlust pilvesĂŒsteemi keskkonnas ning tulemused nĂ€itasid, et XMPP vĂ”imaldab ĂŒheaegselt serveerida suure hulga kasutajaid
    • 

    corecore