62,115 research outputs found

    A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Get PDF
    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption

    Priority Enabled Transport Layer Protocol for Wireless Sensor Network

    Get PDF
    Achieving Quality of Service (QoS) objective in Wireless Sensor Network (WSN) handling the multimedia information has significantly gained the importance lately besides energy efficient hardware designing. Transport layer of the WSN communication protocol stack plays a significant role in meeting the QoS objective of WSN. This paper presents a light weight transport protocol for WSN that can handle packets from a numbers of sources having different sensed information and having different priority levels. The protocol assigned middle motes are intelligent enough to achieve prioritization in transmission based on the priority level and packet's Time-To-Live (TTL) information. Extensive simulation is carried out for the three different modes of the envisaged protocol having no prioritized enabled storage, complete prioritized enabled storage and distributed prioritized enabled storage. The results reveal that the significant improvement is observed in case of distributed prioritized enabled storage, approximately 3% data loss occurred, in comparison to 7% data loss for without prioritized enabled storage mode

    EVOLUTION OF CROWD-SOURCING FROM COMPUTER TO MOBILE SYSTEMS

    Get PDF
    As crowd-sourcing is becoming popular for problem solving and completing a task, it is now very important to use this concept in an advance manner. It can also be used as a distributed and vast source of information. This concept is now evolving in world of mobile systems. This will be a little different from that of computer systems. In this paper, we have discussed some new technologies and challenges before us to implement these advancements in crowd-sourcing. We are going to talk about cheat-detection techniques, handling multimedia databases and how to trade off between cost and accuracy by considering the redundant data as well

    Desktop multimedia environments to support collaborative distance learning

    Get PDF
    Desktop multimedia conferencing, when two or more persons can communicate among themselves via personal computers with the opportunity to see and hear one another as well as communicate via text messages while working with commonly available stored resources, appears to have important applications to the support of collaborative learning. In this paper we explore this potential in three ways: (a) through an analysis of particular learner needs when learning and working collaboratively with others outside of face-to-face situations; (b) through an analysis of different forms of conferencing environments, including desktop multimedia environments, relative to their effectiveness in terms of meeting learner needs for distributed collaboration; and (c) through reporting the results of a formative evaluation of a prototype desktop multimedia conferencing system developed especially for the support of collaborative learning. Via these analyses, suggestions are offered relating to the functionalities of desktop multimedia conferencing systems for the support of collaborative learning, reflecting new developments in both the technologies available for such systems and in our awareness of learner needs when working collaboratively with one other outside of face-to-face situations

    Self-modifiable color petri nets for modeling user manipulation and network event handling

    Get PDF
    A Self-Modifiable Color Petri Net (SMCPN) which has multimedia synchronization capability and the ability to model user manipulation and network event (i.e. network congestion, etc.) handling is proposed in this paper. In SMCPN, there are two types of tokens: resource tokens representing resources to be presented and color tokens with two sub-types: one associated with some commands to modify the net mechanism in operation, another associated with a number to decide iteration times. Also introduced is a new type of resource token named reverse token that moves to the opposite direction of arcs. When user manipulation/network event occurs, color tokens associated with the corresponding interrupt handling commands will be injected into places that contain resource tokens. These commands are then executed to handle the user manipulation/network event. SMCPN has the desired general programmability in the following sense: 1) It allows handling of user manipulations or pre-specified events at any time while keeping the Petri net design simple and easy. 2) It allows the user to customize event handling beforehand. This means the system being modeled can handle not only commonly seen user interrupts (e.g. skip, reverse, freeze), the user is free to define new operations including network event handling. 3) It has the power to simulate self-modifying protocols. A simulator has been built to demonstrate the feasibility of SMCPN

    Comb-e-Chem: an e-science research project

    No full text
    The background to the Comb-e-Chem e-Science pilot project funded under the UK-Science Programme is presented and the areas being addresses within chemistry and more specifically combinatorial chemistry are discussed. The ways in which the ideas underlying the application of computer technology can improve the production, analysis and dissemination of chemical information and knowledge in a collaborative environment are discussed

    Model Based Development of Quality-Aware Software Services

    Get PDF
    Modelling languages and development frameworks give support for functional and structural description of software architectures. But quality-aware applications require languages which allow expressing QoS as a first-class concept during architecture design and service composition, and to extend existing tools and infrastructures adding support for modelling, evaluating, managing and monitoring QoS aspects. In addition to its functional behaviour and internal structure, the developer of each service must consider the fulfilment of its quality requirements. If the service is flexible, the output quality depends both on input quality and available resources (e.g., amounts of CPU execution time and memory). From the software engineering point of view, modelling of quality-aware requirements and architectures require modelling support for the description of quality concepts, support for the analysis of quality properties (e.g. model checking and consistencies of quality constraints, assembly of quality), tool support for the transition from quality requirements to quality-aware architectures, and from quality-aware architecture to service run-time infrastructures. Quality management in run-time service infrastructures must give support for handling quality concepts dynamically. QoS-aware modeling frameworks and QoS-aware runtime management infrastructures require a common evolution to get their integration

    The Design of a System Architecture for Mobile Multimedia Computers

    Get PDF
    This chapter discusses the system architecture of a portable computer, called Mobile Digital Companion, which provides support for handling multimedia applications energy efficiently. Because battery life is limited and battery weight is an important factor for the size and the weight of the Mobile Digital Companion, energy management plays a crucial role in the architecture. As the Companion must remain usable in a variety of environments, it has to be flexible and adaptable to various operating conditions. The Mobile Digital Companion has an unconventional architecture that saves energy by using system decomposition at different levels of the architecture and exploits locality of reference with dedicated, optimised modules. The approach is based on dedicated functionality and the extensive use of energy reduction techniques at all levels of system design. The system has an architecture with a general-purpose processor accompanied by a set of heterogeneous autonomous programmable modules, each providing an energy efficient implementation of dedicated tasks. A reconfigurable internal communication network switch exploits locality of reference and eliminates wasteful data copies

    Preventing Distributed Denial-of-Service Attacks on the IMS Emergency Services Support through Adaptive Firewall Pinholing

    Full text link
    Emergency services are vital services that Next Generation Networks (NGNs) have to provide. As the IP Multimedia Subsystem (IMS) is in the heart of NGNs, 3GPP has carried the burden of specifying a standardized IMS-based emergency services framework. Unfortunately, like any other IP-based standards, the IMS-based emergency service framework is prone to Distributed Denial of Service (DDoS) attacks. We propose in this work, a simple but efficient solution that can prevent certain types of such attacks by creating firewall pinholes that regular clients will surely be able to pass in contrast to the attackers clients. Our solution was implemented, tested in an appropriate testbed, and its efficiency was proven.Comment: 17 Pages, IJNGN Journa
    corecore