99 research outputs found
Mobile Ad-Hoc Networks
Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: vehicular ad-hoc networks, security and caching, TCP in ad-hoc networks and emerging applications. It is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
Pro-collaborative mobile systems in next generation IP networks
Computing system designs of today take on either the interactive or the proactive
form. Motivated by the user’s desire to make his/her computing experience more
intelligent and personalised, the progression from interactive (human-centred) to
proactive (human-supervised) is evident. It can be observed that current research
mainly emphasises the user as the dominant focus of a user-system interaction.
Consider a model that we called the opponent-process model. It contains two
processes, one representing the user and the other the system, where both processes
are capable of dominating each other, though working collaboratively towards a
predefined task. We argue the necessity to design computing systems which are
balanced in this model, such that the system process, at times, becomes the dominant
process. We refer to this as the pro-collaborative design form.
We dissect mobility into the notion of a nomadic user and the notion of a
nomadic system. The examination into the nomadic user problem space reveals the
potential for applying the pro-collaborative approach in optimising handoff
management. Significant performance advantages can be obtained with our proposed
S-MIP framework, based on the pro-collaborative design, when compared with
established handoff latency optimisation schemes. The key differentiator lies in its
indicative approach in addressing handoff ambiguity. Instead of passively
anticipating through prediction as to when a mobile user might cross network
boundaries (user-dominant), the system actively indicates to the user when, where
and how to handoff (system-dominant). This eliminates the handoff ambiguity.
Regarding the notion of a nomadic system, that is, the ability to move services
offered by computing systems to arbitrary points in the Internet, we explore the idea
of the dynamic extension of network services to a mobile user on-demand. Based on
the pro-collaborative form, we develop the METAMORPHOSE architecture which
facilitates such a dynamic service extension. By assuming the proliferation of
programmable network switches and computational resources within the Internet, we
re-examine how ‘loose’ service agreements between network services providers can
be, to achieve such borderless moving-service offerings.
The viability of the pro-collaborative form is reflected through our design and
implementation of protocols and architectures which address the notion of nomadic
user and nomadic system
Recommended from our members
Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret data; as against sharing the data itself. This is significant in cloud computing, especially with homomorphic encryption. Using web design, the resultant scheme practically globalises secret sharing with authentications and inherent secondary applications. The work aims at improving cybersecurity via a joint exploitation of human factors and technology; a human-centred cybersecurity design as opposed to technology-centred. The completed functional scheme is tagged CDRSAS.
The literature on secret sharing schemes is reviewed together with the concepts of human factors, trust, cyberspace/cryptology and an analysis on a 3-factor security assessment process. This is followed by the relevance of passwords within the context of human factors. The main research design/implementation and system performance are analysed, together with a proposal for a new antidote against 419 fraudsters. Two twin equations were invented in the investigation process; a pair each for secret sharing and a risk-centred security assessment technique.
The building blocks/software used for the CDRSAS include Shamir’s algorithm, MD5, HTML5, PHP, Java, Servlets, JSP, Javascript, MySQL, JQuery, CSS, MATLAB, MS Excel, MS Visio, and Photoshop. The codes are developed in Eclipse IDE, and the Java-based system runs on Tomcat and Apache, using XAMPP Server. Its code units have passed JUnit tests. The system compares favourably with SSSS.
Defeating socio-cryptanalysis in cyberspace requires strategies that are centred on human trust, trust-related human attributes, and technology. The PhD research is completed but there is scope for future work.Petroleum Technology Development Fund (PTDF), Abuja, Nigeria
Wi-Fi Enabled Healthcare
Focusing on its recent proliferation in hospital systems, Wi-Fi Enabled Healthcare explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on first-hand experiences from one of the largest healthcare systems in the United States, it covers the key areas associated with wireless network design, security, and support. Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture. It also outlines several options and design consideration for employee wireless coverage, voice over wireless (including smart phones), mobile medical devices, and wireless guest services. This book presents authoritative insight into the challenges that exist in adding Wi-Fi within a healthcare setting. It explores several solutions in each space along with design considerations and pros and cons. It also supplies an in-depth look at voice over wireless, mobile medical devices, and wireless guest services. The authors provide readers with the technical knowhow required to ensure their systems provide the reliable, end-to-end communications necessary to surmount today’s challenges and capitalize on new opportunities. The shared experience and lessons learned provide essential guidance for large and small healthcare organizations in the United States and around the world. This book is an ideal reference for network design engineers and high-level hospital executives that are thinking about adding or improving upon Wi-Fi in their hospitals or hospital systems
Radio Communications
In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks
RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques
Construction waste disposal is an urgent issue
for protecting our environment. This paper proposes a
waste management system and illustrates the work
process using plasterboard waste as an example, which
creates a hazardous gas when land filled with household
waste, and for which the recycling rate is less than 10%
in the UK. The proposed system integrates RFID
technology, Rule-Based Reasoning, Ant Colony
optimization and knowledge technology for auditing
and tracking plasterboard waste, guiding the operation
staff, arranging vehicles, schedule planning, and also
provides evidence to verify its disposal. It h relies on
RFID equipment for collecting logistical data and uses
digital imaging equipment to give further evidence; the
reasoning core in the third layer is responsible for
generating schedules and route plans and guidance, and
the last layer delivers the result to inform users. The
paper firstly introduces the current plasterboard
disposal situation and addresses the logistical problem
that is now the main barrier to a higher recycling rate,
followed by discussion of the proposed system in terms
of both system level structure and process structure.
And finally, an example scenario will be given to
illustrate the system’s utilization
JTIT
kwartalni
Cross-Service Investigation of Geographical Information Systems
This research investigated the armed services current uses of GIS, and asked the question whether or not a joint GIS program could benefit the DOD. An information technology implementation model was presented as a framework to implement a joint GIS program. It was found that all four armed services use GIS for forward deployments. The Army has its Combat Terrain Information System (CTIS). The Navy\u27s digital nautical charts are a GIS. The Marine Corps has created their Geographically Linked Information Display Environment (GLIDE) program, which is similar to a map repository. Finally, the Air Force has its GeoBase program for installation GIS, and GeoReach is the expeditionary deployment base-planning subset. The research methodology combined a case study and a Delphi study. The case study research examined a single Army GIS unit for current GIS implementation methods and uses. The Delphi study asked eight DOD GIS experts their opinions about current GIS uses and the possibility of a joint GIS program. Through the case study and Delphi research, it was found that information flow between the services is limited and that a joint GIS program may bring improved and new planning and executing capabilities for the DOD
A feasibility study of wireless network technologies for rural broadband connectivity
The adoption of wireless broadband technologies to provide network and Internet connectivity in rural communities has conveyed the possibility to overcome the challenges caused by marginalization and many other characteristics possessed by these rural communities. With their different capabilities, these technologies enable communication for rural communities internally within the community and externally on a global scale. Deployment of these technologies in rural areas requires consideration of different factors - these are in contrast, to those considered when deploying these technologies in non-rural, urban areas. Numerous research show consideration of facts for deployment of broadband technologies in urban/ non-rural environments and a little has been done in considering facts for deployment in rural environments. Hence this research aims to define guidelines for selection of broadband technologies and make recommendations on which technologies are suitable for deployment in rural communities, thereby considering facts that are true only within these rural communities. To achieve this, the research determines the metrics that are relevant and important to consider when deploying wireless broadband technology in rural communities of South Africa. It further undertakes a survey of wireless broadband technologies that are suitable for deployment in such areas. The study first profiles a list of wireless communication technologies, determines and documents characteristics of rural communities in Africa, determines metrics used to declare technologies feasible in rural areas. The metrics and rural characteristics are then used to identify technologies that are better suited than others. Informed by this initial profiling, one technology: mobile WiMAX is then selected for deployment and further evaluation. A technical review of mobile WiMAX is then carried out by deploying it at our research site in the rural, marginalized community of Dwesa (Eastern Cape, South Africa). The final section of this research provides recommendations that mobile WiMAX, LTE and Wi-Fi are the best suitable technologies for deployment in rural marginalized environments. This has been supported by extensive research and real life deployment of both Wi-Fi and mobile WiMAX. This research also recommends consideration of the following facts when seeking deployment of these technologies in rural communities: the geographical setting of the target terrain, the distances between sources and target customers and distances between target communities, weather conditions of the area, applications to be deployed over the network, social well-being of the community and their financial freedom as well
- …