1,485 research outputs found

    Katakan tidak pada rasuah

    Get PDF
    Isu atau masalah rasuah menjadi topik utama sama ada di peringkat antarabangsa mahupun di peringkat dalam negara. Pertubuhan Bangsa- bangsa Bersatu menegaskan komitmen komuniti antarabangsa bertegas untuk mencegah dan mengawal rasuah melalui buku bertajuk United Nations Convention against Corruption. Hal yang sama berlaku di Malaysia. Melalui pernyataan visi oleh mantan Perdana Menteri Malaysia, Tun Dr. Mahathir bin Mohamed memberikan indikasi bahawa kerajaan Malaysia komited untuk mencapai aspirasi agar Malaysia dikenali kerana integriti dan bukannya rasuah. Justeru, tujuan penulisan bab ini adalah untuk membincangkan rasuah dari beberapa sudut termasuk perbincangan dari sudut agama Islam, faktor-faktor berlakunya gejala rasuah, dan usaha-usaha yang dijalankan di Malaysia untuk membanteras gejala rasuah. Perkara ini penting bagi mengenalpasti penjawat awam menanamkan keyakinan dalam melaksanakan tanggungjawab dengan menghindari diri daripada rasuah agar mereka sentiasa peka mengutamakan kepentingan awam

    The Design of Medium Access Control (MAC) Protocols for Energy Efficient and QoS Provision in Wireless Sensor Networks

    Get PDF
    This thesis work focuses on innovative design of media access control (MAC) protocols in wireless sensor networks (WNSs). The characteristics of the WSN inquire that the network service design considers both energy efficiency and the associated application requirement. However, most existing protocols address only the issue of energy efficiency. In this thesis, a MAC protocol has been proposed (referred to as Q-MAC) that not only minimized the energy consumption in multi-hop WSNs, but also provides Quality of Service (QoS) by differentiating network services based on priority levels prescribed by different applications. The priority levels reflect the state of system resources including residual energy and queue occupancies. Q-MAC contains both intra- and inter- node arbitration mechanisms. The intra-node packet scheduling employs a multiple queuing architectures, and applies a scheduling scheme consisting of packet classification and weighted arbitration. We introduce the Power Conservation MACAW (PC-MACAW), a power-aware scheduling mechanism which, together with the Loosely Prioritized Random Access (LPRA) algorithm, govern the inter-node scheduling. Performance evaluation are conducted between Q-MAC and S-MAC with respect to two performance metrics: energy consumption and average latency. Simulation results indicate Q-MAC achieves comparable performance to that of S-MAC in non-prioritized traffic scenarios. When packets with different priorities are introduced, Q-MAC yields noticeable average latency differentiations between the classes of service, while preserving the same degree of energy consumption as that of S-MAC. Since the high density nature of WSN may introduce heavy traffic load and thus consume large amount of energy for communication, another MAC protocol, referred to as the Deployment-oriented MAC (D-MAC)has been further proposed. D-MAC minimalizes both sensing and communication redundancy by putting majority of redundant nodes into the sleep state. The idea is to establish a sensing and communication backbone covering the whole sensing field with the least sensing and communication redundancy. In specific, we use equal-size rectangular cells to partition the sensing field and chose the size of each cell in a way such that regardless of the actual location within the cell, a node can always sense the whole cell and communicate with all the nodes in neighboring cells. Once the sensing field has been partitioned using these cells, a localized Location-aware Selection Algorithm (LSA) is carried out to pick up only one node within each cell to be active for a fixed amount of period. This selection is energy-oriented, only nodes with a maximum energy will be on and the rest of nodes will be put into the sleep state once the selection process is over. To balance the energy consumption, the selection algorithm is periodically conducted until all the nodes are out of power. Simulation results indicated that D-MAC saves around 80% energy compared to that of S-MAC and Q-MAC, while maintaining 99% coverage. D-MAC is also superior to S-MAC and Q-MAC in terms of average latency. However, the use of GPS in D-MAC in identifying the nodes within the same cell, would cause extra cost and complexity for the design of sensor nodes

    Secured System Layer Routing Protocols On Imperative Sensor Nodes

    Get PDF
    Sensor technology has shown tremendous development in the field of data environment like tracking and detection. The participating sensor nodes are prone to failure because of limited resources or limitations in security. The topology of the networks is highly dynamic in nature because of frequent failure of the sensor nodes. The Quality of Service (QoS) support to highly dynamic networks is one of the challenging tasks. In wireless sensor organize, security is a fundamental position in well-lit of its utilization in applications like monitoring, tracking, controlling, surveillance etc. Secure correspondence is greatly critical in conveying key data precisely and on the time through asset imperative sensor nodes. A 3 stage approach gives a secure message conveyance alternative to amplify the message conveyance proportion under antagonistic assaults. Firstly, we have outlined the system layer routing assaults on WSNs. Also, we have given a scientific categorization of secure routing protocols of WSNs. Thirdly, we have given a subjective correlation of existing secure routing protocols. The above quantitative secure investigation on the proposed routing convention in light of the criteria proposed

    Wireless body sensor networks for health-monitoring applications

    Get PDF
    This is an author-created, un-copyedited version of an article accepted for publication in Physiological Measurement. The publisher is not responsible for any errors or omissions in this version of the manuscript or any version derived from it. The Version of Record is available online at http://dx.doi.org/10.1088/0967-3334/29/11/R01

    Energy Efficiency and Traffic Pattern Discovery for Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) are regularly framed by the joint effort of the expansive measure of insignificant sensor nodes, which are associated through a wireless medium. In wireless sensor organize, security is a fundamental position in well-lit of its utilization in applications like monitoring, tracking, controlling, surveillance etc. Secure correspondence is greatly critical in conveying key data precisely and on the time through asset imperative sensor nodes. In this paper, our commitment is triple. Firstly, we have outlined the system layer routing assaults on WSNs. Also, we have given a scientific categorization of secure routing protocols of WSNs. Thirdly, we have given a subjective correlation of existing secure routing protocols. This situation is practically equivalent to conveying US Mail through USPS: express sends cost more than customary sends; be that as it may, sends can be conveyed quicker. The convention additionally gives a secure message conveyance alternative to amplify the message conveyance proportion under antagonistic assaults. What's more, we likewise give quantitative secure investigation on the proposed routing convention in light of the criteria proposed. In this way, unauthenticated individual can't get to the first information. By along these lines, the convention gives a secure message conveyance alternative to augment the message conveyance proportion under ill-disposed assaults
    • 

    corecore