82 research outputs found

    Application of rasch model on resilience in higher education: an examination of validity and reliability of Malaysian academician happiness index (MAHI)

    Get PDF
    This preliminary study was conducted to examine and verify the validity and reliability of the instrument on the Malaysian Academician Happiness Index (MAHI) on resilience. MAHI could be seen as a tool to measure the level of happiness and stress of academicians before determining how resilient the academicians were. Resilience can be defined as a mental ability of a person to recover quickly from illness or depression. MAHI instrument consisted of 66 items. The instrument was distributed to 40 academicians from three groups of universities which were the Focus University, Comprehensive University and Research University is using a survey technique. The instrument was developed to measure three main constructs which were the organization, individual and social that would affect the happiness and stress levels of academicians. This preliminary study employed the Rasch Measurement Model uses Winsteps software version 3.69.1.11. to examine the validity and reliability of the items. The results of the analysis of the MAHI instrument showed that the item reliability was 0.87, person reliability was 0.83 and value of Alpha Cronbach was 0.84. Meanwhile, misfit analysis showed that only there was one item with 1.46 logit that could be considered for dropping or needed improvement. Therefore, it highlighted that most of the items met the constructs’ need and can be used as a measurement indicator of MAHI. The implication of this instrument can help Malaysian academicians to be more resilient in facing challenges in the future

    Simulating Opportunistic Networks: Survey and Future Directions

    Full text link
    (c) 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works[EN] Simulation is one of the most powerful tools we have for evaluating the performance of opportunistic networks (OppNets). In this paper, we focus on available tools and mod- els, compare their performance and precision and experimentally show the scalability of different simulators. We also perform a gap analysis of state-of-the-art OppNet simulations and sketch out possible further development and lines of research. This paper is targeted at students starting work and research in this area while also serving as a valuable source of information for experienced researchers.This work was supported in part by the Ministerio de Economia y Competitividad, Programa Estatal de Investigacion, Desarrollo e Innovacion Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain, under Grant TEC2014-52690-R, in part by the Universidad Laica Eloy Alfaro de Manabi, and in part by the Secretaria Nacional de Educacion Superior, Ciencia, Tecnologia e Innovacion, Ecuador. (Corresponding author: Jens Dede.)Dede, J.; Förster, A.; Hernández-Orallo, E.; Herrera-Tapia, J.; Kuladinithi, K.; Kuppusamy, V.; Manzoni, P.... (2018). Simulating Opportunistic Networks: Survey and Future Directions. IEEE Communications Surveys & Tutorials. 20(2):1547-1573. https://doi.org/10.1109/COMST.2017.2782182S1547157320

    Performance analysis of V2X technologies 802.11p and LTE-PC5

    Get PDF
    The concept of Digital Twin (DT) has been broadly adopted in the Industry 4.0, in the healthcare and in the Smart Cities. It represents a digital model of the reality where it is possible to test and evaluate different actions before implementing them into the real world. In the context of Smart City, the digital copy of the city includes the representation of the road infrastructure, vehicles, pedestrians, .... Its main objectives are to ease the road maintenance, to provide the means for mobility simulations, and to create traffic information management systems. This prNowadays, Vehicular-to-Everything (V2X) communications are becoming an essential element to improve safe driving conditions and autonomous driving. This thesis presents a comparison of two V2X communication technologies: IEEE 802.11p, and Cellular-V2X. The objective of this study is to evaluate the performance of both technologies in terms of the Medium Acces Control (MAC) layer, especially in a congested environment. Therefore, we analyze the different schemes used on these technologies to access shared channel resources and avoid interferences. The study is conducted using several simulation tools: SUMO which allows us to create personalized scenarios, and OMNeT++ used to simulate the network and transmit all the V2X messages between the vehicles. With SUMO we created a highway scenario that can support a high density of vehicles. And OMNeT++ is used to change the main simulation parameters, and obtain results such as all the packets received and sent through the network. Finally, we defined some performance metrics to analyze the results and observe how the technologies react over a congested scenario, with high densities of vehicles

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    Performance and Energy-Tuning Methodology for Wireless Sensor Networks Using TunableMAC

    Get PDF
    Energy-efficiency and performance are at the forefront with regards to wireless sensor networks due to the resource-constrained nature of the sensors on the network. Most of the energy in a sensor is consumed by the radio and this therefore creates the need for a more efficient use of the Media Access Control (MAC) layer which controls access to the radio. The Castalia framework which runs on the OMNET++ simulation platform provides a MAC layer protocol – TunableMAC – which is used in this paper for tuning of performance and consumed power. Our goal is to improve as much as possible the performance/energy balance in terms of resources used up by security features, while attempting to preserve the overall lifespan of the wireless sensors. This paper investigates performance parameters for TunableMAC such as energy consumed, latency, throughput and network lifetime based on simulated temperature sensors. A 5-step methodology is proposed that can be helpful for minimizing the impact of denial-of-sleep (DOS) attacks. Hence, the benefit of this research is that it feeds into the development of a novel MAC protocol that is energy-aware and can autonomously guard against energy drain attacks such as DOS attacks

    Radio propagation modeling and measurements for ZigBee based indoor wireless sensor networks

    Get PDF
    The deployment of nodes in Wireless Sensor Networks (WSNs) arises as one of the biggest challenges of this field, which involves in distributing a large number of embedded systems to fulfill a specific application. The connectivity of WSNs is difficult to estimate due to the irregularity of the physical environment and affects the WSN designers? decision on deploying sensor nodes. Therefore, in this paper, a new method is proposed to enhance the efficiency and accuracy on ZigBee propagation simulation in indoor environments. The method consists of two steps: automatic 3D indoor reconstruction and 3D ray-tracing based radio simulation. The automatic 3D indoor reconstruction employs unattended image classification algorithm and image vectorization algorithm to build the environment database accurately, which also significantly reduces time and efforts spent on non-radio propagation issue. The 3D ray tracing is developed by using kd-tree space division algorithm and a modified polar sweep algorithm, which accelerates the searching of rays over the entire space. Signal propagation model is proposed for the ray tracing engine by considering both the materials of obstacles and the impact of positions along the ray path of radio. Three different WSN deployments are realized in the indoor environment of an office and the results are verified to be accurate. Experimental results also indicate that the proposed method is efficient in pre-simulation strategy and 3D ray searching scheme and is suitable for different indoor environments

    Including general environmental effects in K-factor approximation for rice-distributed VANET channels

    Full text link
    © 2014. This paper presents a method of approximating the Rician K-factor based on the instantaneous static environment. The strongest signal propagation paths are resolved in order to determine specular and diffuse powers for approximation. The model is experimentally validated in two different urban areas in New South Wales, Australia. Good agreement between the model and experimental data was obtained over short-range communication links, demonstrating the suitability of the model in urban VANETs. The paper concludes with recommendations for methods to account for vehicles in the simulation and incorporating additional phenomena (such as scattering) in the approximation

    Energy-efficient MAC protocol for wireless sensor networks

    Get PDF
    A Wireless Sensor Network (WSN) is a collection of tiny devices called sensor nodes which are deployed in an area to be monitored. Each node has one or more sensors with which they can measure the characteristics of their surroundings. In a typical WSN, the data gathered by each node is sent wirelessly through the network from one node to the next towards a central base station. Each node typically has a very limited energy supply. Therefore, in order for WSNs to have acceptable lifetimes, energy efficiency is a design goal that is of utmost importance and must be kept in mind at all levels of a WSN system. The main consumer of energy on a node is the wireless transceiver and therefore, the communications that occur between nodes should be carefully controlled so as not to waste energy. The Medium Access Control (MAC) protocol is directly in charge of managing the transceiver of a node. It determines when the transceiver is on/off and synchronizes the data exchanges among neighbouring nodes so as to prevent collisions etc., enabling useful communications to occur. The MAC protocol thus has a big impact on the overall energy efficiency of a node. Many WSN MAC protocols have been proposed in the literature but it was found that most were not optimized for the group of WSNs displaying very low volumes of traffic in the network. In low traffic WSNs, a major problem faced in the communications process is clock drift, which causes nodes to become unsynchronized. The MAC protocol must overcome this and other problems while expending as little energy as possible. Many useful WSN applications show low traffic characteristics and thus a new MAC protocol was developed which is aimed at this category of WSNs. The new protocol, Dynamic Preamble Sampling MAC (DPS-MAC) builds on the family of preamble sampling protocols which were found to be most suitable for low traffic WSNs. In contrast to the most energy efficient existing preamble sampling protocols, DPS-MAC does not cater for the worst case clock drift that can occur between two nodes. Rather, it dynamically learns the actual clock drift experienced between any two nodes and then adjusts its operation accordingly. By simulation it was shown that DPS-MAC requires less protocol overhead during the communication process and thus performs more energy efficiently than its predecessors under various network operating conditions. Furthermore, DPS-MAC is less prone to become overloaded or unstable in conditions of high traffic load and high contention levels respectively. These improvements cause the use of DPS-MAC to lead to longer node and network lifetimes, thus making low traffic WSNs more feasible.Dissertation (MEng)--University of Pretoria, 2008.Electrical, Electronic and Computer EngineeringMEngUnrestricte
    • …
    corecore