7 research outputs found

    Unraveling Impact of Critical Sensor Density on Occlusion Coverage of Partial Targets for Directional Sensor Networks

    No full text
    Coverage is a prominent indicator for measuring the quality of service in directional sensor networks. From the perspective of energy and deployment costs, full coverage may be expensive or unrealistic, partial coverage can operate more energy-efficient by scheduling working status of sensors. In certain practical application scenarios, irregular obstacles like trees, mountains, buildings, and vehicles, which have adverse influence on QoC, often exist in the field of interest (FoI). Meanwhile, due to sensors may fall near the border of the FoI, it also has effect on the coverage contribution. In this paper, we assume that sensors are randomly deployed in a square FoI with irregular shape obstacles existence, and introduce the concept of occlusion coverage of partial targets. Afterwards, we take the border effects into account and derive the critical sensor density for achieving an expected coverage ratio with a high probability. Finally, we conduct a series of simulation experiments to verify the accuracy between simulation results and numerical results, and take analysis of mean absolute error between them. The results show that our method has good performance on estimating critical sensor density

    IMPACT OF PAIR PROGRAMMING ON NOVICE PERFORMANCE IN ONLINE FIRST PROGRAMMING LANGUAGE (FPL) DURING COVID-19

    No full text
    The intention of this research is to investigate effectiveness and impact of pairprogramming on the performance of novices in first online programminglanguage like C during covid-19 pandemic. This study analyzed the efficacy ofpair programming used as a teaching tool in online introductory programminglanguage. It was found that pair programming technique in teaching FPL hasconsiderable impact on grades, learning, error handlining, cognitiveprogramming and collaborating learning of novices in CS1.This paper reports onthe final results of novices indicating their progress in first online programminglanguage course. It is indicated that collective erudition had valuable impressionon novice learning outcomes thus making learning first programming languagemore interactive, appealing and exhilarating. We were concentrating on howpair programming has affected performance, retention, dropout rate, femaleand male performance of novices in online programming course. We inferredthat the treatment group with pair programming teaching approach performedbetter in programming and produced better programs with good understandingof error handling and recovery and their confident level much better in theirsolutions and relished with completion of their assignments and achieved bettergrades than the control group, in which no pair programming teaching methodwas used. The results of analysis indicate that in experimental treatment grouppass rate was high, female novices performed more effectively as compared tonon-pairs control group

    SDS: Scrumptious Dataflow Strategy for IoT Devices in Heterogeneous Network Environment

    No full text
    Communication technologies have drastically increased the number of wireless networks. Heterogeneous networks have now become an indispensable fact while designing the new networks and the way the data packet moves from device to device opens new challenges for transmitting the packet speedily, with maximum throughput and by consuming only confined energy. Therefore, the present study intends to provide a shrewd communication link among all IoT devices that becomes part of numerous heterogeneous networks. The scrumptious dataflow strategy (SDS) for IoT devices in the heterogeneous network environment is proposed and it would deal with all link selection and dataflow challenges. The SDS would accomplish the targeted output in five steps: Step 1 determines the utility rate of each heterogeneous link. Step 2 develops a link selection attribute (LSA) that gauges the loads of network features used for the link selection process. Step 3 calculates the scores of all heterogeneous networks. Step 4 takes the LSA table and computes the network preference for different scenarios, such as round trip time (RTTP), network throughput, and energy consumption. Step 5 sets the priority of heterogeneous networks based on the scores of network attributes. Performance of the proposed SDS mechanism with state of the art network protocols, such as high-speed packet access (HSPA), content-centric networking (CCN), and dynamic source routing (DSR), was determined by conducting a simulation with NS2 and, consequently, the SDS exhibited its shrewd performance. During comparative analysis, in terms of round trip time, the SDS proved that it utilized only 16.4 milliseconds to reach IoT device 50 and was first among all other protocols. Similarly, for network throughput, at IoT device 50, the throughputs of the SDS are recorded at 40% while the rest of other protocols were dead. Finally, while computing the energy consumption used to reach IoT device 50, the SDS was functional and possessed more than half of its energy compared to the other protocols. The SDS only utilized 302 joules while the rest of the protocols were about to die as they had consumed all of their energy

    Measuring secure software development awareness and usage among software developers

    No full text
    Abstract: Secure software development practices adoption could be the most influential factor for the future of software industry. Awareness and knowledge about security mechanisms and secure coding techniques plays a vital role in decision to consider security during software development by the software developers. This study aims to explore the security and secure software development awareness among software developers. The results of the study related to the use of secure software development methodologies showed a very low level of adoption level by the developers. It was revealed by the respondents that 82.72% respondents have never used any secure development methodology, about 13.67% respondents were using secure software development methodology in their software development from 1 to 4 years, 2.09% respondents using secure software development methodology in their software development from more than five years and only 1.57% respondents were using secure software development methodologies in their software development from less than a year. All the respondents were well aware of the software security but only 22.51% of the respondents were aware of the latest secure software development methodologies

    A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases

    No full text
    Many approaches for modelling security requirements have been proposed,but software industry did not reach on an agreement on how to express security requirements in a system model for software architecture. The main objective of this perspective paper is to summarize the problem space of representation of security patterns are proposed in the literature to help the developers who lack expertise in security to implement it. Applications of security patterns has been hindered by the fact that they lack directions for their implementations in a specific scenario. This paper presents a techniques for using mitigation use cases for representation solution provided by security patterns. Different challenges and issues were identified related to the application of security patterns in industry
    corecore