69 research outputs found

    Statistical Analysis to Extract Effective Parameters on Overall Energy Consumption of Wireless Sensor Network (WSN)

    Full text link
    In this paper, we use statistical tools to analysis dependency between Wireless Sensor Network (WSN) parameters and overall Energy Consumption (EC). Our approach has two main phases: profiling, and effective parameter extraction. In former, a sensor network simulator is re-run 800 times with different values for eight WSN parameters to profile consumed energy in nodes; then in latter, three statistical analyses (p-value, linear and non-linear correlation) are applied to the outcome of profiling phase to extract the most effective parameters on WSN overall energy consumption.Comment: 5-pages. This paper has been accepted in PDCAT-2012 conference (http://www.pdcat2012.org/

    An Energy Driven Architecture for Wireless Sensor Networks

    Full text link
    Most wireless sensor networks operate with very limited energy sources-their batteries, and hence their usefulness in real life applications is severely constrained. The challenging issues are how to optimize the use of their energy or to harvest their own energy in order to lengthen their lives for wider classes of application. Tackling these important issues requires a robust architecture that takes into account the energy consumption level of functional constituents and their interdependency. Without such architecture, it would be difficult to formulate and optimize the overall energy consumption of a wireless sensor network. Unlike most current researches that focus on a single energy constituent of WSNs independent from and regardless of other constituents, this paper presents an Energy Driven Architecture (EDA) as a new architecture and indicates a novel approach for minimising the total energy consumption of a WS

    Active data-centric framework for data protection in cloud environment

    Get PDF
    Cloud computing is an emerging evolutionary computing model that provides highly scalable services over highspeed Internet on a pay-as-usage model. However, cloud-based solutions still have not been widely deployed in some sensitive areas, such as banking and healthcare. The lack of widespread development is related to users&rsquo; concern that their confidential data or privacy would leak out in the cloud&rsquo;s outsourced environment. To address this problem, we propose a novel active data-centric framework to ultimately improve the transparency and accountability of actual usage of the users&rsquo; data in cloud. Our data-centric framework emphasizes &ldquo;active&rdquo; feature which packages the raw data with active properties that enforce data usage with active defending and protection capability. To achieve the active scheme, we devise the Triggerable Data File Structure (TDFS). Moreover, we employ the zero-knowledge proof scheme to verify the request&rsquo;s identification without revealing any vital information. Our experimental outcomes demonstrate the efficiency, dependability, and scalability of our framework.<br /

    Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characterization

    Full text link
    The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these protocols are TCP protocol variants, which have demonstrated better performance in simulation and several limited network experiments but have limited practical applications because of implementation and installation difficulties. On the other hand, users who need to transfer bulk data (e.g., in grid/cloud computing) usually turn to application level solutions where these variants do not fair well. Among protocols considered in the application level solutions are UDP-based protocols, such as UDT (UDP-based Data Transport Protocol) for cloud /grid computing. Despite the promising development of protocols like UDT, what remains to be a major challenge that current and future network designers face is to achieve survivability and security of data and networks. Our previous research surveyed various security methodologies which led to the development of a framework for UDT. In this paper we present lowerlevel security by introducing an Identity Packet (IP) and Authentication Option (AO) for UDT.Comment: 17 page

    Applying fair intelligent congestion control in a hybrid QoS architecture for wireless environment

    Full text link
    This simple and scalable Differentiated Services (DiffServ) QoS control model is acceptable for the core of the network. However, more explicit and stringent admission and reservation based QoS mechanisms are required in the wireless access segment of the network, where available resources are severely limited and the degree of traffic aggregation is not significant, thus rendering the DiffServ principles less effective. In this paper we present a suitable hybrid QoS architecture framework to address the problem. At the wireless access end, the local QoS mechanism is designed in the context of IEEE 802.11 WLAN with 802.11e QoS extensions. At the edge and over the DiffServ domain, the Fair Intelligent Congestion Control (FICC) algorithm is applied to provide fairness among traffic aggregates and control congestion at the bottleneck interface between the wireless link and the network core.<br /

    Epidemiology of facial fractures: Incidence, prevalence and years lived with disability estimates from the Global Burden of Disease 2017 study

    Get PDF
    Background: The Global Burden of Disease Study (GBD) has historically produced estimates of causes of injury such as falls but not the resulting types of injuries that occur. The objective of this study was to estimate the global incidence, prevalence and years lived with disability (YLDs) due to facial fractures and to estimate the leading injurious causes of facial fracture. Methods: We obtained results from GBD 2017. First, the study estimated the incidence from each injury cause (eg, falls), and then the proportion of each cause that would result in facial fracture being the most disabling injury. Incidence, prevalence and YLDs of facial fractures are then calculated across causes. Results: Globally, in 2017, there were 7 538 663 (95% uncertainty interval 6 116 489 to 9 4
    • …
    corecore