7 research outputs found

    Person Identification through Harvesting Kinetic Energy

    Get PDF
    Energy-based devices made this possible to recognize the need for batteryless wearables. The batteryless wearable notion created an opportunity for continuous and ubiquitous human identification. Traditionally, securing device passwords, PINs, and fingerprints based on the accelerometer to sample the acceleration traces for identification, but the accelerometer's energy consumption has been a critical issue for the existing ubiquitous self-enabled devices. In this paper, a novel method harvesting kinetic energy for identification improves energy efficiency and reduces energy demand to provide the identification. The idea of utilizing harvested power for personal identification is actuated by the phenomena that people walk distinctly and generate different kinetic energy levels leaving their signs with a harvested power signal. The statistical evaluation of experimental results proves that power traces contain sufficient information for person identification. The experimental analysis is conducted on 85 persons walking data for kinetic power signal-based person identification. We select five different classifiers that provide exemplary performance for identifying an individual for their generated power traces, namely NaiveBayes, OneR, and Meta Bagging. The experimental outcomes demonstrate the classifier's accuracy of 90%, 97%, and 98%, respectively. The Dataset used is publicly available for the gait acceleration series

    Gentle Slow Start to Alleviate TCP Incast in Data Center Networks

    No full text
    Modern data center networks typically adopt symmetric topologies, such as leaf-spine and fat-tree. When a large number of transmission control protocol (TCP) flows in data center networks send data to the same receiver, the congestion collapse, called TCP Incast, frequently happens because of the huge packet losses and Time-Out. To address the TCP Incast issue, we firstly demonstrate that adjusting the increasing speed of the congestion window during the slow start phase is crucially important. Then we propose the Gentle Slow Start (GSS) algorithm, which adjusts the congestion window according to real-time congestion state in a gentle manner and smoothly switches from slow start to congestion avoidance phase. Furthermore, we present the implementation and design of Gentle Slow Start and also integrate it into the state-of-the-art data center transport protocols. The test results show that GSS effectively decreases the Incast probability and increases the network goodput by average 8x

    An Effective and Efficient Adaptive Probability Data Dissemination Protocol in VANET

    No full text
    Mobile network topology changes dynamically over time because of the high velocity of vehicles. Therefore, the concept of the data dissemination scheme in a VANET environment has become an issue of debate for many research scientists. The main purpose of VANET is to ensure passenger safety application by considering the critical emergency message. The design of the message dissemination protocol should take into consideration effective data dissemination to provide a high packet data ratio and low end-to-end delay by using network resources at a minimal level. In this paper, an effective and efficient adaptive probability data dissemination protocol (EEAPD) is proposed. EEAPD comprises a delay scheme and probabilistic approach. The redundancy ratio (r) metric is used to explain the correlation between road segments and vehicles’ density in rebroadcast probability decisions. The uniqueness of the EEAPD protocol comes from taking into account the number of road segments to decide which nodes are suitable for rebroadcasting the emergency message. The last road segment is considered in the transmission range because of the probability of it having small vehicle density. From simulation results, the proposed protocol provides a better high-packet delivery ratio and low-packet drop ratio by providing better use of the network resource within low end-to-end delay. This protocol is designed for only V2V communication by considering a beaconless strategy. the simulations in this study were conducted using Ns-3.26 and traffic simulator called “SUMO”

    Vehicular Ad Hoc Network (VANET) Connectivity Analysis of a Highway Toll Plaza

    No full text
    The aim of this paper was to study issues of network connectivity in vehicular ad hoc networks (VANETs) to avoid traffic congestion at a toll plaza. An analytical model was developed for highway scenarios where the traffic congestion could have the vehicles reduce their speed instead of blocking the flow of traffic. In this model, nearby vehicles must be informed when traffic congestion occurs before reaching the toll plaza so they can reduce their speed in order to avoid traffic congestion. Once they have crossed the toll plaza they can travel on at their normal speed. The road was divided into two or three sub-segments to help analyze the performance of connectivity. The proposed analytical model considered various parameters that might disturb the connectivity probability, including traveling speed, communication range of vehicles, vehicle arrival rate, and road length. The simulation results matched those of the analytical model, which showed the analytical model developed in this paper is effective

    Efficient Association Rules Hiding Using Genetic Algorithms

    No full text
    In today’s world, millions of transactions are connected to online businesses, and the main challenging task is ensuring the privacy of sensitive information. Sensitive association rules hiding (SARH) is an important goal of privacy protection algorithms. Various approaches and algorithms have been developed for sensitive association rules hiding, differentiated according to their hiding performance through utility preservation, prevention of ghost rules, and computational complexity. A meta-heuristic algorithm is a good candidate to solve the problem of SARH due to its selective and parallel search behavior, avoiding local minima capability. This paper proposes simple genetic encoding for SARH. The proposed algorithm formulates an objective function that estimates the effect on nonsensitive rules and offers recursive computation to reduce them. Three benchmark datasets were used for evaluation. The results show an improvement of 81% in execution time, 23% in utility, and 5% in accuracy

    Acceptance of IoT learning among university students at Pakistan

    No full text
    The Internet of Things abbreviated as an IoT is considered the most recent innovative and fastest-developing field that is to be applied in all aspects of life, in particular higher education. It has sparked interest as well as challenges among academics; the current research will concentrate on acceptance and adoption of IoT in the higher educational institutions of Pakistan. IoT supports educators in environment of learning and can have an impact on how we interact, connect, and work. In this study, we will look at two different aspects. The first one is how to teach students, and secondly how IoT can be used in educational institutions to enhance learning. This study looks at the factors that affect acceptance of IoT and use in an academic setting in Pakistan's higher education institutions. The current research establishes foundation for a comprehensive framework based on trusted technology and social psychology models, such as the Use of Technology 2 and Unified Theory of Acceptance (UTAUT2). The method proposed in this study is network analysis method to observe users' actions in relation to several IoT applications in higher education. An in-depth analysis and consideration of key deliverables which have a major impact on the Internet of Things (IoT) adoption in Pakistani educational institutions of higher level, revealed that only a few applications are heavily used in comparison to all other applications. This research lays the groundwork for developed countries to grow adoption and IoT technologies use in higher education, which will support both students and faculty

    Novel Multi-Level Dynamic Traffic Load-Balancing Protocol for Data Center

    No full text
    Typically, the production data centers function with various risk factors, such as for instance the network dynamicity, topological asymmetry, and switch failures. Hence, the load-balancing schemes should consider the sensing accurate path circumstances as well as the reduction of failures. However, under dynamic traffic, current load-balancing schemes use the fixed parameter setting, resulting in suboptimal performances. Therefore, we propose a multi-level dynamic traffic load-balancing (MDTLB) protocol, which uses an adaptive approach of parameter setting. The simulation results show that the MDTLB outperforms the state-of-the-art schemes in terms of both the flow completion time and throughput in typical data center applications
    corecore