30 research outputs found

    DIFS modifications to support QoS in IEEE 802.11g DCF ad-hoc networks

    Get PDF
    This paper describes and investigates the QoS provisioning technique used in IEEE 802.11g ad-hoc structure. This research then propose better scheme to support QoS by modifying the DCF Interframe Space (DIFS) to use new values to bias towards the high priority traffic flow and distinguish it from the low priority traffic.Simulations are done using NS-2 and the findings presented. Results showed that better throughput can be achieved to provide better traffic flows on high priority traffi

    High speed internet development in Africa using 4G-LTE technology-a review

    Get PDF
    The African continent is ranked second most populated region and has a huge amount of natural resources to be locally transformed or outsourced overseas. The traditional telecommunications system has helped connect people and enabled them to manage their businesses and trading in Africa for a long-time; many African countries have embarked early in changing their network and technology systems during the first years of the information age. Over a few decades ago, the introduction of new telecommunication methods and techniques have influenced much of African countries’ growth via different perspectives. The situation has triggered an enormous interest in people. They analyzed the factors supporting such changes, which in the case of this paper is all about the advent and adoption of LTE/4G-LTE technologies including its service commercialization in Africa. This review article attempts to provide an overview of 4G-LTE networks technologies and the internet; it includes the current evolution of telecommunication networks within and even beyond the African continent, assisted by the 4G-LTE expansion. An extended view is provided throughout this article’s development with respect to what could be expected (or is missing) for the sake of this continent’s telecommunication infrastructure enhancement and a better QoS to Africa’s dwellers

    Voronoi diagram with fuzzy number and sensor data in an indoor navigation for emergency situation

    Get PDF
    Finding shortest and safest path during emergency situation is critical. In this paper, an indoor navigation during an emergency time is investigated using the combination of Voronoi Diagram and fuzzy number. The challenge in indoor navigation is to analyses the network when the shortest path algorithm does not work as always expected. There are some existing methods to generate the network model. First, this paper will discuss the feasibility and accuracy of each method when it is implemented on building environment. Next, this paper will discuss selected algorithms that determine the selection of the best route during an emergency situation. The algorithm has to make sure that the selected route is the shortest and the safest route to the destination. During a disaster, there are many uncertainties to deal with in determining the shortest and safest route. Fuzzy logic can be hardly called for to deal with these uncertainties. Based on sensor data, this paper will also discuss how to solve shortest path problem using a fuzzy number

    Assessing wireless security implementation in government and private sector companies in Malacca-a case study

    Get PDF
    Wireless local area networks (WLAN) have become a common technology in our everyday life. The use of WLAN can be seen among home users who use it to access the Internet and play games to business users who conduct daily business activities over the WLAN. The main objective of this case study was to ascertain the level of security with regards to wireless implementation in government and private sector companies in Malacca. To gauge the level of security being implemented, we conduct war driving sessions where we use certain hardware and software to map these wireless networks and then analyze their level of security in terms of whether they use encryption techniques such as WEP or WPA for data confidentiality.Simulation was done to show that some of these techniques are not secure. Then, comparisons are made between the use of open source software against vendor based software to collect and analyze the wireless networks before making several conclusions. The most alarming conclusion was that the level of awareness of wireless security among users in Malacca was still relatively low, especially in government sectors. Finally, we propose several steps that can be taken to minimize and counter problems faced when using wireless technology

    Assessing Wireless Security Implementation In Government And Private Sector Companies In Malacca – A Case Study

    Get PDF
    Wireless local area networks (WLAN) have become a common technology in our everyday life. The use of WLAN can be seen among home users who use it to access the Internet and play games to business users who conduct daily business activities over the WLAN. The main objective of this case study was to ascertain the level of security with regards to wireless implementation in government and private sector companies in Malacca. To gauge the level of security being implemented, we conduct war driving sessions where we use certain hardware and software to map these wireless networks and then analyze their level of security in terms of whether they use encryption techniques such as WEP or WPA for data confidentiality. Simulation was done to show that some of these techniques are not secure. Then, comparisons are made between the use of open source software against vendor based software to collect and analyze the wireless networks before making several conclusions. The most alarming conclusion was that the level of awareness of wireless security among users in Malacca was still relatively low, especially in government sectors. Finally, we propose several steps that can be taken to minimize and counter problems faced when using wireless technology

    Internet of Things based Heart Rate Monitoring and Alert System

    Get PDF
    Heart rate analysis provides vital information of the present condition of the human body and become one of the important indicators of health. Manual monitoring method no longer efficient since requires physical access from the medical staff. Thus, a system that provides a real-time monitoring and alert is needed. In this paper, we develop a heart rate alert system that is usable for medical officer and patients. The system measures the variation of the tissue blood flow rate by means of a photo transmitter and detector through fingertip known as photoplethysmography (PPG). The detected signal is passed through active low pass filter and then amplified by a two stages high gain amplifier. The amplified signal is feed into the microcontroller to process the heart rate. Then, the heart rate reading is transferred to a running web server for dashboard views for monitoring. For alerting medical officer, the system able to trigger and send a notification message through Telegram platform in the occurrences of abnormal heart rate reading. Mean of reading differences and response time testing were carried out for the performance testing of the system. Overall, the system is capable in providing an alternative method for the medical staff to monitor and get alert about the heart rate of the patients. This system can be deployed in hospitals or used by heart disease patients to monitor their heart rate condition from time to time

    Improved fuzzy c-means algorithm based on a novel mechanism for the formation of balanced clusters in WSNs

    Get PDF
    The clustering approach is considered as a vital method for many fields suchas machine learning, pattern recognition, image processing, information retrieval, data compression, computer graphics, and others.Similarly, it hasgreat significance in wireless sensor networks (WSNs) by organizing thesensor nodes into specific clusters. Consequently, saving energy and prolonging network lifetime, which is totally dependent on the sensor’s battery, that is considered asa major challenge in the WSNs. Fuzzyc-means (FCM) is one of classification algorithm, which is widely used in literature for this purpose in WSNs. However, according to the nature of random nodes deployment manner, on certain occasions, this situation forces this algorithm to produce unbalanced clusters, which adversely affects the lifetime of the network.To overcome this problem, a new clustering method called FCM-CMhas been proposed by improving the FCM algorithm to form balanced clustersfor random nodes deployment. The improvement is conductedby integrating the FCM with a centralized mechanism(CM).The proposed method will be evaluated based on four new parameters. Simulation result shows that our proposed algorithm is more superior to FCM by producing balanced clustersin addition to increasing the balancing of the intra-distances of the clusters, which leads to energy conservation and prolonging network lifespan

    Kajian Penggunaan Alat Bantu dalam Pembelajaran Rangkaian Internet Protokol Versi 6 (IPv6)

    Get PDF
    Kertas kerja ini menerangkan kaedah pembelajaran rangkaian internet protokol versi 6 (IPv6) kepada pelajar sarjana muda dan diploma di Universiti Teknikal Malaysia Melaka. Di sini, penerangan mengenai rangkaian IPv6 didalam bidang teknologi maklumat dilaksanakan melalui sokongan alat bantu simulasi rangkaian untuk memantapkan tahap pemahaman para pelajar. Oleh itu, langkah selanjutnya telah dilaksanakan bagi membuktikan di mana sistem alat bantu ini lebih efektif berbanding cara pembelajaran konvensional. Kajian telah dijalankan terhadap dua kumpulan pelajar daripada semester pengajian yang berbeza di mana hanya satu kumpulan sahaja diberi pendedahan kepada alat bantu tersebut. Melalui kaedah soal-selidik dan keputusan ujian pelajar, beberapa permasalahan dan penemuan berkaitan pembelajaran ini berjaya dihasilkan. Pelbagai kelebihan terdapat pada alat bantu simulasi yang berperanan dalam memudahkan pemahaman tentang rangkaian IPv6 merangkumi proses pemilihan, pengurusan dan pengkonfigurasian perkakasan dan rangkaian. Kaedah pembelajaran turut menjadi lebih mudah serta menarik melalui pendekatan opsyen samada Grafic Computer Interface (GUI) atau Command Line Interface (CLI). Penggunaan alat bantu simulasi oleh para pelajar secara langsung mempertingkatkan penguasaan kemahiran merekacipta dan membangunkan rangkaian IPv6. Jesteru itu, perlaksanaan pembelajaran berasaskan alat bantu seperti simulasi ini semakin mendapat galakan khususnya di dalam sektor pendidikan secara teknikal. Ini adalah berikutan pendekatan tersebut bersesuaian dengan kemudahan teknologi terkini

    Penggunaan Alat Bantu Simulasi Dalam Pembelajaran Rangkaian Kawasan Setempat Maya (VLAN)

    Get PDF
    Kertas kerja ini menerangkan kaedah pembelajaran Rangkaian Kawasan Setempat Maya (VLAN) kepada pelajar sarjana muda di Universiti Teknikal Malaysia Melaka. Di sini, penerangan mengenai rangkaian ini didalam bidang teknologi maklumat dilaksanakan melalui sokongan alat bantu simulasi rangkaian untuk memantapkan tahap pemahaman para pelajar. Pelbagai kelebihan terdapat pada alat bantu simulasi yang berperanan dalam memudahkan pemahaman tentang rangkaian ini merangkumi proses pemilihan, pengurusan dan pengkonfigurasian perkakasan dan rangkaian. Kaedah pembelajaran turut menjadi lebih mudah serta menarik melalui pendekatan opsyen samada Grafic Computer Interface (GUI) atau Command Line Interface (CLI). Penggunaan alat bantu simulasi oleh para pelajar secara langsung mempertingkatkan penguasaan kemahiran merekacipta dan membangunkan rangkaian. Jesteru itu, perlaksanaan pembelajaran berasaskan alat bantu seperti simulasi ini semakin mendapat galakan khususnya di dalam sektor pendidikan secara teknikal. Ini adalah berikutan pendekatan tersebut bersesuaian dengan kemudahan teknologi terkini. Secara kesimpulannya, pembangunan alat bantu pengajaran bersifat simulasi merupakan satu alternatif kepada kaedah pembelajaran konvensional dimana ianya lebih merangsang minda dan kreativiti seseorang pelajar khususnya bagi pembelajaran VLAN. Penggunaan elemen ini secara tidak langsung menghasilkan pembelajaran yang lebih anjal, berstruktur, menarik dan juga mudah difahami

    Evaluate the performance of K-Means and the fuzzy C-Means algorithms to formation balanced clusters in wireless sensor networks

    Get PDF
    The clustering approach is considered as a vital method for wireless sensor networks (WSNs) by organizing the sensor nodes into specific clusters. Consequently, saving the energy and prolonging network lifetime which is totally dependent on the sensors battery, that is considered as a major challenge in the WSNs. Classification algorithms such as K-means (KM) and Fuzzy C-means (FCM), which are two of the most used algorithms in literature for this purpose in WSNs. However, according to the nature of random nodes deployment manner, on certain occasions, this situation forces these algorithms to produce unbalanced clusters, which adversely affects the lifetime of the network. Based for our knowledge, there is no study has analyzed the performance of these algorithms in terms clusters construction in WSNs. In this study, we investigate in KM and FCM performance and which of them has better ability to construct balanced clusters, in order to enable the researchers to choose the appropriate algorithm for the purpose of improving network lifespan. In this study, we utilize new parameters to evaluate the performance of clusters formation in multi-scenarios. Simulation result shows that our FCM is more superior than KM by producing balanced clusters with the random distribution manner for sensor nodes
    corecore