14 research outputs found

    Energy saving and reliability for Wireless Body Sensor Networks (WBSN)

    Get PDF
    In healthcare and medical applications, the energy consumption of biosensor nodes affects the collection of biomedical data packets, which are sensed and measured from the human body and then transmitted toward the sink node. Nodes that are near to the sink node consume more energy as all biomedical packets are aggregated through these nodes when communicated to sink node. Each biosensor node in a wireless body sensor networks (WBSNs) such as ECG (Electrocardiogram), should provide accurate biomedical data due to the paramount importance of patient information. We propose a technique to minimise energy consumed by biosensor nodes in the bottleneck zone for WBSNs, which applies the Coordinated Duty Cycle Algorithm (CDCA) to all nodes in the bottleneck zone. Superframe order (SO) selection in CDCA is based on real traffic and the priority of the nodes in the WBSN. Furthermore, we use a special case of network coding, called Random Linear Network coding (RLNC), to encode the biomedical packets to improve reliability through calculating the probability of successful reception (PSR) at the sink node. It can be concluded that CDCA outperforms other algorithms in terms of energy saving as it achieves energy savings for most biosensor nodes in WBSNs. RLNC employs relay nodes to achieve the required level of reliability in WBSNs and to guarantee that the biomedical data is delivered correctly to the sink nod

    Improving the energy efficiency for the WBSN bottleneck zone based on random linear network coding

    Get PDF
    The reduction of energy consumption and the successful delivery of data are important for the Wireless Body Sensor Network (WBSN). Many studies have been proposed to improve energy efficiency, but most of them have not focussed on the biosensor nodes in the WBSN bottleneck zone. Energy consumption is a critical issue in WBSNs, as the nodes that are placed next to the sink node consume more energy. All biomedical packets are aggregated through these nodes forming a bottleneck zone. This paper proposes a novel mathematical model for body area network (BAN) topology to explain the deployment and connection between biosensor nodes, simple relay nodes, network coding relay nodes and the sink node. Therefore, this paper is dedicated to researching both the energy saving and delivery of data if there is a failure in one of the links of the transmission, which relates to the proposed Random Linear Network Coding (RLNC) model in the WBSN. Using a novel mathematical model for a WBSN, it is apparent that energy consumption is reduced and data delivery achieved with the proposed mechanism. This paper details the stages of the research work

    Transmission of medical messages of patient using control signal of cellular network

    Get PDF
    The healthcare system needs to track and monitor patients’ status and information. One of the most important requirements is that the patient is able to access the service anywhere at any time. Systems are being developed using the Internet to monitor patients’ status, and in some areas, especially rural areas and motorways, the Internet may not be available, even though the mobile network is available. In some cases, the network might be overloaded, so the patient information cannot be delivered to the hospital or medical centre. We propose a new method that uses the spare extension of the random access channel (RACH), which is carried by physical random access channel (PRACH) to send the patient information to the medical centre. We present the mathematical model of the channel and compare the results with another system from 3GPP to evaluate the results. The results show that the proposed method needs less time to transmit the patient’s information

    Role assigning and taking in cloud computing

    Get PDF
    The widespread use of cloud computing (CC) has brought to the forefront information technology (IT) governance issues, rendering the lack of expertise in handling CC-based IT controls a major challenge for business enterprises and other societal organizations. In the cloud-computing context, this study identifies and ranks the determinants of role assigning and taking by IT people. The study’s integrative research links CC and IT governance to humane arrangements, as it validates and ranks role assigning and taking components through in-depth interviews with twelve IT decision-makers and forty-four Information Systems Audit and Control Association (ISACA) members, engaged as panelists in a Delphi technique implementation. The empirical results recognize skills and competencies as prioritized determinants of IT controls, while IT security, risk and compliance emerge as capabilities crucial to evaluate and manage CC service providers. Despite the study’s generalizability limitations, its findings highlight future research paths and provide practical guidelines toward the high technology of open-market IT self-governance. The latter entails the humane flows of collegial control and responsibility, as opposed to the inhumane flows of authority and power, under the sequestered technique of the bureaucratically-hierarchized IT hetero-governanc

    Privacy enhanced interface identifiers in IPv6

    Get PDF
    The Internet Protocol Version 6 (IPV6) proposed to replace IPV4 to solve scalability challenges and improve quality of service and security. Current implementation of IPv6 uses static value that is determined from the Media Access Control (MAC) address as the Interface Identifier (IID). This results in a deterministic IID for each user that is the same regardless of any network changes. This provides an eavesdropper with the ability to easily track the physical location of the communicating nodes using simple tools, such as ping and traceroute. Moreover, this address generation method provides a means to correlate network traffic with a specific user which can be achieved by filtering the IID and traffic analysis. These serious privacy breaches need to be addressed before widespread deployment of IPv6. In this paper we propose a privacy-enhanced method for generating IID which combines different network parameters. The proposed method generates non-deterministic IIDs that is resistance against correlation attack. We validate our approach using Wireshark, ping and traceroute tools and show that our proposed approach achieves better privacy compared to the existing IID generation methods

    Integrating dual antennas with hybrid DC32-QAM modulation to increase the coverage area for wireless sensor networks

    Get PDF
    WSN’s and WPAN technologies continue to develop rapidly with integration into numerous applications. The ever increasing demands on these systems require that radio transceiver extended their coverage area and adopt more efficient algorithms to full fill the requirements of new applications. In this paper, a unique application of Multiple Input Multiple Output (MIMO) technology is applied to the application of WSN’s in order to dynamically extend range and thus overall coverage area. The scheme incorporates multiple antennas with Dual Circular 32-QAM modulation for MB-OFDM based systems in order to increase the wireless communication range. Simulation results are then presented that have shown a significant improvement in the system performance in terms of the bit error rate and also signal to noise power rati

    An investigation into the impact of social culture on women’s career in the IT field in Bahrain

    No full text
    This paper focuses on the aspects of the social culture and its effects on women work in the IT workforce in Bahrain. The investigation looks at how the culture manifests itself in the IT field and how it can affect women’s behaviors, attitudes and development in the IT career. In depth interviews were used for data gathering from a group of ten Bahraini women in a senior and middle management position in the IT field. Two common main themes arising from women’s interviews, which showed how the social culture impacts the IT workforce. One, the perceptions about the role of women and men in the IT jobs, and the second is the conflict between the social expectations about women with the nature of the IT work. The research offers insights into understanding how the culture impacts women in the IT workforce, and helps in raising the awareness about the cultural impact in the career development and advancement of women in the IT field in Bahrai
    corecore