27 research outputs found

    A critical review of MANET testbed using mobile robot technology

    Get PDF
    This paper is a continuation of our previous paper under the same topic, MANET testbed using mobile robot technology. In our previous paper, we studied the topic by scrutinizing all the technical aspects and presented it as a technical review. However in this paper, we study the topic and presents it as a critical review that dwells into four aspect, namely (i) purpose, a ccessibility and s cope of testbed facilities, (ii) usability and c ontrollability of robot mobility in t estbed facilities, (iii) repeatability and r e producibility of real m obility in t estbeds, and (iv) tools for MANET implementation, deployment and d ebugging for experiments. With the wealth of information on the topic provided in this paper, the content of this paper is expected to be a source of reference for MANET researchers who are at a crossroad when selecting the preferred mobi le robot technology and approach to sui t thei r own speci f ic needs

    A critical review of MANET testbed using mobile robot Technology

    Get PDF
    This paper is a continuation of our previous paper under the same topic, MANET testbed using mobile robot technology. In our previous paper, we studied the topic by scrutinizing all the technical aspects and presented it as a technical review. However in this paper, we study the topic and presents it as a critical review that dwells into four aspect, namely (i) purpose, a ccessibility and s cope of testbed facilities, (ii) usability and c ontrollability of robot m obility in t estbed facilities, (iii) repeatability and r e producibility of real m obility in t estbeds, and (iv) tools for MANET implementation, deployment and d ebugging for e xperiments. With the wealth of information on the topic provided in this paper, the content of this paper is expected to be a source of reference for MANET researchers who are at a crossroad when selecting the preferred mobile robot technology and approach to suit their own specific needs

    Visual analytics design for students assessment representation based on supervised learning algorithms

    Get PDF
    Visual Analytics is very effective in many applications especially in education field and improved the decision making on enhancing the student assessment. Student assessment has become very important and is identified as a systematic process that measures and collects data such as marks and scores in a manner that enables the educator to analyze the achievement of the intended learning outcomes. The objective of this study is to investigate the suitable visual analytics design to represent the student assessment data with the suitable interaction techniques of the visual analytics approach. sheet. There are six types of analytical models, such as the Generalized Linear Model, Deep Learning, Decision Tree Model, Random Forest Model, Gradient Boosted Model, and Support Vector Machine were used to conduct this research. Our experimental results show that the Decision Tree Models were the fastest way to optimize the result. The Gradient Boosted Model was the best performance to optimize the result

    Energy efficient and delay-aware adaptive slot allocation medium access control protocol for Wireless Body Area Network

    Get PDF
    Wireless Body Area Network (WBAN) is the cheapest solution using BioMedical Sensors. They monitor different physiological vital signs of a patient. The output of vital signs does not accept collision, delay, loss, and a high energy consumption of BMSs. This paper proposes Energy Efficient and Delay-Aware Adaptive Slots Allocation Medium Access Control (EED-MAC) Protocol for WBAN. This Proposed MAC provides sufficient and dedicated channels to all types of BMSs. The patient's data are divided according to the need of a patient. Moreover, the contentions of BMSs are reduced and does not drop data by proposing a Reduced Contention Adaptive Slots Allocation CSMA/CA (RCA-CSMA/CA) scheme. The third proposed scheme is Reliability-Aware Channel Allocation (RAC), which allocates channels for emergency-based BMSs using alert signals without contention. The simulation of the proposed MAC and other schemes achieve significant improvements against the state-of-the-art MAC protocols

    Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries

    Get PDF
    Abstract Background Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres. Methods This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and low–middle-income countries. Results In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of ‘single-use’ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for low–middle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia. Conclusion This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both high– and low–middle–income countries

    Towards enhancement of privacy-preserving data mining model for predicting students learning outcomes performance

    No full text
    There is massive data collection such as the student's information which is included their profile background and learning outcome performance that had been collected by the academic institution. With those of the data collection to identify the potential students who can contribute towards the development of the academic institution. An academic institution that provides open and distant learning programs can advantage from big data on their students' information, as well as data mining techniques and big data analytics tools, provided well as the students' right to privacy is protected. However, the student records shown the potential for enhanced information sharing throughout academic institution departments which raised up the privacy concern. Therefore, this study proposes the enhancement of Privacy Preserving Data Mining (PPDM) model for predicting students' learning outcomes performance strikes a better accuracy of data mining while preserving better data privacy. This PPDM combines two privacy preserving approaches which are k-anonymization and homomorphic encryption. On the other hand, for the data mining, classification algorithms such as Random Forest, Support Vector Machine, and Naïve Bayes are compared to find the best accuracy. The outcome of the proposed PPDM model is expected to give better prediction accuracy for students learning outcomes performance as well as high privacy preservation

    The implementation of competition to promote team working and thinking skills in computer network course

    No full text
    Computer Network course is a continuation from the theoretical Network Communication. This course is a 'lab-heavy' course that requires students to be adept in the different configurations of different networking devices, mainly routers and switches. Future network administrators must also be able to work in a team and think critically to manage and troubleshoot networking problems. Teamwork and thinking skills are two soft skills required and assessed in this course. Previous implementation and assessment of these two soft skills within the course were boring and ineffectual. Competition was introduced into class activities to promote and assess these skills, and it developed into the competition in discussion within this paper. This paper presents a study on the implementation of competition; namely NetXplorace, to promote and assess team working and thinking skills to students of the Computer Network course in School of Computing, Universiti Teknologi Malaysia. It will discuss the purpose and objective behind the program, the planning and implementation of the program, along with the outcome of this endeavor. Through NetXplorace, both soft skills were successfully implemented

    A conceptual framework of information security database audit and assessment

    Get PDF
    Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion

    Traffic priority-aware adaptive slot allocation for medium access control protocol in wireless body area network

    No full text
    Biomedical sensors (BMSs) monitor the heterogeneous vital signs of patients. They have diverse Quality of Service (QoS) requirements including reduced collision, delay, loss, and energy consumption in the transmission of data, which are non-constrained, delay-constrained, reliability-constrained, and critical. In this context, this paper proposes a traffic priority-aware adaptive slot allocation-based medium access control (TraySL-MAC) protocol. Firstly, a reduced contention adaptive slot allocation algorithm is presented to minimize contention rounds. Secondly, a low threshold vital signs criticality-based adaptive slot allocation algorithm is developed for high priority data. Thirdly, a high threshold vital signs criticality-based adaptive slot allocation algorithm is designed for low priority data. Simulations are performed to comparatively evaluate the performance of the proposed protocol with state-of-the-art MAC protocols. From the analysis of the results, it is evident that the proposed protocol is beneficial in terms of lower packet delivery delay and energy consumption, and higher throughput in realistic biomedical environments
    corecore