65 research outputs found

    Application of UWB wireless MIMO connectivity inside ships

    Get PDF
    In this paper, Ultra wideband (UWB) technology is proposed for replacing the large amounts of wiring used in ships which can cause serious problems like electrical interference, short circuit fires and similar trouble.There are numerous applications of Wireless Sensor Networks (WSNs) like in target tracking, monitoring a large number of sensors at vital points with actuators, controllers etc.. However there are not many studies which focus on implementing this technology in Ships. Wireless communications can be difficult in ships due to many metallic structures. The proposed UWB technology is based on novel pulse shapes which are derived from mono cycle sine waves in the GHz range, which have been practically tested and found to comply with the FCC regulations, in terms of power levels and spectral mask limitations. The technique can be operated as a high bit rate fast digital personal area network (PLAN).The results obtained practically show that this wireless solution may provide cost-effective alternative to the huge amount of wiring and cables, which are used to interconnect sensors and peripheral devices to central digital control units.The proposed scheme has been analysed theoretically and implemented practically as well as by simulation. It gave sound results in terms of cost, speed, channel capacity as well as power and spectral mask compliance with FCC regulations

    Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies

    Get PDF
    Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also attempted to exploit the pandemic to facilitate a broad range of malicious activities, such as attempting to take over videoconferencing platforms used in online meetings/educational activities, information theft, and other fraudulent activities. This study briefly reviews some of the malicious cyber activities associated with COVID-19 and the potential mitigation solutions. We also propose an attack taxonomy, which (optimistically) will help guide future risk management and mitigation responses. ยฉ 2013 IEEE

    Blockchain Based Secure Interoperable Framework for the Internet of Medical Things

    Get PDF
    Internet of Medical Things (IoMT) has revolutionized the way medical infrastructure has been managed in the past. Multiple platforms in IoMT have disparate communication standards, data format requirements, and access policies, which produce immense overhead during data transfer among these platforms. In order to provide seamless healthcare services using IoMT, interoperability concerns of heterogeneous devices need to be addressed. Smart contracts using blockchain provide a secure communication for distributed objects to interact in a secure way. We propose a Blockchain-based Secure Interoperable Framework (BSIIoMT) using smart contracts for secure communication in IoMT. We present components, workflow, and design considerations of the BSIIoMT framework to show the feasibility of using edge-enabled blockchain for secure interoperability in IoMT. The BSIIoMT framework is an ongoing project where we present the framework and its components in this research where further results and evaluation will be presented in future

    Exact string matching algorithms : survey, issues, and future research directions

    Get PDF
    String matching has been an extensively studied research domain in the past two decades due to its various applications in the fields of text, image, signal, and speech processing. As a result, choosing an appropriate string matching algorithm for current applications and addressing challenges is difficult. Understanding different string matching approaches (such as exact string matching and approximate string matching algorithms), integrating several algorithms, and modifying algorithms to address related issues are also difficult. This paper presents a survey on single-pattern exact string matching algorithms. The main purpose of this survey is to propose new classification, identify new directions and highlight the possible challenges, current trends, and future works in the area of string matching algorithms with a core focus on exact string matching algorithms. ยฉ 2013 IEEE

    Effect of 3 Key Factors on Average End to End Delay and Jitter in MANET

    Get PDF
    A mobile ad-hoc network (MANET) is a self-configuring infrastructure-less network of mobile devices connected by wireless links where each node or mobile device is independent to move in any desired direction and thus the links keep moving from one node to another. In such a network, the mobile nodes are equipped with CSMA/CA (carrier sense multiple access with collision avoidance) transceivers and communicate with each other via radio. In MANETs, routing is considered one of the most difficult and challenging tasks. Because of this, most studies on MANETs have focused on comparing protocols under varying network conditions. But to the best of our knowledge no one has studied the effect of other factors on network performance indicators like throughput, jitter and so on, revealing how much influence a particular factor or group of factors has on each network performance indicator. Thus, in this study the effects of three key factors, i.e. routing protocol, packet size and DSSS rate, were evaluated on key network performance metrics, i.e. average delay and average jitter, as these parameters are crucial for network performance and directly affect the buffering requirements for all video devices and downstream networks

    Performance evaluation of seed values and pause times over high speed Wireless Campus Network in IEEE802.11e

    Get PDF
    IEEE802.11e standard assures to provide QoS using service differentiation mechanism over WLAN. The Enhanced Distributed Channel Access (EDCA) mechanism employs to differentiate the multimedia traffic based on assigned priorities and allows accessing the channel.Only one category of traffic permits access to the channel at a time to avoid traffic collision over the network. In EDCA, the back-off window algorithm generates back-off window size randomly during traffic transmission through the channel to prevent other categories of traffic to access the channel. Due to this randomness of back-off window algorithm to provide probabilistic QoS to satisfy the multimedia traffic through the network, the random mobility model can reduce the network performance. In this paper, we analyze the proposed network performance based on the variation of randomness using different seed values according to different pause time and evaluate the network performance using various performance metrics in IEEE802.11e

    The impact of randomness on high speed wireless campus network in IEEE802.11e

    Get PDF
    The enhancement of channel access mechanism assures to provide Quality of Service (QoS) using the service differentiation mechanism over WLAN in IEEE802.11e. The service differentiation scheme is used in the Enhanced Distributed Channel Access (EDCA) MAC layer protocol and this protocol is used the random back-off window algorithm to provide QoS for the real time multimedia applications. However, the back-off window mechanism ensures QoS to satisfy multimedia traffic but it only the probabilistic QoS due to the random nature of the algorithm. As like as the randomness of the mobility models that can be reduced the network performance. In this paper, we analyze the proposed network performance based on the variation of randomness using different seed values and evaluate the network performance using various performance metrics in IEEE802.11e
    • โ€ฆ
    corecore