63 research outputs found

    Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks

    Get PDF
    Among the issues the telecommunication industry is the demand for multimedia applications with Quality of Service (QoS) in wireless/mobile networks. In the face of this increasingly complex traffic mix, where each service imposes different requirements, QoS provisioning and guarantee for multimedia services have become increasingly important. This is partially due to the users' requirements and poses a difficult challenge for network service providers. The tasks are more challenging than those in the wired networks due to the shortage of resources and the mobility present in wireless networks. The mobility factor causes severe fluctuations of resource usage. In this research, the QoS provisioning and resource utilization for multimedia services in wireless/mobile networks aspects are addressed. The first proposed scheme is called Adaptive Multi-Class Services Controller scheme (AMCSC). This scheme harnesses the combinations of Call Admission Control (CAC), an Adaptive Bandwidth Allocation (ABA) algorithm with micro-Acceptable Bandwidth Level (micro-ABL) and the Connection Management Table (CMT). The specific objective in designing the AMCSC Scheme is to reduce the New Connection Blocking Probability (NCBP) and the Handoff Connection Dropping Probability (HCDP) by managing resource allocation to address. The insufficient resource problem is experienced by the MTs. This scheme supports multiple classes of non-adaptive and adaptive multimedia services with diverse QoS requirements. The second proposed scheme is a bandwidth reservation scheme based on Mobility Prediction Scheme (MPS). Two proposed MPSs are deployed to predict the mobility movement of mobiles. The first MPS obtains the user mobility information by Received Signal Strength (RSS) which also includes the direction of the MT. This is enhanced based also on the position of the MT within a sector and zones of the cell. The second MPS obtains the user mobility information using the road map information of the cell and the integrated RSS and Global Position System (GPS) measurements. The simulation results show that the proposed scheme enhances the estimation of the target cell. This shown by the reduction of the signalling traffic in wireless cellular networks, reduction of the number of terminated ongoing calls of non-real time traffic and reduction of the number of cancelled reservation due to false reservation. The third proposed framework is an integration of the AMCSC scheme and the bandwidth reservation done based on the MPS. This integration is used to achieve the ideal balance between the users' QoS guarantee of multiple classes of wireless multimedia and maximizing the bandwidth utilization. The performance result of the proposed framework has proven to improve the achieved performance metrics. The performances analysis in this research is discrete simulation. The proposed schemes have proven to enhance the performance in terms of NCBP and HCDP for each type of traffic, management the resource for multiple traffics with diverse requirement, bandwidth utilization and predicting the target cell in the right time and place

    Application and Performance Analysis of DSDV Routing Protocol in ad-hoc Wireless Sensor Network with Help of NS2 Knowledge

    Get PDF
    Wireless Sensor Networks (WSNs) are characterized by multi-hop wireless connectivity, frequently changing network topology and need for efficient routing protocols. The purpose of this paper is to evaluate performance of routing protocol DSDV in wireless sensor network (WSN) scales regarding the End-to-End delay and throughput PDR with mobility factor .Routing protocols are a critical aspect to performance in mobile wireless networks and play crucial role in determining network performance in terms of packet delivery fraction, end-to-end delay and packet loss. Destination-sequenced distance vector (DSDV) protocol is a proactive protocol depending on routing tables which are maintained at each node. The routing protocol should detect and maintain optimal route(s) between source and destination nodes. In this paper, we present application of DSDV in WSN as extend to our pervious study to the design and implementation the details of the DSDV routing protocol in MANET using the ns-2 network simulator. also, the performance of DSDV protocol in sensor network of randomly distributed mobile nodes with mobile source and sink nodes is investigated for MAC IEEE802.15.4 network by ns-2 simulator.

    Eklentiler kullanarak veri kaybını engelleme

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Bir çok organizasyon için çalışanlar tarafından farkında olmayarak veri sızıntısı oluşması büyük bir problem oluşturmaktadır. Organizasyonlar veri gizliliğini sağlamak için gün geçtikçe veri kaybı/sızıntısı önleme (DLP-Data Loss/Leakage Prevention) çözümlerini daha fazla kullanmaktadır. Şu anda, DLP çözümleri gizli verileri ayırt etmekte zorluk çekmektedir. Ayrıca, kullanıcıların gizli verileri gizli olmayan verilerden ayırt etmelerine çok az izin vermektedir. Üstelik, organizasyon çalışanlarının çalışma alanları haricinde çalışmalarına sınırlar konulmaktadır. Bu sorunu çözmek için, veri sahiplerinin dosyanın tüm yaşam döngüsü boyunca (oluşturma, düzenleme, vb.) dosyaların gizliliğini sınıflandırarak tanımlayabilecekleri bir DLP Eklentileri modeli sunmak önemlidir. Bu model, organizyon içinde çalışanlar tarafından sınıflandırılmış dosyaların kazayla sızmasını önlemek için veri şifreleme ve erişim kontrolü gibi güvenlik önlemlerini kullanır. Bu yaklaşım, doğru kullanıcının organizasyon içindeki veya dışındaki güvenlik erişim ayrıcalığına göre doğru dosyalara erişebileceğini garanti eder. Yani sınıflandırılmış dosyaları her zaman şifrelenmiş olarak tutmak, bu dosyaları; dinlenme, hareket halinde veya kullanırken koruyacaktır. DLP-Eklentisi, kullanıcılara dosyaların şifrelenmesi veya şifresini çözmek için herhangi bir ek prosedür eklemek zorunluluğu olmadan dosyalara doğru bir şekilde erişebilmelerini garanti edmektedir. Kullanıcının normalde olduğu gibi tek yapması gereken dosyayı açmak ve kapatmaktır. DPL-Eklentileri ile veri kaybı önleme çözümünün uygulanmasına yönelik bu yaklaşım, verilerinin korunması için Microsoft Office, pdf okuyucular, metin editörü, medya oynatıcılar ve posta uygulamaları gibi yaygın ofis uygulamalarına rahatlıkla eklenebilir. Bu amaçla, DLPEklentileri modellerinden bir tanesini Microsoft offıce Word kelime işlemci uygulamasında gerçekleştirilmiştir.Inadvertent Data leakage by insiders is considered a serious problem to many organizations. Organizations are increasingly implementing Data Leakage/Loss Prevention solutions also know as (DLP), to protect the confidentiality of their data. Currently, DLP solutions have difficulties to identify confidential data as well lack the ability to allow users to distinguish confidential from non-confidential data. Moreover, they are limited to work outside the organizations. In order to solve this problem, it is important to introduce a DLP-Plugins model where the data owners can identify the privacy of the files during their entire lifecycle (creating, editing, etc.) by classifying them. This model uses security measures such as data encryption and access control to prevent accidental leakage of the classified files by the insiders. This approach will guarantee that the right user will have access to the correct files according to their security access privilege inside or outside the organization. By always keeping classified files encrypted this will protect them all the time and everywhere i.e. at rest, in motion, and in use. The DLP-Plugin shall guarantee the usability for the users, so that they will be able to have the right access to the files, just in case they don't need to enforce any additional procedures to encrypt or decrypt the file. All that will be required is to simply open and close the file as they do normally. This approach to implementing data shrinkage and loss prevention solution with DPL-Plugins, can be added into the legacy applications like Microsoft Office, pdf readers, text editor, media players, and mail applications to protect their data. As an example to this DLP-Plugins model, we have built a DLP-Plugin for Microsoft offıce Word

    Oral Health Status, Oral Health Care And Dietary Practices Of Special Needs Children

    Get PDF
    Oral health is multifactorial. Children with special health care needs are at greater risk for poorer oral health than normal children Objectives: This study aimed to determine the prevalence of dental caries, periodontal disease, oral hygiene status and oral health care practices and dietary practices and explore its associations among special needs children. Methodology: This cross-sectional descriptive study involved 125 special needs school children in Kota Bharu district. DMFT, CPI and OHI-S indices were used to evaluate caries experience, periodontal status and oral hygiene status respectively. Dental examination was done on portable dental chair with portable light and mobile dental bus equipped with dental chair and lighting

    Mikrogefäßdichte als prognostisches Faktor in Plattenepithelkarzinom des Penis

    Get PDF
    OBJECTIVE: To examine the potential effect of tumor-induced angiogenesis in squamous cell carcinoma of the penis as a possible prognostic factor. PATIENTS AND METHODS: Immunohistochemistry was preformed to detect microvessels in tumor samples of 64 patients with squamous cell carcinoma of the penis. We used a monoclonal mouse antibody directed against CD34 antigen. Only 61 (30 with and 31 without metastasis) patients had good staining properties and were included. After immunostaining, the entire tumor section was scanned microscopically at low power (× 40) to identify hot spots within the tumor and at its periphery. Individual tumor microvessels were then counted under high power (× 200) to obtain a vessel count in a defined area, and the mean of the 3 highest microvessel counts was taken as the microvessel density (MVD). Microvessel counting was performed using a computer-aided image analysis system. The nodal status was based on histopathologic examination or an uneventful follow-up ≥ 2 years. RESULTS: The 5-year overall survival (OAS) was 75% and 30 % for those with high and low peritumoral MVD, respectively (log rank P = 0.01). No difference was noticed within the tumor with regard to high (5-year OAS of 65.03%) and low (5-year OAS of 60.56%) intratumoral MVD (log rank P = 0.99). The mean intratumoral MVD was 32.35 (3.16), 37.94 (3.35), and 62.66 (5.47) in T1, T2, and T3 respectively (ANOVA P = 0.0006), with increasing tendency. The mean peritumoral MVD was 55.91 (5.60), 56.8 (4.00), and 78.86 (8.71), respectively (P = 0.06). No correlation between MVD lymph node status and tumor grade was seen (P > 0.05). CONCLUSION: In our group of patients, a high peritumoral MVD was associated with a better 5-year OAS. However, for a reliable and reproducible assessment of tumor angiogenesis in penile squamous cell carcinoma, validation procedures and quality control protocols are mandatory

    ETIOLOGY AND RISK FACTORS OF STOMATITIS AMONG YEMENI DENTURE WEARERS

    Get PDF
    Objectives: Denture stomatitis (DS) is a benign condition, usually asymptomatic, that can affect denture wearer’s patients. The aim of this study was to describe the etiology of DS among Yemeni denture wearers and the risk factors of DS. A cross sectional study was carried out at Prothodontics Departments at the Faculty of Dentistry- Sana'a University, Sana’a city –Yemen. Methods: The study group consisted of 288 denture wearers' patients' contracting DS. The microbiological samples were collected by wiping sterile swabs on upper and lower denture fitting surfaces. Then, they were directly cultured for Candida in Chromomeric agar media and for bacteria in standard selective media, using standard bacteriological methods.  Results: The most common microbial cause of DS was C. albicans (58.3%), followed by S. mutans (17%), while S. aureus (4.9%), lactobacillus (3.1%) and C. glabrata (4.2%) were less common. There was an association between male patients, older age group and longer period of denture wearers with high risk of contracting candidal DS and bacterial DS. Most of those patients were suffering from DS Type I and few from Type II, but no case of DS Type III was found. Ending, DS is a condition that commonly affects denture wearers, and should be treated even if asymptomatic. The condition requires a combined treatment approach from both patient and clinician, and the role of the patient must be stressed. Conclusion: Management of aetiological risk factors is key in order to prevent recurrence. Treatment modalities may include: treatment of any underlying systemic risk factors, improvement in the fit of existing dentures, replacement of existing dentures, improved denture hygiene and the use of antifungal agents. Whichever methods are employed, the main aim of treatment is to eradicate the biofilm from the patient’s dentures. Peer Review History: Received 11 January 2017; Revised 13 February; Accepted 27 February, Available online 15 March 2018 Received file:        Reviewer's Comments: Average Peer review marks at initial stage: 4.5/10 Average Peer review marks at publication stage: 8.0/10 Reviewer(s) detail: Dr. Marwa A. A. Fayed, University of Sadat City, Egypt, [email protected] Dr. Masoumeh Divar, Shiraz University, Shiraz, Iran, [email protected] Similar Articles: RISK FACTORS OF PERIODONTAL DISEASES AMONG YEMENI YOUNG DENTAL PATIENTS SERO-PREVALENCE OF HEPATITIS C VIRUS AMONG DENTAL CLINIC WORKERS IN SANA’A CITY- YEMEN AND THE RISK FACTORS CONTRIBUTING FOR ITS INFECTIO

    The Impact of Strategic Leadership on Improving Organizational Performance in Yemeni Insurance Companies

    Get PDF
    The study aimed to determine the impact of strategic leadership in improving organizational performance in Yemeni insurance companies. The researchers relied on the descriptive analytical method and the questionnaire as a tool for the study. The study population consisted of all employees with job titles in companies in the field of study. A comprehensive inventory method was also used for all study subjects, which numbered (276) individuals at the specified functional levels. The study reached a number of results, the most important of which are: - The level of practicing strategic leadership in Yemeni insurance companies was high in all dimensions. - There was a statistically significant effect of the dimensions of strategic leadership in improving the organizational performance of Yemeni insurance companies. - There is no statistically significant effect of the dimension of supporting and enhancing organizational culture in improving organizational performance in Yemeni insurance companies. The study recommended the following: - The need to enhance organizational culture in dealing with all employees. - Increasing the effectiveness of organizational performance through companies encouraging employees when presenting creative ideas - Adopting proposals for developing performance

    Adaptive resource allocation scheme based on call admission control and mobility prediction for multimedia services in wireless cellular networks

    Get PDF
    QoS guaranteed for multimedia services in next generation wireless cellular networks poses great challenges due to the limited bandwidth and user mobility. Therefore, the demand for effective management of the resources is immensely needed to enhance the network performance. In this paper, adaptive resource allocation scheme based call admission control (CAC) and mobility prediction for controlling the multimedia traffic in the network to enhance the previous schemes which are reduce the handoff call dropping probability (HCDP) through an adaptive multimedia schemes with more accurate mobility prediction. However, the new calls have not been able to take advantage of the adaptive scheme and thus new call blocking probability (NCBP) has not improved as much. Therefore, the proposed scheme is designed to take advantage of the adaptive resource allocation scheme with new and handoff calls rather than only handoff call in order to enhance the system utilization and the NCBP. The simulation results show the performance of proposed scheme outperforms the compared scheme in terms of NCBP and bandwidth utilization
    corecore