In this paper we focus on intrusion detection in the mobile ad hoc networks (MANETs). Starting by an overview of the existing work in this field, and ending up with the proposal of a new distributed and cooperative ar...
详细信息
VoIP traffic over Mobile Ad-Hoc networks (MANETs) faces many interacting challenges such as the mobility of the nodes that leads to continuous link breakages, the restricted bandwidth availability, the different chara...
详细信息
ISBN:
(纸本)9781467358279
VoIP traffic over Mobile Ad-Hoc networks (MANETs) faces many interacting challenges such as the mobility of the nodes that leads to continuous link breakages, the restricted bandwidth availability, the different characteristics of the existing routing protocols, the used voice codecs, the number of the mobile nodes and the background traffic. These factors introduce variability in the latency and the packet loss rate, which in turn severely affects the voice quality that is closely related to the voice codecs used by the VoIP network. This paper examines the effects of these factors to the quality of the VoIP traffic over a MANET via extensive simulations. It also presents ways to improve the performance, based either on the routing layer or on the application layer with the aggregation of multiple voice payloads to a single packet. This aggregation significantly improves the performance of the G.711 codec, while the impact to the other codecs is negligible.
In this study, we present an innovative model for plaque growth utilizing a 3-Dimensional (3D) left coronary arterial tree reconstructed from computed tomographic (CT) data. The proposed model takes into consideration...
详细信息
In this study, we present an innovative model for plaque growth utilizing a 3-Dimensional (3D) left coronary arterial tree reconstructed from computed tomographic (CT) data. The proposed model takes into consideration not only the effect of the local hemodynamic factors but also major biological processes such as the low density lipoprotein (LDL) and high density lipoprotein (HDL) transport, the macrophages recruitment and the foam cells formation. The endothelial membrane is considered semi-permeable and endothelial shear stress dependent, while its permeability is modeled using the Kedem-Katscalsky equations. Patient specific biological data are used for the accurate modeling of plaque formation process. The finite element method (FEM) is employed for the solution of the system of partial differential equations. The results of the simulation are compared to the plaque progression in a follow-up CT examination performed three years after the initial investigation. The results show that the proposed model can be used to predict regions prone for plaque development of progression.
In the recent developments of human computer interaction, one central challenge has been to find and to explore alternatives to the legacy of the desktop computer paradigm for interaction design. To investigate this i...
详细信息
ISBN:
(纸本)9781450310154
In the recent developments of human computer interaction, one central challenge has been to find and to explore alternatives to the legacy of the desktop computer paradigm for interaction design. To investigate this issue further we have conducted an analysis on a fascinating piece of machinery often referred to as one of the predecessors of the modern day computer, the Jacquard loom. In analysing the Jacquard loom we look at qualities in design and interaction from some different perspectives: how historical tools, crafts, and practices can inform interaction design, the role of physicality, materiality, and whole-body interaction in order to rethink some current conceptions of interaction and design of computational devices. Copyright 2012 ACM.
Pervasive healthcare applications utilizing body sensor networks generate a vast amount of data that need to be managed and stored for processing and future usage. Cloud computing among with the Internet of Things (Io...
详细信息
Software artifacts at different levels of abstraction are closely inter-related. Developers require support for managing these inter-relationships as artifacts evolve during development. We describe a conceptual archi...
详细信息
ISBN:
(纸本)0889863237
Software artifacts at different levels of abstraction are closely inter-related. Developers require support for managing these inter-relationships as artifacts evolve during development. We describe a conceptual architecture and prototype for supporting traceability and inconsistency management between software requirements descriptions, UML-style use case models and black-box test plans. Key information models are extracted from each of these different kinds of software artifacts and elements in different models are implicitly or explicitly linked. Changes to one software artifact are detected and propagated to related artifacts in different information models and inform developers of change impact.
This paper presents "DynFire," a novel approach for the role-based, dynamic control of network firewalls. DynFire allows an individually controlled, secure access to the ITresources of a large organization, ...
详细信息
This paper considers cases where a specific number of nodes in an ad hoc network broadcast video and audio streams over the entire network. For the purpose, we have proposed Load and Battery Charge oriented Flooding (...
详细信息
Wireless Sensor networks (WSNs) require an efficient intrusion detection scheme to identify malicious attackers. Traditional detection schemes are not well suited for WSNs due to their higher false detection rate. In ...
详细信息
The DeSyRe project builds on-demand adaptive and reliable systems-on-Chips (SoCs). As fabrication technology scales down, chips are becoming less reliable, thereby incurring increased power and performance costs for f...
详细信息
暂无评论