In this paper, the problem of path planning for a ground search unit looking for an object of unknown location is considered. As in the classical optimal searcher path problem, the probability of finding the search ob...
详细信息
ISBN:
(纸本)9780982443804
In this paper, the problem of path planning for a ground search unit looking for an object of unknown location is considered. As in the classical optimal searcher path problem, the probability of finding the search object is the main criterion of optimality and the search unit is constrained by the environment topology that influences its choices for a navigable path as well as its detection capabilities. This paper proposes an extension to the classical optimal searcher path problem in discrete time and space by integrating inter-region visibility as an additional criterion. This new formulation allows a refinement in the discretization of the space in which a ground search unit evolves. A general mixed-integer programming model is proposed, and experimental results with a moving object in grid environments are discussed.
The clinical symptoms of metabolic disorders during neonatal period are often not apparent, if not treated early irreversible damages such as mental retardation may occur, even death. Therefore, practicing newborn scr...
详细信息
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contai...
详细信息
We propose a three-layer architecture model (TLAM) for wireless sensor networks. The first layer (bottom layer) consists of a network of resource-constrained sensor nodes deployed in the field. The second layer contains a set of resource-rich dynamic sink nodes forming an ad hoc network. The sinks at layer second are responsible to monitor and collect data from a region, called cluster. So the sinks at second layer are also knows as cluster sinks. At the third layer, there is a resource-rich static sink, known as zonal sink also, responsible for data collection from cluster sinks. A cluster sink may be few hops away from a static sensor node and moves to the vicinity of sensor nodes to collect the data. Each cluster sink continuously updates the zonal sink by propagating the collected data from the respective cluster. The zonal sink buffers the collected data and propagates to base station. Zonal sink is the one, responsible for data transmission from network environment to the base station, where the data is processed for further use. TLAM approach is robust, increases sensor life by allowing them to operate with a limited transmission range only and provides reduced delay as cluster sink continuously updates to zonal sink without query.
Time-Division-Multiplexing (TDM) Virtual Circuit (VC) has been proposed to guarantee the Quality-of-Service requirements in communication for Network-on-Chip. In this paper, we explore the design space of slot allocat...
详细信息
Time-Division-Multiplexing (TDM) Virtual Circuit (VC) has been proposed to guarantee the Quality-of-Service requirements in communication for Network-on-Chip. In this paper, we explore the design space of slot allocation for configuring TDM VCs. Specifically, we investigate different slot assignment schemes, namely, distributed, random and consecutive schemes, which have significant impact on the configurability. We also propose to construct disjoint connected VC sets to effectively reduce the search space. We have realized and integrated them into our VC configuration flow. Our experimental results suggest that the optimal slot allocation cycle equals to the ratio of the link bandwidth to the maximal VC bandwidth, and the distributed slot assignment scheme performs better than the random and consecutive schemes.
Peering of Content Delivery Networks (CDNs) allow providers to rapidly scale-out to meet both flash crowds and anticipated increases in demand. Recent trends foster the need for a utility model for content delivery se...
详细信息
Peering of Content Delivery Networks (CDNs) allow providers to rapidly scale-out to meet both flash crowds and anticipated increases in demand. Recent trends foster the need for a utility model for content delivery services to provide transparency, high availability, reduced investment cost, and improved content delivery performance. Analysis of prior work reveals only a modest progress in evaluating the utility for peering CDNs. In this paper, we introduce a utility model and measure the content-serving ability of the peering CDNs system. Our model assists in providing a customer view of the system's health for different traffic types. Our model also captures the traffic activities in the system and helps to reveal the true propensities of participating CDNs to cooperate in peering. Through extensive simulations we unveil many interesting observations on how the utility of the peering CDNs system is varied for different system parameters and provide incentives for their exploitation in the system design.
We illustrate the effective use of ATIM (ad hoc traffic indication message) window in static sensors to obtain potential energy savings for sensors during data dissemination in wireless sensor networks. The network co...
详细信息
We illustrate the effective use of ATIM (ad hoc traffic indication message) window in static sensors to obtain potential energy savings for sensors during data dissemination in wireless sensor networks. The network consists of resource-rich mobile sink node and resource-constrained sensor nodes forming a square grid. Sink may be multihop away from the sensor nodes and in order to collect the data, it moves to the vicinity of the sensor nodes in the grid. Each sensor node in the grid uses an ATIM window and sleeps during that time to conserve energy. The sleeping sensor node wakes up at regular interval of time to read the beacon messages. If the message comes from sink, sensor node immediately reads the header part of query packet to check whether it is the targeted sensor. The targeted sensor further reads the remaining part of query packet and responds back to the sink with requested data. The rest of the sensor nodes just ignore the remaining part of the query packet and go to sleep mode. If the message comes from the peer sensor node, the neighbor nodes just ignore it. We consider an affordable wireless network system with four sensor nodes and one mobile sink. Mobile sink transfers the collected data directly to the control station.
The current researches and industries are looking forward to integrate different technologies to get a global technology that offers all of the intended services in a simple way. In this paper, a new communications sy...
详细信息
The current researches and industries are looking forward to integrate different technologies to get a global technology that offers all of the intended services in a simple way. In this paper, a new communications system is proposed to integrate the use of GSM over the available satellites infrastructures. The proposed communications system could be used to facilitates and get benefits of both systems (the GSM and Satellites) to achieve competitive services over the world. The proposed system is concentrated on a global communications system that served all over the world and gives some specialization and privacy for each country. Furthermore, this paper shows an algorithm on how to implement the GSM over satellite systems in an efficient, flexible, and cost-effective manner.
As a fundamental problem of wireless sensor networks, the minimal exposure path problem corresponding to the sensor network's worst-case coverage plays an important role in the applications for detecting intrusion...
详细信息
ISBN:
(纸本)9781424441488
As a fundamental problem of wireless sensor networks, the minimal exposure path problem corresponding to the sensor network's worst-case coverage plays an important role in the applications for detecting intrusions. However, most existing works about minimal exposure path are based on omnidirectional sensors. In contrast, this paper studies the minimal exposure path problem for directional sensor networks. We first develop a directional sensing model: directional sensitivity model. Then, we formulate the minimal exposure path problem by using two sensing intensity functions: all-sensor intensity function and maximum-sensor intensity function, and generate two weighted grids to convert the minimal exposure path problem into two discrete geometric problems. Based on the above weighted grids, we also develop two approximation algorithms to find the minimal exposure path for the directional sensitive model. We conduct extensive simulations to validate and evaluate our proposed models and algorithms.
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology department (ITD), M...
详细信息
ISBN:
(纸本)9781424451012
The purpose of this paper is to identify the threats that exist in Healthcare Information systems (HIS). The study has been carried out in three different departments namely, Information Technology department (ITD), Medical Record department (MRD) and X-Ray department in one of the leading government supported hospital in Malaysia. The hospital was equipped with Total Hospital Information System (THIS) environment. The data were collected using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The result shows the most critical threat for the THIS is the power failure. In addition, acts of human error or failure threat also show high frequency of occurrence. The contribution of the paper will be categorization of threats in HIS and can be used to design and implement effective security systems and policies in healthcare setting.
In wireless sensor networks, most existing works on region coverage mainly concentrate on the omnidirectional sensor based full coverage, which ensures that all points in the sensor-deployed region are covered. In con...
详细信息
暂无评论