Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 16 Nov 2024Bibliometrics
article
Review: Wireless sensor networks for rehabilitation applications: Challenges and opportunities

Rehabilitation supervision has emerged as a new application of wireless sensor networks (WSN), with unique communication, signal processing and hardware design requirements. It is a broad and complex interdisciplinary research area on which more than ...

article
Review: Intrusion detection system: A comprehensive review

With the increasing amount of network throughput and security threat, the study of intrusion detection systems (IDSs) has received a lot of attention throughout the computer science field. Current IDSs pose challenges on not only capricious intrusion ...

article
Review: An intrusion detection and prevention system in cloud computing: A systematic review

The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. The traditional Intrusion Detection and Prevention Systems (IDPS) are largely inefficient to be deployed in cloud ...

article
Review: A survey of intrusion detection techniques in Cloud

In this paper, we survey different intrusions affecting availability, confidentiality and integrity of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) in Cloud are examined. ...

article
Review: A survey on interference management techniques in femtocell self-organizing networks

The femtocell concept is an emerging technology for deploying the next generation of the wireless networks, aiming at indoor coverage enhancement, increasing capacity, and offloading the overlay macrocell traffic. Nevertheless, one of the most critical ...

article
Review: Seamless handover integrated solution for video transmission over proxy mobile IPv6 in a micro mobility domain

Seamless communication is becoming one of the most important issues for the next generation of mobile and wireless networks. In this context, seamless is referred to users that are free to roam around different networks and at the same time stay ...

article
Review: A gradient based routing scheme for street lighting wireless sensor networks

Routing for wireless sensor networks based on gradient is a simple, reliable solution resulting in low information costs for the network package, as well as for the node itself. It is used for convergent traffic, where sensor nodes send messages to the ...

article
Review: Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks

An amendment to the 802.16e standard namely IEEE 802.16j specifying relay station (RS) and multi-hop relay base station (MR-BS) was approved in year 2006 supports Mobile Multi-hop Relay networks. (MMR). It provides coverage extension to isolated area ...

article
Review: Mobile guides: Taxonomy of architectures, context awareness, technologies and applications

Portable devices are increasingly employed in a wide range of mobile guidance applications. Typical examples are guides in urban areas, museum guides, and exhibition space aids. The demand is for the delivery of context-specific services, wherein the ...

article
Review: An initiative for a classified bibliography on TCP/IP congestion control

During last two decades researchers, scholars and students are continuously embracing and improving TCP congestion performance both in wired and wireless networks by focusing on four modules of congestion control algorithms i.e., slow start, congestion ...

article
Review: Wireless Sensor Network transport protocol: A critical review

The transport protocols for Wireless Sensor Network (WSN) play vital role in achieving the high performance together with longevity of the network. The researchers are continuously contributing in developing new transport layer protocols based on ...

article
A SIP servlets-based framework for service provisioning in stand-alone MANETs

Mobile Ad hoc Networks (MANETs) are transient networks formed dynamically by a collection of arbitrarily located wireless mobile nodes without relying on any existing network infrastructure or centralized administration. They are either stand alone or ...

article
Low latency and energy efficient routing tree for wireless sensor networks with multiple mobile sinks

We propose the minimum Wiener index spanning tree (MWST) as a routing topology that is suitable for sensor networks with multiple mobile base nodes. However, it was proved that finding a spanning tree with the minimum Wiener index from a weighted graph ...

article
MDiag: Mobility-assisted diagnosis for wireless sensor networks

Though widely employed in various applications, wireless sensor networks (WSNs) are liable to failures, especially after deployment. Since the on-site failures are difficult to reproduce, it is of critical importance to perform in-situ diagnosis. ...

article
Towards secure and communication-efficient broadcast encryption systems

Many emerging network applications are based upon a group communication model where security is a critical design issue. We address the broadcast encryption problem of distributing to a group of network entities a confidential cryptographic key, which ...

article
An efficient single-iteration single-bit request scheduling algorithm for input-queued switches

Aiming at minimizing communication overhead of iterative scheduling algorithms for input-queued packet switches, an efficient single-iteration single-bit request scheduling algorithm called Highest Rank First with Request Compression 1 (HRF/RC1) is ...

article
Handling large-scale node failures in mobile sensor/robot networks

In Wireless Sensor Networks (WSNs), maintaining connectivity with the sink node is a crucial issue to collect data from sensors without any interruption. While sensors are typically deployed in abundance to tolerate possible node failures, a large ...

article
Multi-manifold model of the Internet delay space

The network coordinate systems (NCSes) can assist the network applications to improve their performance by choosing preferred severs or constructing optimal overlay networks. However, the current NCSes cannot predict the end-to-end delay accurately, ...

article
Towards a predictive cache replacement strategy for multimedia content

In recent years, telecom operators have been moving away from traditional broadcast-driven television, towards IP-based interactive and on-demand multimedia services. Consequently, multicast is no longer sufficient to limit the amount of generated ...

article
Multi-target indoor localization and tracking on video monitoring system in a wireless sensor network

The development of wireless sensor networks (WSNs) has greatly encouraged the use of sensors for multi-target tracking. The high efficiency detection and location monitoring are critical requirements for multi-target tracking in a WSN. In this paper, we ...

article
A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata

In the rising paradigm of cloud computing, attainment of sustainable levels of cloud users' trust in using cloud services is directly dependent on effective mitigation of its associated impending risks and resultant security threats. Among the various ...

article
An applications perspective into the Future Internet

The building of the Future Internet is well on its way with many research projects and experimental development activities in different parts of the works. However the debate over different approaches is still ongoing. Much of the comparison is ...

article
Development and performance evaluation of a new RSS tool for a Web-based system: RSS_PROYECT

The aim of this paper is the development, implementation and subsequent performance evaluation of an innovative tool called RSS_PROYECT, based on the RSS technology for content syndication. At the present, there are several Web content syndicators; ...

article
Sensing task assignment via sensor selection for maximum target coverage in WSNs

In this paper, we consider the problem of assigning the sensing task to cover maximum number of targets while minimizing the energy consumption of the sensing operation. To this end, we define the sensing task as an optimization problem of adjusting the ...

article
RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments

In ad hoc grid environments, resources are not always available since nodes can spontaneously connect and disconnect at any time. Thus, these environments demand the correct execution of tasks to guarantee good performance. However, there are malicious ...

article
A secure and efficient batch binding update scheme for route optimization of nested NEtwork MObility (NEMO) in VANETs

NEtwork MObility (NEMO) is designed to efficiently deal with the mobility of a set of mobile nodes using Mobile Routers (MRs). NEMO is extremely suitable for Vehicle Ad hoc NETworks (VANETs) due to its highly mobile nature. However, NEMO also suffers ...

article
Benefits of using parallelized non-progressive network coding

Network coding helps improve communication rate and save bandwidth by performing a special coding at the sending or intermediate nodes. However, encoding/decoding at the nodes creates computation overhead on large input data that causes coding delays. ...

article
DLS: A dynamic local stitching mechanism to rectify transmitting path fragments in wireless sensor networks

In this paper, a pair of novel rectification algorithms (greedy negative pressure push algorithm and dynamic local stitching algorithm) is proposed to cooperatively repair broken transmitting paths in Wireless Sensor Networks. Our approach is to ...

article
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks

Wireless sensor network (WSN) can be deployed in any unattended environment. With the new developed IoT (Internet of Things) technology, remote authorized users are allowed to access reliable sensor nodes to obtain data and even are allowed to send ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.