Abstract: Wireless Sensor Network (WSN) routing is complex
due to its dynamic nature, computational overhead, limited battery
life, non-conventional addressing scheme, self-organization, and
sensor nodes limited transmission range. An energy efficient routing
protocol is a major concern in WSN. LEACH is a hierarchical WSN
routing protocol to increase network life. It performs self-organizing
and re-clustering functions for each round. This study proposes a
better sensor networks cluster head selection for efficient data
aggregation. The algorithm is based on Tabu search.
Abstract: Background: To improve the delivery of paediatric
healthcare in low resource settings, Community Health Workers
(CHW) have been provided with a paper-based set of protocols
known as Community Case Management (CCM). Yet research has
shown that CHW adherence to CCM guidelines is poor, ultimately
impacting health service delivery. Digitising the CCM guidelines via
mobile technology is argued in extant literature to improve CHW
adherence. However, little research exist which outlines how (a) this
process can be digitised and (b) adherence could be improved as a
result. Aim: To explore how an electronic mobile version of CCM
(eCCM) can overcome issues associated with the paper-based CCM
protocol (inadequate adherence to guidelines) vis-à-vis service
blueprinting. This service blueprint will outline how (a) the CCM
process can be digitised using mobile Clinical Decision Support
Systems software to support clinical decision-making and (b)
adherence can be improved as a result. Method: Development of a
single service blueprint for a standalone application which visually
depicts the service processes (eCCM) when supporting the CHWs,
using an application known as Supporting LIFE (SL eCCM app) as
an exemplar. Results: A service blueprint is developed which
illustrates how the SL eCCM app can be utilised by CHWs to assist
with the delivery of healthcare services to children. Leveraging
smartphone technologies can (a) provide CHWs with just-in-time
data to assist with their decision making at the point-of-care and (b)
improve CHW adherence to CCM guidelines. Conclusions: The
development of the eCCM opens up opportunities for the CHWs to
leverage the inherent benefit of mobile devices to assist them with
health service delivery in rural settings. To ensure that benefits are
achieved, it is imperative to comprehend the functionality and form
of the eCCM service process. By creating such a service blueprint for
an eCCM approach, CHWs are provided with a clear picture
regarding the role of the eCCM solution, often resulting in buy-in
from the end-users.
Abstract: Underwater acoustic networks have attracted great
attention in the last few years because of its numerous applications.
High data rate can be achieved by efficiently modeling the physical
layer in the network protocol stack. In Acoustic medium,
propagation speed of the acoustic waves is dependent on many
parameters such as temperature, salinity, density, and depth.
Acoustic propagation speed cannot be modeled using standard
empirical formulas such as Urick and Thorp descriptions. In this
paper, we have modeled the acoustic channel using real time data of
temperature, salinity, and speed of Bay of Bengal (Indian Coastal
Region). We have modeled the acoustic channel by using Mackenzie
speed equation and real time data obtained from National Institute of
Oceanography and Technology. It is found that acoustic propagation
speed varies between 1503 m/s to 1544 m/s as temperature and
depth differs. The simulation results show that temperature, salinity,
depth plays major role in acoustic propagation and data rate
increases with appropriate data sets substituted in the simulated
model.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
systems.
Abstract: The main issue in designing a wireless sensor network
(WSN) is the finding of a proper routing protocol that complies with
the several requirements of high reliability, short latency, scalability,
low power consumption, and many others. This paper proposes a
novel routing algorithm that complies with these design
requirements. The new routing protocol divides the WSN into several subnetworks
and each sub-network is divided into several clusters. This
division is designed to reduce the number of radio transmission and
hence decreases the power consumption. The network division may
be changed dynamically to adapt with the network changes and
allows the realization of the design requirements.
Abstract: This paper presents the interface ConductHome which
controls home automation systems with a Leap Motion using
“invariant gesture protocols”. This interface is meant to simplify the
interaction of the user with its environment. A hardware part allows
the Leap Motion to be carried around the house. A software part
interacts with the home automation box and displays the useful
information for the user. An objective of this work is the
development of a natural/invariant/simple gesture control interface to
help elder people/people with disabilities.
Abstract: The availability to deploy mobile applications for
health care is increasing daily thru different mobile app stores. But
within these capabilities the number of hacking attacks has also
increased, in particular into medical mobile applications. The security
vulnerabilities in medical mobile apps can be triggered by errors in
code, incorrect logic, poor design, among other parameters. This is
usually used by malicious attackers to steal or modify the users’
information. The aim of this research is to analyze the vulnerabilities
detected in mobile medical apps according to risk factor standards
defined by OWASP in 2014.
Abstract: There are a number of Distributed Generations (DGs)
installed in microgrid, which may have diverse path and direction of
power flow or fault current. The overcurrent protection scheme for the
traditional radial type distribution system will no longer meet the
needs of microgrid protection. Integrating the Intelligent Electronic
Device (IED) and a Supervisory Control and Data Acquisition
(SCADA) with IEC 61850 communication protocol, the paper
proposes a Microgrid Protection Management System (MPMS) to
protect power system from the fault. In the proposed method, the
MPMS performs logic programming of each IED to coordinate their
tripping sequence. The GOOSE message defined in IEC 61850 is used
as the transmission information medium among IEDs. Moreover, to
cope with the difference in fault current of microgrid between
grid-connected mode and islanded mode, the proposed MPMS applies
the group setting feature of IED to protect system and robust
adaptability. Once the microgrid topology varies, the MPMS will
recalculate the fault current and update the group setting of IED.
Provided there is a fault, IEDs will isolate the fault at once. Finally, the
Matlab/Simulink and Elipse Power Studio software are used to
simulate and demonstrate the feasibility of the proposed method.
Abstract: Objective: Sharing devastating news with patients is
often considered the most difficult task of doctors. This study aimed
to explore patients’ perceptions of receiving bad news including
which features improve the experience and which areas need refining. Methods: A questionnaire was written based on the steps of the
SPIKES model for breaking bad new. 20 patients receiving treatment
for a hematological malignancy completed the questionnaire. Results: Overall, the results are promising as most patients praised
their consultation. ‘Poor’ was more commonly rated by women and
participants aged 45-64. The main differences between the ‘excellent’
and ‘poor’ consultations include the doctor’s sensitivity and checking
the patients’ understanding. Only 35% of patients were asked their
existing knowledge and 85% of consultations failed to discuss the
impact of the diagnosis on daily life. Conclusion: This study agreed with the consensus of existing
literature. The commended aspects include consultation set-up and
information given. Areas patients felt needed improvement include
doctors determining the patient’s existing knowledge and checking
new information has been understood. Doctors should also explore
how the diagnosis will affect the patient’s life. With a poorer
prognosis, doctors should work on conveying appropriate hope. The
study was limited by a small sample size and potential recall bias.
Abstract: Numerous investigations suggest that Mesenchymal
Stem Cells (MSCs) in general represent a valuable tool for therapy of
symptoms related to chronic inflammatory diseases. Blue Horizon
Stem Cell Therapy Program is a leading provider of adult and
children’s stem cell therapies. Uniquely we have safely and
efficiently treated more than 600 patients with documenting each
procedure. The purpose of our study is primarily to monitor the
immune response in order to validate the safety of intravenous
infusion of human umbilical cord blood derived MSCs (UC-MSCs),
and secondly, to evaluate effects on biomarkers associated with
chronic inflammation. Nine patients were treated for conditions
associated with chronic inflammation and for the purpose of antiaging.
They have been given one intravenous infusion of UCMSCs.
Our study of blood test markers of 9 patients with chronic
inflammation before and within three months after MSCs treatment
demonstrates that there is no significant changes and MSCs treatment
was safe for the patients. Analysis of different indicators of chronic
inflammation and aging included in initial, 24-hours, two weeks and
three months protocols showed that stem cell treatment was safe for
the patients; there were no adverse reactions. Moreover data from
follow up protocols demonstrates significant improvement in energy
level, hair, nails growth and skin conditions. Intravenously
administered UC-MSCs were safe and effective in the improvement
of symptoms related to chronic inflammation. Further close
monitoring and inclusion of more patients are necessary to fully
characterize the advantages of UC-MSCs application in treatment of
symptoms related to chronic inflammation.
Abstract: Mobile Ad Hoc Networks (MANETs) is a collection
of mobile devices forming a communication network without
infrastructure. MANET is vulnerable to security threats due to
network’s limited security, dynamic topology, scalability and the lack
of central management. The Quality of Service (QoS) routing in such
networks is limited by network breakage caused by node mobility or
nodes energy depletions. The impact of node mobility on trust
establishment is considered and its use to propagate trust through a
network is investigated in this paper. This work proposes an
enhanced Associativity Based Routing (ABR) with Fuzzy based
Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS
and to mitigate network attacks.
Abstract: Wireless Sensor Networks (WSNs) enable new
applications and need non-conventional paradigms for the protocol
because of energy and bandwidth constraints, In WSN, sensor node’s
life is a critical parameter. Research on life extension is based on
Low-Energy Adaptive Clustering Hierarchy (LEACH) scheme,
which rotates Cluster Head (CH) among sensor nodes to distribute
energy consumption over all network nodes. CH selection in WSN
affects network energy efficiency greatly. This study proposes an
improved CH selection for efficient data aggregation in sensor
networks. This new algorithm is based on Bacterial Foraging
Optimization (BFO) incorporated in LEACH.
Abstract: Establishing a secure communication of Internet
conferences for participants is very important. Before starting the
conference, all the participants establish a common conference key to
encrypt/decrypt communicated messages. It enables participants to
exchange the secure messages. Nevertheless, in the conference, if
there are any malicious participants who may try to upset the key
generation process causing other legal participants to obtain a different
conference key. In this article, we propose an improved conference
key agreement with fault-tolerant capability. The proposed scheme
can filter malicious participants at the beginning of the conference to
ensure that all participants obtain the same conference key. Compare
with other schemes, our scheme is more secure and efficient than
others.
Abstract: Geographical routing protocol requires node physical
location information to make forwarding decision. Geographical
routing uses location service or position service to obtain the position
of a node. The geographical information is a geographic coordinates
or can be obtained through reference points on some fixed coordinate
system. Link can be formed between two nodes. Link lifetime plays a
crucial role in MANET. Link lifetime represent how long the link is
stable without any failure between the nodes. Link failure may occur
due to mobility and because of link failure energy of nodes can be
drained. Thus this paper proposes survey about link lifetime
prediction using geographical information.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: File sharing in networks is generally achieved using
Peer-to-Peer (P2P) applications. Structured P2P approaches are
widely used in adhoc networks due to its distributed and scalability
features. Efficient mechanisms are required to handle the huge
amount of data distributed to all peers. The intrinsic characteristics of
P2P system makes for easier content distribution when compared to
client-server architecture. All the nodes in a P2P network act as both
client and server, thus, distributing data takes lesser time when
compared to the client-server method. CHORD protocol is a resource
routing based where nodes and data items are structured into a 1-
dimensional ring. The structured lookup algorithm of Chord is
advantageous for distributed P2P networking applications. However,
structured approach improves lookup performance in a high
bandwidth wired network it could contribute to unnecessary overhead
in overlay networks leading to degradation of network performance.
In this paper, the performance of existing CHORD protocol on
Wireless Mesh Network (WMN) when nodes are static and dynamic
is investigated.
Abstract: Mobile Adhoc Networks (MANETs) are
infrastructure-less, dynamic network of collections of wireless mobile
nodes communicating with each other without any centralized
authority. A MANET is a mobile device of interconnections through
wireless links, forming a dynamic topology. Routing protocols have a
big role in data transmission across a network. Routing protocols,
two major classifications are unipath and multipath. This study
evaluates performance of an on-demand multipath routing protocol
named Adhoc On-demand Multipath Distance Vector routing
(AOMDV). This study proposes Energy Aware AOMDV (EAAOMDV)
an extension of AOMDV which decreases energy
consumed on a route.
Abstract: Based on application requirements, nodes are static or
mobile in Wireless Sensor Networks (WSNs). Mobility poses
challenges in protocol design, especially at the link layer requiring
mobility adaptation algorithms to localize mobile nodes and predict
link quality to be established with them. This study implements
XMAC and Berkeley Media Access Control (BMAC) routing
protocols to evaluate performance under WSN’s static and mobility
conditions. This paper gives a comparative study of mobility-aware
MAC protocols. Routing protocol performance, based on Average
End to End Delay, Average Packet Delivery Ratio, Average Number
of hops, and Jitter is evaluated.
Abstract: Most of the existing video streaming protocols
provide video services without considering security aspects in
decentralized mobile ad-hoc networks. The security policies adapted
to the currently existing non-streaming protocols, do not comply with
the live video streaming protocols resulting in considerable
vulnerability, high bandwidth consumption and unreliability which
cause severe security threats, low bandwidth and error prone
transmission respectively in video streaming applications. Therefore
a synergized methodology is required to reduce vulnerability and
bandwidth consumption, and enhance reliability in the video
streaming applications in MANET. To ensure the security measures
with reduced bandwidth consumption and improve reliability of the
video streaming applications, a Secure Low-bandwidth Video
Streaming through Reliable Multipath Propagation (SLVRMP)
protocol architecture has been proposed by incorporating the two
algorithms namely Secure Low-bandwidth Video Streaming
Algorithm and Reliable Secure Multipath Propagation Algorithm
using Layered Video Coding in non-overlapping zone routing
network topology. The performances of the proposed system are
compared to those of the other existing secure multipath protocols
Sec-MR, SPREAD using NS 2.34 and the simulation results show
that the performances of the proposed system get considerably
improved.
Abstract: The conventional Wi-Fi backscatter system can only
process one-to-one communication between the Wi-Fi reader and the
Wi-Fi tag. For improvement of throughput of the conventional system,
this paper proposes the multi-to-multi communication system. In the
proposed system, the interference by the multi-to-multi
communication is effectively cancelled by the orthogonal multiple
access based on the identification code of the tag. Although the
overhead is generated by the procedure for the multi-to-multi
communication, because the procedure is processed by the Wi-Fi
protocol, the overhead is insignificant for the entire communication
procedure. From the numerical results, it is confirmed that the
proposed system has nearly proportional increased throughput in
according to the number of the tag that simultaneously participates in
communication.