Displaying publications 1 - 20 of 89 in total

Abstract:
Sort:
  1. Umar IA, Mohd Hanapi Z, Sali A, Zulkarnain ZA
    Sensors (Basel), 2016 Jun 22;16(6).
    PMID: 27338411 DOI: 10.3390/s16060943
    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.
    Matched MeSH terms: Computer Communication Networks
  2. Al-Mekhlafi ZG, Hanapi ZM, Othman M, Zukarnain ZA
    PLoS One, 2017;12(1):e0167423.
    PMID: 28056020 DOI: 10.1371/journal.pone.0167423
    Recently, Pulse Coupled Oscillator (PCO)-based travelling waves have attracted substantial attention by researchers in wireless sensor network (WSN) synchronization. Because WSNs are generally artificial occurrences that mimic natural phenomena, the PCO utilizes firefly synchronization of attracting mating partners for modelling the WSN. However, given that sensor nodes are unable to receive messages while transmitting data packets (due to deafness), the PCO model may not be efficient for sensor network modelling. To overcome this limitation, this paper proposed a new scheme called the Travelling Wave Pulse Coupled Oscillator (TWPCO). For this, the study used a self-organizing scheme for energy-efficient WSNs that adopted travelling wave biologically inspired network systems based on phase locking of the PCO model to counteract deafness. From the simulation, it was found that the proposed TWPCO scheme attained a steady state after a number of cycles. It also showed superior performance compared to other mechanisms, with a reduction in the total energy consumption of 25%. The results showed that the performance improved by 13% in terms of data gathering. Based on the results, the proposed scheme avoids the deafness that occurs in the transmit state in WSNs and increases the data collection throughout the transmission states in WSNs.
    Matched MeSH terms: Computer Communication Networks*
  3. Abidi SS, Yusoff Z
    PMID: 10724889
    The Malaysian Telemedicine initiative advocates a paradigm shift in healthcare delivery patterns by way of implementing a person-centred and wellness-focused healthcare system. This paper introduces the Malaysian Telemedicine vision, its functionality and associated operational conditions. In particular, we focus on the conceptualisation of one key Telemedicine component i.e. the Lifetime Health Plan (LHP) system--a distributed multimodule application for the periodic monitoring and generation of health-care advisories for all Malaysians. In line with the LHP project, we present an innovative healthcare delivery info-structure--LifePlan--that aims to provide life-long, pro-active, personalised, wellness-oriented healthcare services to assist individuals to manage and interpret their health needs. Functionally, LifePlan based healthcare services are delivered over the WWW, packaged as Personalised Lifetime Health Plans that allow individuals to both monitor their health status and to guide them in healthcare planning.
    Matched MeSH terms: Computer Communication Networks/trends
  4. Abidi SS, Goh A, Yusoff Z
    Stud Health Technol Inform, 1998;52 Pt 2:1282-6.
    PMID: 10384666
    The practice of medicine, with its wide range of environmental conditions and complex dependencies, has long been used as a test bed for various advanced technologies. Telemedicine, as conceptualised within the Multimedia Super Corridor (MSC) context, is seen as the application of several relatively mature technologiesartificial intelligence (AI), multimedia communication and information systems (IS) amongst othersso as to benefit a large cross-section of the Malaysian population. We will discuss in general terms the Malaysian vision on the comprehensive MSC telemedicine solution, its functionality and associated operational conditions. In particular, this paper focuses on the conceptualisation of one key telemedical component i.e. the Lifetime Health Plan (LHP) system, which is eventually intended to be a distributed multi-module application for the periodic monitoring and generation of health-care advisories for upwards of 20 million Malaysians.
    Matched MeSH terms: Computer Communication Networks
  5. Marzo RR, Ahmad A, Islam MS, Essar MY, Heidler P, King I, et al.
    PLoS Negl Trop Dis, 2022 01;16(1):e0010103.
    PMID: 35089917 DOI: 10.1371/journal.pntd.0010103
    BACKGROUND: Mass vaccination campaigns have significantly reduced the COVID-19 burden. However, vaccine hesitancy has posed significant global concerns. The purpose of this study was to determine the characteristics that influence perceptions of COVID-19 vaccine efficacy, acceptability, hesitancy and decision making to take vaccine among general adult populations in a variety of socioeconomic and cultural contexts.

    METHODS: Using a snowball sampling approach, we conducted an online cross-sectional study in 20 countries across four continents from February to May 2021.

    RESULTS: A total of 10,477 participants were included in the analyses with a mean age of 36±14.3 years. The findings revealed the prevalence of perceptions towards COVID-19 vaccine's effectiveness (78.8%), acceptance (81.8%), hesitancy (47.2%), and drivers of vaccination decision-making (convenience [73.3%], health providers' advice [81.8%], and costs [57.0%]). The county-wise distribution included effectiveness (67.8-95.9%; 67.8% in Egypt to 95.9% in Malaysia), acceptance (64.7-96.0%; 64.7% in Australia to 96.0% in Malaysia), hesitancy (31.5-86.0%; 31.5% in Egypt to 86.0% in Vietnam), convenience (49.7-95.7%; 49.7% in Austria to 95.7% in Malaysia), advice (66.1-97.3%; 66.1% in Austria to 97.3% in Malaysia), and costs (16.0-91.3%; 16.0% in Vietnam to 91.3% in Malaysia). In multivariable regression analysis, several socio-demographic characteristics were identified as associated factors of outcome variables including, i) vaccine effectiveness: younger age, male, urban residence, higher education, and higher income; ii) acceptance: younger age, male, urban residence, higher education, married, and higher income; and iii) hesitancy: male, higher education, employed, unmarried, and lower income. Likewise, the factors associated with vaccination decision-making including i) convenience: younger age, urban residence, higher education, married, and lower income; ii) advice: younger age, urban residence, higher education, unemployed/student, married, and medium income; and iii) costs: younger age, higher education, unemployed/student, and lower income.

    CONCLUSIONS: Most participants believed that vaccination would effectively control and prevent COVID-19, and they would take vaccinations upon availability. Determinant factors found in this study are critical and should be considered as essential elements in developing COVID-19 vaccination campaigns to boost vaccination uptake in the populations.

    Matched MeSH terms: Computer Communication Networks
  6. Showen R, Dunson C, Woodman GH, Christopher S, Lim T, Wilson SC
    Mar Pollut Bull, 2018 Mar;128:496-507.
    PMID: 29571401 DOI: 10.1016/j.marpolbul.2018.01.029
    Results are presented of a demonstration of real-time fish blast location in Sabah, Malaysia using a networked hydroacoustic array based on the ShotSpotter gunshot location system. A total of six acoustic sensors - some fixed and others mobile - were deployed at ranges from 1 to 9 km to detect signals from controlled test blasts. This allowed the blast locations to be determined to within 60 m accuracy, and for the calculated locations to be displayed on a map on designated internet-connected computers within 10 s. A smaller three-sensor system was then installed near Semporna in Eastern Sabah that determined the locations of uncontrolled blasts set off by local fishermen. The success of these demonstrations shows that existing technology can be used to protect reefs and permit more effective management of blast fishing activity through improved detection and enforcement measures and enhanced community engagement.
    Matched MeSH terms: Computer Communication Networks
  7. Sookhak M, Akhundzada A, Sookhak A, Eslaminejad M, Gani A, Khurram Khan M, et al.
    PLoS One, 2015;10(1):e0115324.
    PMID: 25602616 DOI: 10.1371/journal.pone.0115324
    Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols.
    Matched MeSH terms: Computer Communication Networks*
  8. Jahanirad M, Anuar NB, Wahab AWA
    Forensic Sci Int, 2017 Mar;272:111-126.
    PMID: 28129583 DOI: 10.1016/j.forsciint.2017.01.010
    The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification. Although initial results were promising but theoretical reasoning for this is yet to be found. The study suggested computing entropy of mel-frequency cepstrum coefficients (entropy-MFCC) from near-silent segments as an intrinsic feature set that captures the device response function due to the tolerances in the electronic components of individual computer devices. By applying the supervised learning techniques of naïve Bayesian, linear logistic regression, neural networks and support vector machines to the entropy-MFCC features, state-of-the-art identification accuracy of near 99.9% has been achieved on different sets of computer devices for both call recording and microphone recording scenarios. Furthermore, unsupervised learning techniques, including simple k-means, expectation-maximization and density-based spatial clustering of applications with noise (DBSCAN) provided promising results for call recording dataset by assigning the majority of instances to their correct clusters.
    Matched MeSH terms: Computer Communication Networks*
  9. Jan S, Yafi E, Hafeez A, Khatana HW, Hussain S, Akhtar R, et al.
    Sensors (Basel), 2021 Apr 25;21(9).
    PMID: 33922886 DOI: 10.3390/s21093000
    A significant increase has been observed in the use of Underwater Wireless Sensor Networks (UWSNs) over the last few decades. However, there exist several associated challenges with UWSNs, mainly due to the nodes' mobility, increased propagation delay, limited bandwidth, packet duplication, void holes, and Doppler/multi-path effects. To address these challenges, we propose a protocol named "An Efficient Routing Protocol based on Master-Slave Architecture for Underwater Wireless Sensor Network (ERPMSA-UWSN)" that significantly contributes to optimizing energy consumption and data packet's long-term survival. We adopt an innovative approach based on the master-slave architecture, which results in limiting the forwarders of the data packet by restricting the transmission through master nodes only. In this protocol, we suppress nodes from data packet reception except the master nodes. We perform extensive simulation and demonstrate that our proposed protocol is delay-tolerant and energy-efficient. We achieve an improvement of 13% on energy tax and 4.8% on Packet Delivery Ratio (PDR), over the state-of-the-art protocol.
    Matched MeSH terms: Computer Communication Networks
  10. Soleymani A, Nordin MJ, Sundararajan E
    ScientificWorldJournal, 2014;2014:536930.
    PMID: 25258724 DOI: 10.1155/2014/536930
    The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as personal medical information, official correspondence, or governmental and military documents, are saved and transmitted in the form of images over public networks. Hence, a fast and secure cryptosystem is needed for high-resolution images. In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. The scheme uses Arnold cat map for bit- and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis of five different images demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.
    Matched MeSH terms: Computer Communication Networks*
  11. Shabbir A, Rizvi S, Alam MM, Shirazi F, Su'ud MM
    PLoS One, 2024;19(2):e0296392.
    PMID: 38408070 DOI: 10.1371/journal.pone.0296392
    The quest for energy efficiency (EE) in multi-tier Heterogeneous Networks (HetNets) is observed within the context of surging high-speed data demands and the rapid proliferation of wireless devices. The analysis of existing literature underscores the need for more comprehensive strategies to realize genuinely energy-efficient HetNets. This research work contributes significantly by employing a systematic methodology, utilizing This model facilitates the assessment of network performance by considering the spatial distribution of network elements. The stochastic nature of the PPP allows for a realistic representation of the random spatial deployment of base stations and users in multi-tier HetNets. Additionally, an analytical framework for Quality of Service (QoS) provision based on D-DOSS simplifies the understanding of user-base station relationships and offers essential performance metrics. Moreover, an optimization problem formulation, considering coverage, energy maximization, and delay minimization constraints, aims to strike a balance between key network attributes. This research not only addresses crucial challenges in creating EE HetNets but also lays a foundation for future advancements in wireless network design, operation, and management, ultimately benefiting network operators and end-users alike amidst the growing demand for high-speed data and the increasing prevalence of wireless devices. The proposed D-DOSS approach not only offers insights for the systematic design and analysis of EE HetNets but also systematically outperforms other state-of-the-art techniques presented. The improvement in energy efficiency systematically ranges from 67% (min side) to 98% (max side), systematically demonstrating the effectiveness of the proposed strategy in achieving higher energy efficiency compared to existing strategies. This systematic research work establishes a strong foundation for the systematic evolution of energy-efficient HetNets. The systematic methodology employed ensures a comprehensive understanding of the complex interplay of network dynamics and user requirements in a multi-tiered environment.
    Matched MeSH terms: Computer Communication Networks*
  12. Spohr MH
    Healthc Inform, 2000 Apr;17(4):49-52, 54.
    PMID: 11066568
    Matched MeSH terms: Computer Communication Networks/organization & administration*
  13. Homaei MH, Salwana E, Shamshirband S
    Sensors (Basel), 2019 Jul 18;19(14).
    PMID: 31323905 DOI: 10.3390/s19143173
    "Internet of Things (IoT)" has emerged as a novel concept in the world of technology and communication. In modern network technologies, the capability of transmitting data through data communication networks (such as Internet or intranet) is provided for each organism (e.g. human beings, animals, things, and so forth). Due to the limited hardware and operational communication capability as well as small dimensions, IoT undergoes several challenges. Such inherent challenges not only cause fundamental restrictions in the efficiency of aggregation, transmission, and communication between nodes; but they also degrade routing performance. To cope with the reduced availability time and unstable communications among nodes, data aggregation, and transmission approaches in such networks are designed more intelligently. In this paper, a distributed method is proposed to set child balance among nodes. In this method, the height of the network graph increased through restricting the degree; and network congestion reduced as a result. In addition, a dynamic data aggregation approach based on Learning Automata was proposed for Routing Protocol for Low-Power and Lossy Networks (LA-RPL). More specifically, each node was equipped with learning automata in order to perform data aggregation and transmissions. Simulation and experimental results indicate that the LA-RPL has better efficiency than the basic methods used in terms of energy consumption, network control overhead, end-to-end delay, loss packet and aggregation rates.
    Matched MeSH terms: Computer Communication Networks
  14. Dzulkifli AR, Aishah AL, Ch'ng HS, Rose A, Rahmat A, Isa AM, et al.
    J Audiov Media Med, 1994 Jul;17(3):117-20.
    PMID: 7636117
    A number of health databases is now available in Malaysia, but few are accessible to the general public. However, recently a service was launched nationwide via a videotex system to also target the Malaysia public. This service is provided by the School of Pharmaceutical Sciences, Universiti Sains Malaysia (USM) in collaboration with several Malaysian Government ministries and agencies. Access to health information via videotex, be it medical, pharmaceutical or environmental is viewed as an effective means of on-line information dissemination. It provides not only rapid retrieval but is also economical and interactive, particularly suitable for a developing country.
    Matched MeSH terms: Computer Communication Networks/organization & administration*
  15. Al-Medhwahi M, Hashim F, Ali BM, Sali A
    PLoS One, 2016;11(6):e0156880.
    PMID: 27257964 DOI: 10.1371/journal.pone.0156880
    The rapid expansion of wireless monitoring and surveillance applications in several domains reinforces the trend of exploiting emerging technologies such as the cognitive radio. However, these technologies have to adjust their working concepts to consider the common characteristics of conventional wireless sensor networks (WSNs). The cognitive radio sensor network (CRSN), still an immature technology, has to deal with new networks that might have different types of data, traffic patterns, or quality of service (QoS) requirements. In this paper, we design and model a new cognitive radio-based medium access control (MAC) algorithm dealing with the heterogeneous nature of the developed networks in terms of either the traffic pattern or the required QoS for the node applications. The proposed algorithm decreases the consumed power on several fronts, provides satisfactory levels of latency and spectrum utilization with efficient scheduling, and manages the radio resources for various traffic conditions. An intensive performance evaluation is conducted to study the impact of key parameters such as the channel idle time length, node density, and the number of available channels. The performance evaluation of the proposed algorithm shows a better performance than the comparable protocols. Moreover, the results manifest that the proposed algorithm is suitable for real time monitoring applications.
    Matched MeSH terms: Computer Communication Networks*
  16. Zubair S, Fisal N, Baguda YS, Saleem K
    Sensors (Basel), 2013;13(10):13005-38.
    PMID: 24077319 DOI: 10.3390/s131013005
    Interest in the cognitive radio sensor network (CRSN) paradigm has gradually grown among researchers. This concept seeks to fuse the benefits of dynamic spectrum access into the sensor network, making it a potential player in the next generation (NextGen) network, which is characterized by ubiquity. Notwithstanding its massive potential, little research activity has been dedicated to the network layer. By contrast, we find recent research trends focusing on the physical layer, the link layer and the transport layers. The fact that the cross-layer approach is imperative, due to the resource-constrained nature of CRSNs, can make the design of unique solutions non-trivial in this respect. This paper seeks to explore possible design opportunities with wireless sensor networks (WSNs), cognitive radio ad-hoc networks (CRAHNs) and cross-layer considerations for implementing viable CRSN routing solutions. Additionally, a detailed performance evaluation of WSN routing strategies in a cognitive radio environment is performed to expose research gaps. With this work, we intend to lay a foundation for developing CRSN routing solutions and to establish a basis for future work in this area.
    Matched MeSH terms: Computer Communication Networks/instrumentation*
  17. Khan WZ, Aalsalem MY, Saad NM
    PLoS One, 2015;10(5):e0123069.
    PMID: 25992913 DOI: 10.1371/journal.pone.0123069
    Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads.
    Matched MeSH terms: Computer Communication Networks/instrumentation*
  18. Ghaleb FA, Al-Rimy BAS, Boulila W, Saeed F, Kamat M, Foad Rohani M, et al.
    Comput Intell Neurosci, 2021;2021:2977954.
    PMID: 34413885 DOI: 10.1155/2021/2977954
    Wireless mesh networks (WMNs) have emerged as a scalable, reliable, and agile wireless network that supports many types of innovative technologies such as the Internet of Things (IoT), Wireless Sensor Networks (WSN), and Internet of Vehicles (IoV). Due to the limited number of orthogonal channels, interference between channels adversely affects the fair distribution of bandwidth among mesh clients, causing node starvation in terms of insufficient bandwidth distribution, which impedes the adoption of WMN as an efficient access technology. Therefore, a fair channel assignment is crucial for the mesh clients to utilize the available resources. However, the node starvation problem due to unfair channel distribution has been vastly overlooked during channel assignment by the extant research. Instead, existing channel assignment algorithms equally distribute the interference reduction on the links to achieve fairness which neither guarantees a fair distribution of the network bandwidth nor eliminates node starvation. In addition, the metaheuristic-based solutions such as genetic algorithm, which is commonly used for WMN, use randomness in creating initial population and selecting the new generation usually leading the search to local minima. To this end, this study proposes a Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique (FA-SCGA-CAA) to solve node starvation problem in wireless mesh networks. FA-SCGA-CAA maximizes link fairness while minimizing link interference using a genetic algorithm (GA) with a novel nonlinear fairness-oriented fitness function. The primary chromosome with powerful genes is created based on multicriterion links ranking channel assignment algorithm. Such a chromosome was used with a proposed semichaotic technique to create a strong population that directs the search towards the global minima effectively and efficiently. The proposed semichaotic technique was also used during the mutation and parent selection of the new genes. Extensive experiments were conducted to evaluate the proposed algorithm. A comparison with related work shows that the proposed FA-SCGA-CAA reduced the potential node starvation by 22% and improved network capacity utilization by 23%. It can be concluded that the proposed FA-SCGA-CAA is reliable to maintain high node-level fairness while maximizing the utilization of the network resources, which is the ultimate goal of many wireless networks.
    Matched MeSH terms: Computer Communication Networks*
  19. Jabeen T, Jabeen I, Ashraf H, Ullah A, Jhanjhi NZ, Ghoniem RM, et al.
    Sensors (Basel), 2023 Jul 02;23(13).
    PMID: 37447952 DOI: 10.3390/s23136104
    Programmable Object Interfaces are increasingly intriguing researchers because of their broader applications, especially in the medical field. In a Wireless Body Area Network (WBAN), for example, patients' health can be monitored using clinical nano sensors. Exchanging such sensitive data requires a high level of security and protection against attacks. To that end, the literature is rich with security schemes that include the advanced encryption standard, secure hashing algorithm, and digital signatures that aim to secure the data exchange. However, such schemes elevate the time complexity, rendering the data transmission slower. Cognitive radio technology with a medical body area network system involves communication links between WBAN gateways, server and nano sensors, which renders the entire system vulnerable to security attacks. In this paper, a novel DNA-based encryption technique is proposed to secure medical data sharing between sensing devices and central repositories. It has less computational time throughout authentication, encryption, and decryption. Our analysis of experimental attack scenarios shows that our technique is better than its counterparts.
    Matched MeSH terms: Computer Communication Networks
  20. Shiraz M, Gani A, Ahmad RW, Adeel Ali Shah S, Karim A, Rahman ZA
    PLoS One, 2014;9(8):e102270.
    PMID: 25127245 DOI: 10.1371/journal.pone.0102270
    The latest developments in mobile computing technology have enabled intensive applications on the modern Smartphones. However, such applications are still constrained by limitations in processing potentials, storage capacity and battery lifetime of the Smart Mobile Devices (SMDs). Therefore, Mobile Cloud Computing (MCC) leverages the application processing services of computational clouds for mitigating resources limitations in SMDs. Currently, a number of computational offloading frameworks are proposed for MCC wherein the intensive components of the application are outsourced to computational clouds. Nevertheless, such frameworks focus on runtime partitioning of the application for computational offloading, which is time consuming and resources intensive. The resource constraint nature of SMDs require lightweight procedures for leveraging computational clouds. Therefore, this paper presents a lightweight framework which focuses on minimizing additional resources utilization in computational offloading for MCC. The framework employs features of centralized monitoring, high availability and on demand access services of computational clouds for computational offloading. As a result, the turnaround time and execution cost of the application are reduced. The framework is evaluated by testing prototype application in the real MCC environment. The lightweight nature of the proposed framework is validated by employing computational offloading for the proposed framework and the latest existing frameworks. Analysis shows that by employing the proposed framework for computational offloading, the size of data transmission is reduced by 91%, energy consumption cost is minimized by 81% and turnaround time of the application is decreased by 83.5% as compared to the existing offloading frameworks. Hence, the proposed framework minimizes additional resources utilization and therefore offers lightweight solution for computational offloading in MCC.
    Matched MeSH terms: Computer Communication Networks*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links