Displaying publications 1 - 20 of 89 in total

Abstract:
Sort:
  1. Ng KJ, Islam MT, Alevy AM, Mansor MF
    Sensors (Basel), 2020 Apr 26;20(9).
    PMID: 32357426 DOI: 10.3390/s20092456
    This paper presents an ultralow profile, low passive intermodulation (PIM), and super-wideband in-building ceiling mount antenna that covers both the cellular and public safety ultra high frequency (UHF) band for distributed antenna system (DAS) applications. The proposed antenna design utilizes a modified 2-D planar discone design concept that is miniaturized to fit into a small disc-shaped radome. The 2-D planar discone has an elliptical-shaped disc monopole and a bell-shaped ground plane, a stub at the shorting path, with asymmetrical structure and an additional proximity coupling patch to maximize the available electrical path to support the 350 MHz band range. The proposed design maximizes the radome area with a reduction of about 62% compared to similar concept type antennas. Besides, the proposed design exhibits an improved radiation pattern with null reduction compared to a typical dipole/monopole when lies at the horizontal plane. A prototype was manufactured to demonstrate the antenna performance. The VSWR and radiation pattern results agreed with the simulated results. The proposed antenna achieves a band ratio of 28.57:1 while covering a frequency range of 350-10,000 MHz. The measured passive intermodulation levels are better than -150 dBc (2 × 20 Watts) for 350, 700 and 1920 MHz bands.
    Matched MeSH terms: Computer Communication Networks
  2. Al-Mekhlafi ZG, Hanapi ZM, Othman M, Zukarnain ZA
    PLoS One, 2017;12(1):e0167423.
    PMID: 28056020 DOI: 10.1371/journal.pone.0167423
    Recently, Pulse Coupled Oscillator (PCO)-based travelling waves have attracted substantial attention by researchers in wireless sensor network (WSN) synchronization. Because WSNs are generally artificial occurrences that mimic natural phenomena, the PCO utilizes firefly synchronization of attracting mating partners for modelling the WSN. However, given that sensor nodes are unable to receive messages while transmitting data packets (due to deafness), the PCO model may not be efficient for sensor network modelling. To overcome this limitation, this paper proposed a new scheme called the Travelling Wave Pulse Coupled Oscillator (TWPCO). For this, the study used a self-organizing scheme for energy-efficient WSNs that adopted travelling wave biologically inspired network systems based on phase locking of the PCO model to counteract deafness. From the simulation, it was found that the proposed TWPCO scheme attained a steady state after a number of cycles. It also showed superior performance compared to other mechanisms, with a reduction in the total energy consumption of 25%. The results showed that the performance improved by 13% in terms of data gathering. Based on the results, the proposed scheme avoids the deafness that occurs in the transmit state in WSNs and increases the data collection throughout the transmission states in WSNs.
    Matched MeSH terms: Computer Communication Networks*
  3. Waheed M, Ahmad R, Ahmed W, Drieberg M, Alam MM
    Sensors (Basel), 2018 Feb 13;18(2).
    PMID: 29438278 DOI: 10.3390/s18020565
    The fabrication of lightweight, ultra-thin, low power and intelligent body-borne sensors leads to novel advances in wireless body area networks (WBANs). Depending on the placement of the nodes, it is characterized as in/on body WBAN; thus, the channel is largely affected by body posture, clothing, muscle movement, body temperature and climatic conditions. The energy resources are limited and it is not feasible to replace the sensor's battery frequently. In order to keep the sensor in working condition, the channel resources should be reserved. The lifetime of the sensor is very crucial and it highly depends on transmission among sensor nodes and energy consumption. The reliability and energy efficiency in WBAN applications play a vital role. In this paper, the analytical expressions for energy efficiency (EE) and packet error rate (PER) are formulated for two-way relay cooperative communication. The results depict better reliability and efficiency compared to direct and one-way relay communication. The effective performance range of direct vs. cooperative communication is separated by a threshold distance. Based on EE calculations, an optimal packet size is observed that provides maximum efficiency over a certain link length. A smart and energy efficient system is articulated that utilizes all three communication modes, namely direct, one-way relay and two-way relay, as the direct link performs better for a certain range, but the cooperative communication gives better results for increased distance in terms of EE. The efficacy of the proposed hybrid scheme is also demonstrated over a practical quasi-static channel. Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link.
    Matched MeSH terms: Computer Communication Networks
  4. Syed-Mohamad SM, Ali SH, Mat-Husin MN
    Health Inf Manag, 2010;39(1):30-5.
    PMID: 20335647
    This paper describes the method used to develop the One Stop Crisis Centre (OSCC) Portal, an open source web-based electronic patient record system (EPR) for the One Stop Crisis Center, Hospital Universiti Sains Malaysia (HUSM) in Kelantan, Malaysia. Features and functionalities of the system are presented to demonstrate the workflow. Use of the OSCC Portal improved data integration and data communication and contributed to improvements in care management. With implementation of the OSCC portal, improved coordination between disciplines and standardisation of data in HUSM were noticed. It is expected that this will in turn result in improved data confidentiality and data integrity. The collected data will also be useful for quality assessment and research. Other low-resource centers with limited computer hardware and access to open-source software could benefit from this endeavour.
    Matched MeSH terms: Computer Communication Networks
  5. Abidi SS, Yusoff Z
    PMID: 10724889
    The Malaysian Telemedicine initiative advocates a paradigm shift in healthcare delivery patterns by way of implementing a person-centred and wellness-focused healthcare system. This paper introduces the Malaysian Telemedicine vision, its functionality and associated operational conditions. In particular, we focus on the conceptualisation of one key Telemedicine component i.e. the Lifetime Health Plan (LHP) system--a distributed multimodule application for the periodic monitoring and generation of health-care advisories for all Malaysians. In line with the LHP project, we present an innovative healthcare delivery info-structure--LifePlan--that aims to provide life-long, pro-active, personalised, wellness-oriented healthcare services to assist individuals to manage and interpret their health needs. Functionally, LifePlan based healthcare services are delivered over the WWW, packaged as Personalised Lifetime Health Plans that allow individuals to both monitor their health status and to guide them in healthcare planning.
    Matched MeSH terms: Computer Communication Networks/trends
  6. Abidi SS, Goh A, Yusoff Z
    Stud Health Technol Inform, 1998;52 Pt 2:1282-6.
    PMID: 10384666
    The practice of medicine, with its wide range of environmental conditions and complex dependencies, has long been used as a test bed for various advanced technologies. Telemedicine, as conceptualised within the Multimedia Super Corridor (MSC) context, is seen as the application of several relatively mature technologiesartificial intelligence (AI), multimedia communication and information systems (IS) amongst othersso as to benefit a large cross-section of the Malaysian population. We will discuss in general terms the Malaysian vision on the comprehensive MSC telemedicine solution, its functionality and associated operational conditions. In particular, this paper focuses on the conceptualisation of one key telemedical component i.e. the Lifetime Health Plan (LHP) system, which is eventually intended to be a distributed multi-module application for the periodic monitoring and generation of health-care advisories for upwards of 20 million Malaysians.
    Matched MeSH terms: Computer Communication Networks
  7. Jabeen T, Jabeen I, Ashraf H, Ullah A, Jhanjhi NZ, Ghoniem RM, et al.
    Sensors (Basel), 2023 Jul 02;23(13).
    PMID: 37447952 DOI: 10.3390/s23136104
    Programmable Object Interfaces are increasingly intriguing researchers because of their broader applications, especially in the medical field. In a Wireless Body Area Network (WBAN), for example, patients' health can be monitored using clinical nano sensors. Exchanging such sensitive data requires a high level of security and protection against attacks. To that end, the literature is rich with security schemes that include the advanced encryption standard, secure hashing algorithm, and digital signatures that aim to secure the data exchange. However, such schemes elevate the time complexity, rendering the data transmission slower. Cognitive radio technology with a medical body area network system involves communication links between WBAN gateways, server and nano sensors, which renders the entire system vulnerable to security attacks. In this paper, a novel DNA-based encryption technique is proposed to secure medical data sharing between sensing devices and central repositories. It has less computational time throughout authentication, encryption, and decryption. Our analysis of experimental attack scenarios shows that our technique is better than its counterparts.
    Matched MeSH terms: Computer Communication Networks
  8. Doroodgar F, Abdur Razzaque M, Isnin IF
    Sensors (Basel), 2014;14(3):5004-40.
    PMID: 24618781 DOI: 10.3390/s140305004
    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
    Matched MeSH terms: Computer Communication Networks*
  9. Hussein AA, Leow CY, Rahman TA
    PLoS One, 2017;12(5):e0177326.
    PMID: 28493977 DOI: 10.1371/journal.pone.0177326
    Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios.
    Matched MeSH terms: Computer Communication Networks*
  10. Zubair S, Fisal N
    Sensors (Basel), 2014;14(5):8996-9026.
    PMID: 24854362 DOI: 10.3390/s140508996
    The need for implementing reliable data transfer in resource-constrained cognitive radio ad hoc networks is still an open issue in the research community. Although geographical forwarding schemes are characterized by their low overhead and efficiency in reliable data transfer in traditional wireless sensor network, this potential is still yet to be utilized for viable routing options in resource-constrained cognitive radio ad hoc networks in the presence of lossy links. In this paper, a novel geographical forwarding technique that does not restrict the choice of the next hop to the nodes in the selected route is presented. This is achieved by the creation of virtual clusters based on spectrum correlation from which the next hop choice is made based on link quality. The design maximizes the use of idle listening and receiver contention prioritization for energy efficiency, the avoidance of routing hot spots and stability. The validation result, which closely follows the simulation result, shows that the developed scheme can make more advancement to the sink as against the usual decisions of relevant ad hoc on-demand distance vector route select operations, while ensuring channel quality. Further simulation results have shown the enhanced reliability, lower latency and energy efficiency of the presented scheme.
    Matched MeSH terms: Computer Communication Networks
  11. Al-Rawi HA, Yau KL, Mohamad H, Ramli N, Hashim W
    ScientificWorldJournal, 2014;2014:960584.
    PMID: 25140350 DOI: 10.1155/2014/960584
    Cognitive radio (CR) enables unlicensed users (or secondary users, SUs) to sense for and exploit underutilized licensed spectrum owned by the licensed users (or primary users, PUs). Reinforcement learning (RL) is an artificial intelligence approach that enables a node to observe, learn, and make appropriate decisions on action selection in order to maximize network performance. Routing enables a source node to search for a least-cost route to its destination node. While there have been increasing efforts to enhance the traditional RL approach for routing in wireless networks, this research area remains largely unexplored in the domain of routing in CR networks. This paper applies RL in routing and investigates the effects of various features of RL (i.e., reward function, exploitation, and exploration, as well as learning rate) through simulation. New approaches and recommendations are proposed to enhance the features in order to improve the network performance brought about by RL to routing. Simulation results show that the RL parameters of the reward function, exploitation, and exploration, as well as learning rate, must be well regulated, and the new approaches proposed in this paper improves SUs' network performance without significantly jeopardizing PUs' network performance, specifically SUs' interference to PUs.
    Matched MeSH terms: Computer Communication Networks*
  12. Al-Nahari A, Mohamad MM
    PLoS One, 2016;11(6):e0156670.
    PMID: 27258013 DOI: 10.1371/journal.pone.0156670
    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.
    Matched MeSH terms: Computer Communication Networks*
  13. Mamman M, Hanapi ZM, Abdullah A, Muhammed A
    PLoS One, 2019;14(1):e0210310.
    PMID: 30682038 DOI: 10.1371/journal.pone.0210310
    The increasing demand for network applications, such as teleconferencing, multimedia messaging and mobile TV, which have diverse requirements, has resulted in the introduction of Long Term Evolution (LTE) by the Third Generation Partnership Project (3GPP). LTE networks implement resource allocation algorithms to distribute radio resource to satisfy the bandwidth and delay requirements of users. However, the scheduling algorithm problem of distributing radio resources to users is not well defined in the LTE standard and thus considerably affects transmission order. Furthermore, the existing radio resource algorithm suffers from performance degradation under prioritised conditions because of the minimum data rate used to determine the transmission order. In this work, a novel downlink resource allocation algorithm that uses quality of service (QoS) requirements and channel conditions to address performance degradation is proposed. The new algorithm is formulated as an optimisation problem where network resources are allocated according to users' priority, whereas the scheduling algorithm decides on the basis of users' channel status to satisfy the demands of QoS. Simulation is used to evaluate the performance of the proposed algorithm, and results demonstrate that it performs better than do all other algorithms according to the measured metrics.
    Matched MeSH terms: Computer Communication Networks
  14. Razzaque MA, Javadi SS, Coulibaly Y, Hira MT
    Sensors (Basel), 2014 Dec 29;15(1):440-64.
    PMID: 25551485 DOI: 10.3390/s150100440
    Wireless body sensor networks (WBSNs) for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Considering the criticality of healthcare and medical applications, WBSNs need to fulfill users/applications and the corresponding network's QoS requirements. For instance, for a real-time application to support on-time data delivery, a WBSN needs to guarantee a constrained delay at the network level. A network coding-based error recovery mechanism is an emerging mechanism that can be used in these systems to support QoS at very low energy, memory and hardware cost. However, in dynamic network environments and user requirements, the original non-adaptive version of network coding fails to support some of the network and user QoS requirements. This work explores the QoS requirements of WBSNs in both perspectives of QoS. Based on these requirements, this paper proposes an adaptive network coding-based, QoS-aware error recovery mechanism for WBSNs. It utilizes network-level and user-/application-level information to make it adaptive in both contexts. Thus, it provides improved QoS support adaptively in terms of reliability, energy efficiency and delay. Simulation results show the potential of the proposed mechanism in terms of adaptability, reliability, real-time data delivery and network lifetime compared to its counterparts.
    Matched MeSH terms: Computer Communication Networks*
  15. Ag Z, Cheong SK
    Malays J Pathol, 1995 Dec;17(2):77-81.
    PMID: 8935130
    A system for computerising full blood picture reporting developed in-house using dBASE IV on IBM-compatible microcomputers in a local area network environment is described. The software package has a user-friendly interface which consists of a horizontal main menu bar with associated pull-down submenus. The package captures data directly from an automatic blood cell counter and provides options to modify or delete records, search for records, print interim, final or cumulative reports, record differential counts with an emulator, facilitate house-keeping activities which include backing-up databases and repairing corrupted indices. The implementation of this system has helped to improve the efficiency of reporting full blood picture in the haematology laboratory.
    Matched MeSH terms: Computer Communication Networks*
  16. Al-Medhwahi M, Hashim F, Ali BM, Sali A
    PLoS One, 2016;11(6):e0156880.
    PMID: 27257964 DOI: 10.1371/journal.pone.0156880
    The rapid expansion of wireless monitoring and surveillance applications in several domains reinforces the trend of exploiting emerging technologies such as the cognitive radio. However, these technologies have to adjust their working concepts to consider the common characteristics of conventional wireless sensor networks (WSNs). The cognitive radio sensor network (CRSN), still an immature technology, has to deal with new networks that might have different types of data, traffic patterns, or quality of service (QoS) requirements. In this paper, we design and model a new cognitive radio-based medium access control (MAC) algorithm dealing with the heterogeneous nature of the developed networks in terms of either the traffic pattern or the required QoS for the node applications. The proposed algorithm decreases the consumed power on several fronts, provides satisfactory levels of latency and spectrum utilization with efficient scheduling, and manages the radio resources for various traffic conditions. An intensive performance evaluation is conducted to study the impact of key parameters such as the channel idle time length, node density, and the number of available channels. The performance evaluation of the proposed algorithm shows a better performance than the comparable protocols. Moreover, the results manifest that the proposed algorithm is suitable for real time monitoring applications.
    Matched MeSH terms: Computer Communication Networks*
  17. Kaiwartya O, Kumar S, Lobiyal DK, Abdullah AH, Hassan AN
    Sensors (Basel), 2014;14(12):22342-71.
    PMID: 25429415 DOI: 10.3390/s141222342
    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.
    Matched MeSH terms: Computer Communication Networks
  18. Marzo RR, Ahmad A, Islam MS, Essar MY, Heidler P, King I, et al.
    PLoS Negl Trop Dis, 2022 01;16(1):e0010103.
    PMID: 35089917 DOI: 10.1371/journal.pntd.0010103
    BACKGROUND: Mass vaccination campaigns have significantly reduced the COVID-19 burden. However, vaccine hesitancy has posed significant global concerns. The purpose of this study was to determine the characteristics that influence perceptions of COVID-19 vaccine efficacy, acceptability, hesitancy and decision making to take vaccine among general adult populations in a variety of socioeconomic and cultural contexts.

    METHODS: Using a snowball sampling approach, we conducted an online cross-sectional study in 20 countries across four continents from February to May 2021.

    RESULTS: A total of 10,477 participants were included in the analyses with a mean age of 36±14.3 years. The findings revealed the prevalence of perceptions towards COVID-19 vaccine's effectiveness (78.8%), acceptance (81.8%), hesitancy (47.2%), and drivers of vaccination decision-making (convenience [73.3%], health providers' advice [81.8%], and costs [57.0%]). The county-wise distribution included effectiveness (67.8-95.9%; 67.8% in Egypt to 95.9% in Malaysia), acceptance (64.7-96.0%; 64.7% in Australia to 96.0% in Malaysia), hesitancy (31.5-86.0%; 31.5% in Egypt to 86.0% in Vietnam), convenience (49.7-95.7%; 49.7% in Austria to 95.7% in Malaysia), advice (66.1-97.3%; 66.1% in Austria to 97.3% in Malaysia), and costs (16.0-91.3%; 16.0% in Vietnam to 91.3% in Malaysia). In multivariable regression analysis, several socio-demographic characteristics were identified as associated factors of outcome variables including, i) vaccine effectiveness: younger age, male, urban residence, higher education, and higher income; ii) acceptance: younger age, male, urban residence, higher education, married, and higher income; and iii) hesitancy: male, higher education, employed, unmarried, and lower income. Likewise, the factors associated with vaccination decision-making including i) convenience: younger age, urban residence, higher education, married, and lower income; ii) advice: younger age, urban residence, higher education, unemployed/student, married, and medium income; and iii) costs: younger age, higher education, unemployed/student, and lower income.

    CONCLUSIONS: Most participants believed that vaccination would effectively control and prevent COVID-19, and they would take vaccinations upon availability. Determinant factors found in this study are critical and should be considered as essential elements in developing COVID-19 vaccination campaigns to boost vaccination uptake in the populations.

    Matched MeSH terms: Computer Communication Networks
  19. Shabbir A, Rizvi S, Alam MM, Shirazi F, Su'ud MM
    PLoS One, 2024;19(2):e0296392.
    PMID: 38408070 DOI: 10.1371/journal.pone.0296392
    The quest for energy efficiency (EE) in multi-tier Heterogeneous Networks (HetNets) is observed within the context of surging high-speed data demands and the rapid proliferation of wireless devices. The analysis of existing literature underscores the need for more comprehensive strategies to realize genuinely energy-efficient HetNets. This research work contributes significantly by employing a systematic methodology, utilizing This model facilitates the assessment of network performance by considering the spatial distribution of network elements. The stochastic nature of the PPP allows for a realistic representation of the random spatial deployment of base stations and users in multi-tier HetNets. Additionally, an analytical framework for Quality of Service (QoS) provision based on D-DOSS simplifies the understanding of user-base station relationships and offers essential performance metrics. Moreover, an optimization problem formulation, considering coverage, energy maximization, and delay minimization constraints, aims to strike a balance between key network attributes. This research not only addresses crucial challenges in creating EE HetNets but also lays a foundation for future advancements in wireless network design, operation, and management, ultimately benefiting network operators and end-users alike amidst the growing demand for high-speed data and the increasing prevalence of wireless devices. The proposed D-DOSS approach not only offers insights for the systematic design and analysis of EE HetNets but also systematically outperforms other state-of-the-art techniques presented. The improvement in energy efficiency systematically ranges from 67% (min side) to 98% (max side), systematically demonstrating the effectiveness of the proposed strategy in achieving higher energy efficiency compared to existing strategies. This systematic research work establishes a strong foundation for the systematic evolution of energy-efficient HetNets. The systematic methodology employed ensures a comprehensive understanding of the complex interplay of network dynamics and user requirements in a multi-tiered environment.
    Matched MeSH terms: Computer Communication Networks*
  20. Onwuegbuzie IU, Abd Razak S, Fauzi Isnin I, Darwish TSJ, Al-Dhaqm A
    PLoS One, 2020;15(8):e0237154.
    PMID: 32797055 DOI: 10.1371/journal.pone.0237154
    Data prioritization of heterogeneous data in wireless sensor networks gives meaning to mission-critical data that are time-sensitive as this may be a matter of life and death. However, the standard IEEE 802.15.4 does not consider the prioritization of data. Prioritization schemes proffered in the literature have not adequately addressed this issue as proposed schemes either uses a single or complex backoff algorithm to estimate backoff time-slots for prioritized data. Subsequently, the carrier sense multiple access with collision avoidance scheme exhibits an exponentially increasing range of backoff times. These approaches are not only inefficient but result in high latency and increased power consumption. In this article, the concept of class of service (CS) was adopted to prioritize heterogeneous data (real-time and non-real-time), resulting in an optimized prioritized backoff MAC scheme called Class of Service Traffic Priority-based Medium Access Control (CSTP-MAC). This scheme classifies data into high priority data (HPD) and low priority data (LPD) by computing backoff times with expressions peculiar to the data priority class. The improved scheme grants nodes the opportunity to access the shared medium in a timely and power-efficient manner. Benchmarked against contemporary schemes, CSTP-MAC attained a 99% packet delivery ratio with improved power saving capability, which translates to a longer operational lifetime.
    Matched MeSH terms: Computer Communication Networks*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links