Displaying publications 41 - 60 of 89 in total

Abstract:
Sort:
  1. Mustaffa Samad
    Scientific Research Journal, 2006;3(1):27-36.
    MyJurnal
    The Internet has been an integral part of the Information and Communication
    Technology (ICT) community in recent years. New internet users have been
    growing steadily over the years. This has lead to the depletion of new Internet
    Protocol (IP) addresses worldwide. To overcome this predicament, the new
    Internet Protocol version 6 (IPv6) had been introduced. The existing Internet
    Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6.
    The changeover from IPv4 to IPv6 is expected to be implemented progressively.
    During this transition period, these two protocols are expected to coexist for
    a number of years. IPv4-to-IPv6 transition tools have been designed to facilitate
    a smooth transition from IPv4 to IPv6. The two most basic IPv4-to-IPv6
    transition tools available are the hybrid stack mechanism and tunneling.
    Tunneling is the encapsulation of IPv6 traffic within IPv4 packets so they can
    be sent over an IPv4 infrastructure. This project was initiated to set up an
    experimental IPv6 testbed, in order to study the performance as well as
    transition and migration issues of IPv6 networks under controlled conditions.
    This paper looks at how tunneling can be performed over existing internetwork
    infrastructure at Fakulti Kejuruteraan Elektrik (FKE), UiTM.
    Matched MeSH terms: Computer Communication Networks
  2. Mohammed S, Orabi A, Fiaidhi J, Orabi M, R. Benlamri
    Int J Electron Healthc, 2008;4(1):24-42.
    PMID: 18583294
    Web 2.0 technologies such as wikis, podcasts/vodcasting, blogs and semantic portals could be quite effective tools in e-learning for health professionals. If effectively deployed, such tools can offer a way to enhance students', clinicians' and patients' learning experiences, and deepens levels of learners' engagement and collaboration within medical learning environments. However, Web 2.0 requires simplicity of use as well as integration with modern web technologies. This article presents a Web 2.0 telemedical portal, which provides a social community-learning paradigm from the desk of the physician, the student, the hospital administrator, or the insurer. The presented portal utilises RESTful web services and techniques like content syndication, mushups and Asynchronous JavaScript API and XML (AJAX). The designed portal is based on the Apache Cocoon RESTful framework for sharing Digital Imaging and Communications in Medicine (DICOM) medical case studies. Central to this article is the integration between Cocoon and AJAX. The proposed AJAX-Cocoon portal utilises a JSP portlet architecture, which manages the interaction dynamics and overcomes the shortcomings of the JSR 168 and WSRP 1.0 standards.
    Matched MeSH terms: Computer Communication Networks/organization & administration
  3. Dzulkifli AR, Aishah AL, Ch'ng HS, Rose A, Rahmat A, Isa AM, et al.
    J Audiov Media Med, 1994 Jul;17(3):117-20.
    PMID: 7636117
    A number of health databases is now available in Malaysia, but few are accessible to the general public. However, recently a service was launched nationwide via a videotex system to also target the Malaysia public. This service is provided by the School of Pharmaceutical Sciences, Universiti Sains Malaysia (USM) in collaboration with several Malaysian Government ministries and agencies. Access to health information via videotex, be it medical, pharmaceutical or environmental is viewed as an effective means of on-line information dissemination. It provides not only rapid retrieval but is also economical and interactive, particularly suitable for a developing country.
    Matched MeSH terms: Computer Communication Networks/organization & administration*
  4. Khan WZ, Aalsalem MY, Saad NM
    PLoS One, 2015;10(5):e0123069.
    PMID: 25992913 DOI: 10.1371/journal.pone.0123069
    Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads.
    Matched MeSH terms: Computer Communication Networks/instrumentation*
  5. Abdelaziz A, Fong AT, Gani A, Garba U, Khan S, Akhunzada A, et al.
    PLoS One, 2017;12(4):e0174715.
    PMID: 28384312 DOI: 10.1371/journal.pone.0174715
    Software Defined Networking (SDN) is an emerging promising paradigm for network management because of its centralized network intelligence. However, the centralized control architecture of the software-defined networks (SDNs) brings novel challenges of reliability, scalability, fault tolerance and interoperability. In this paper, we proposed a novel clustered distributed controller architecture in the real setting of SDNs. The distributed cluster implementation comprises of multiple popular SDN controllers. The proposed mechanism is evaluated using a real world network topology running on top of an emulated SDN environment. The result shows that the proposed distributed controller clustering mechanism is able to significantly reduce the average latency from 8.1% to 1.6%, the packet loss from 5.22% to 4.15%, compared to distributed controller without clustering running on HP Virtual Application Network (VAN) SDN and Open Network Operating System (ONOS) controllers respectively. Moreover, proposed method also shows reasonable CPU utilization results. Furthermore, the proposed mechanism makes possible to handle unexpected load fluctuations while maintaining a continuous network operation, even when there is a controller failure. The paper is a potential contribution stepping towards addressing the issues of reliability, scalability, fault tolerance, and inter-operability.
    Matched MeSH terms: Computer Communication Networks*
  6. Jawad HM, Nordin R, Gharghan SK, Jawad AM, Ismail M
    Sensors (Basel), 2017 Aug 03;17(8).
    PMID: 28771214 DOI: 10.3390/s17081781
    Wireless sensor networks (WSNs) can be used in agriculture to provide farmers with a large amount of information. Precision agriculture (PA) is a management strategy that employs information technology to improve quality and production. Utilizing wireless sensor technologies and management tools can lead to a highly effective, green agriculture. Based on PA management, the same routine to a crop regardless of site environments can be avoided. From several perspectives, field management can improve PA, including the provision of adequate nutrients for crops and the wastage of pesticides for the effective control of weeds, pests, and diseases. This review outlines the recent applications of WSNs in agriculture research as well as classifies and compares various wireless communication protocols, the taxonomy of energy-efficient and energy harvesting techniques for WSNs that can be used in agricultural monitoring systems, and comparison between early research works on agriculture-based WSNs. The challenges and limitations of WSNs in the agricultural domain are explored, and several power reduction and agricultural management techniques for long-term monitoring are highlighted. These approaches may also increase the number of opportunities for processing Internet of Things (IoT) data.
    Matched MeSH terms: Computer Communication Networks
  7. Yap KL, Chong YW, Liu W
    PLoS One, 2020;15(1):e0227982.
    PMID: 31978101 DOI: 10.1371/journal.pone.0227982
    The rapid increase in the usage of the mobile internet has led to a great expansion of cellular data networks in order to provide better quality of service. However, the cost to expand the cellular network is high. One of the solutions to provide affordable wireless connectivity is the deployment of a WiFi access point to offload users' data usage. Nevertheless, the frequent and inefficient handover process between the WiFi AP and cellular network, especially when the mobile device is on the go, may degrade the network performance. Mobile devices do not have the intelligence to select the optimal network to enhance the quality of service (QoS). This paper presents an enhanced handover mechanism using mobility prediction (eHMP) to assist mobile devices in the handover process so that users can experience seamless connectivity. eHMP is tested in two wireless architectures, homogeneous and heterogeneous networks. The network performance significantly improved when eHMP is used in a homogeneous network, where the network throughput increases by 106% and the rate of retransmission decreases by 85%. When eHMP is used in a heterogeneous network, the network throughput increases by 55% and the retransmission rate decreases by 75%. The findings presented in this paper reveal that mobility prediction coupled with the multipath protocol can improve the QoS for mobile devices. These results will contribute to a better understanding of how the network service provider can offload traffic to the WiFi network without experiencing performance degradation.
    Matched MeSH terms: Computer Communication Networks*
  8. Bello Tambawal A, Md Noor R, Salleh R, Chembe C, Oche M
    PLoS One, 2019;14(4):e0214664.
    PMID: 30946766 DOI: 10.1371/journal.pone.0214664
    A vehicular ad hoc network (VANET) is an emerging and promising wireless technology aimed to improve traffic safety and provide comfort to road users. However, the high mobility of vehicles and frequent topology changes pose a considerable challenge to the reliable delivery of safety applications. Clustering is one of the control techniques used in VANET to make the frequent topology changes less dynamic. Nevertheless, research has shown that most of the existing clustering algorithms focus on cluster head (CH) election with very few addressing other critical issues such as cluster formation and maintenance. This has led to unstable clusters which could affect the timely delivery of safety applications. In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. We considered any vehicle moving on the same road segment with the same road ID and within the transmission range of its neighbour to be suitable for the cluster formation process. This was attributed to the fact that all safety messages are expected to be shared among the vehicles within the vicinity irrespective of their relative speedto avoid any hazardous situation. To elect a CH, we identified some metrics on the basis of the vehicle mobility information. Each vehicle was associated with a predefined weight value based on its relevance. A vehicle with the highest weight value was elected as the primary cluster head (PCH). We also introduced a secondary cluster head (SeCH) as a backup to the PCH to improve the cluster stability. SeCH took over the leadership whenever the PCH was not suitable for continuing with the leadership. The simulation results of the proposed approach showed a better performance with an increase of approximately40%- 45% in the cluster stability when compared with the existing approaches. Similarly, cluster formation messages were significantly minimized, hence reducing the communication overhead to the system and improving the reliable delivery of the safety applications.
    Matched MeSH terms: Computer Communication Networks
  9. Papakostopoulos D, Williams A, Ramani V, Hart CJ, Dodson K, Papakostopoulos S
    J Telemed Telecare, 1999;5 Suppl 1:S17-20.
    PMID: 10534828
    The First International Teleconference in Ophthalmology was held during March 1998 between five sites in the UK, USA, Greece and Malaysia. ISDN transmission at 128 kbit/s was used to reduce costs while maintaining the clarity of the presented material. Specialized lecture theatres were not available at all sites and conventional halls had to be adapted for videoconferencing. For this reason initial point-to-point testing was carried with Bristol to simplify problem solving. Thereafter, a multipoint bridge was used to connect all sites together. During the conference a number of individual presentations were given, all followed by extensive discussion periods. Special instructions were given beforehand on the production of slide material, with particular reference to font sizes and colour combinations. Full use was made of various presentation media, including slides, videos and live demonstrations. The conference was attended by over 500 delegates, all of whom were specialists in ophthalmology. The technology employed was ideal for teaching purposes. However, if used in a clinical field, it should be kept in mind that the choice of transmission rate makes certain features not easily apparent in images but they become clearer when pointed out by the presenter.
    Matched MeSH terms: Computer Communication Networks
  10. Butt SA, Bakar KA, Javaid N, Gharaei N, Ishmanov F, Afzal MK, et al.
    Sensors (Basel), 2019 Jan 26;19(3).
    PMID: 30691141 DOI: 10.3390/s19030510
    The key concerns to enhance the lifetime of IoT-enabled Underwater Wireless Sensor Networks (IoT-UWSNs) are energy-efficiency and reliable data delivery under constrained resource. Traditional transmission approaches increase the communication overhead, which results in congestion and affect the reliable data delivery. Currently, many routing protocols have been proposed for UWSNs to ensure reliable data delivery and to conserve the node's battery with minimum communication overhead (by avoiding void holes in the network). In this paper, adaptive energy-efficient routing protocols are proposed to tackle the aforementioned problems using the Shortest Path First (SPF) with least number of active nodes strategy. These novel protocols have been developed by integrating the prominent features of Forward Layered Multi-path Power Control One (FLMPC-One) routing protocol, which uses 2-hop neighbor information, Forward Layered Multi-path Power Control Two (FLMPC-Two) routing protocol, which uses 3-hop neighbor information and 'Dijkstra' algorithm (for shortest path selection). Different Packet Sizes (PSs) with different Data Rates (DRs) are also taken into consideration to check the dynamicity of the proposed protocols. The achieved outcomes clearly validate the proposed protocols, namely: Shortest Path First using 3-hop neighbors information (SPF-Three) and Breadth First Search with Shortest Path First using 3-hop neighbors information (BFS-SPF-Three). Simulation results show the effectiveness of the proposed protocols in terms of minimum Energy Consumption (EC) and Required Packet Error Rate (RPER) with a minimum number of active nodes at the cost of affordable delay.
    Matched MeSH terms: Computer Communication Networks
  11. Ghaleb FA, Al-Rimy BAS, Boulila W, Saeed F, Kamat M, Foad Rohani M, et al.
    Comput Intell Neurosci, 2021;2021:2977954.
    PMID: 34413885 DOI: 10.1155/2021/2977954
    Wireless mesh networks (WMNs) have emerged as a scalable, reliable, and agile wireless network that supports many types of innovative technologies such as the Internet of Things (IoT), Wireless Sensor Networks (WSN), and Internet of Vehicles (IoV). Due to the limited number of orthogonal channels, interference between channels adversely affects the fair distribution of bandwidth among mesh clients, causing node starvation in terms of insufficient bandwidth distribution, which impedes the adoption of WMN as an efficient access technology. Therefore, a fair channel assignment is crucial for the mesh clients to utilize the available resources. However, the node starvation problem due to unfair channel distribution has been vastly overlooked during channel assignment by the extant research. Instead, existing channel assignment algorithms equally distribute the interference reduction on the links to achieve fairness which neither guarantees a fair distribution of the network bandwidth nor eliminates node starvation. In addition, the metaheuristic-based solutions such as genetic algorithm, which is commonly used for WMN, use randomness in creating initial population and selecting the new generation usually leading the search to local minima. To this end, this study proposes a Fairness-Oriented Semichaotic Genetic Algorithm-Based Channel Assignment Technique (FA-SCGA-CAA) to solve node starvation problem in wireless mesh networks. FA-SCGA-CAA maximizes link fairness while minimizing link interference using a genetic algorithm (GA) with a novel nonlinear fairness-oriented fitness function. The primary chromosome with powerful genes is created based on multicriterion links ranking channel assignment algorithm. Such a chromosome was used with a proposed semichaotic technique to create a strong population that directs the search towards the global minima effectively and efficiently. The proposed semichaotic technique was also used during the mutation and parent selection of the new genes. Extensive experiments were conducted to evaluate the proposed algorithm. A comparison with related work shows that the proposed FA-SCGA-CAA reduced the potential node starvation by 22% and improved network capacity utilization by 23%. It can be concluded that the proposed FA-SCGA-CAA is reliable to maintain high node-level fairness while maximizing the utilization of the network resources, which is the ultimate goal of many wireless networks.
    Matched MeSH terms: Computer Communication Networks*
  12. Umar IA, Mohd Hanapi Z, Sali A, Zulkarnain ZA
    Sensors (Basel), 2016 Jun 22;16(6).
    PMID: 27338411 DOI: 10.3390/s16060943
    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.
    Matched MeSH terms: Computer Communication Networks
  13. Sookhak M, Akhundzada A, Sookhak A, Eslaminejad M, Gani A, Khurram Khan M, et al.
    PLoS One, 2015;10(1):e0115324.
    PMID: 25602616 DOI: 10.1371/journal.pone.0115324
    Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols.
    Matched MeSH terms: Computer Communication Networks*
  14. Khasawneh AM, Kaiwartya O, Lloret J, Abuaddous HY, Abualigah L, Shinwan MA, et al.
    Sensors (Basel), 2020 Dec 18;20(24).
    PMID: 33353003 DOI: 10.3390/s20247278
    In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. Moreover, TM2RP is the first multi-layered and multi-metric pressure routing protocol that considers link quality with residual energy to improve the selection of next forwarding nodes with more reliable and energy-efficient links. The aqua-sim package based on the ns-2 simulator was used to evaluate the performance of the proposed TM2RP. The obtained results were compared to other similar methods such as depth based routing (DBR) and multi-layered routing protocol (MRP). Simulation results showed that the proposed protocol (TM2RP) obtained better outcomes in terms of energy consumption, network lifetime, packet delivery ratio, and end-to-end delay.
    Matched MeSH terms: Computer Communication Networks
  15. Saad WK, Shayea I, Hamza BJ, Mohamad H, Daradkeh YI, Jabbar WA
    Sensors (Basel), 2021 Jul 31;21(15).
    PMID: 34372437 DOI: 10.3390/s21155202
    The massive growth of mobile users will spread to significant numbers of small cells for the Fifth Generation (5G) mobile network, which will overlap the fourth generation (4G) network. A tremendous increase in handover (HO) scenarios and HO rates will occur. Ensuring stable and reliable connection through the mobility of user equipment (UE) will become a major problem in future mobile networks. This problem will be magnified with the use of suboptimal handover control parameter (HCP) settings, which can be configured manually or automatically. Therefore, the aim of this study is to investigate the impact of different HCP settings on the performance of 5G network. Several system scenarios are proposed and investigated based on different HCP settings and mobile speed scenarios. The different mobile speeds are expected to demonstrate the influence of many proposed system scenarios on 5G network execution. We conducted simulations utilizing MATLAB software and its related tools. Evaluation comparisons were performed in terms of handover probability (HOP), ping-pong handover probability (PPHP) and outage probability (OP). The 5G network framework has been employed to evaluate the proposed system scenarios used. The simulation results reveal that there is a trade-off in the results obtained from various systems. The use of lower HCP settings provides noticeable enhancements compared to higher HCP settings in terms of OP. Simultaneously, the use of lower HCP settings provides noticeable drawbacks compared to higher HCP settings in terms of high PPHP for all scenarios of mobile speed. The simulation results show that medium HCP settings may be the acceptable solution if one of these systems is applied. This study emphasises the application of automatic self-optimisation (ASO) functions as the best solution that considers user experience.
    Matched MeSH terms: Computer Communication Networks*
  16. Shaukat HR, Hashim F, Shaukat MA, Ali Alezabi K
    Sensors (Basel), 2020 Apr 17;20(8).
    PMID: 32316487 DOI: 10.3390/s20082283
    Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes' important credentials and subsequently replicate the nodes, which may expose the network to a number of other security attacks, and eventually compromise the entire network. This harmful attack where a single or more nodes illegitimately claims an identity as replicas is known as the node replication attack. The problem of node replication attack can be further aggravated due to the mobile nature in WSN. In this paper, we propose an extended version of multi-level replica detection technique built on Danger Theory (DT), which utilizes a hybrid approach (centralized and distributed) to shield the mobile wireless sensor networks (MWSNs) from clone attacks. The danger theory concept depends on a multi-level of detections; first stage (highlights the danger zone (DZ) by checking the abnormal behavior of mobile nodes), second stage (battery check and random number) and third stage (inform about replica to other networks). The DT method performance is highlighted through security parameters such as false negative, energy, detection time, communication overhead and delay in detection. The proposed approach also demonstrates that the hybrid DT method is capable and successful in detecting and mitigating any malicious activities initiated by the replica. Nowadays, crimes are vastly increasing and it is crucial to modify the systems accordingly. Indeed, it is understood that the communication needs to be secured by keen observation at each level of detection. The simulation results show that the proposed approach overcomes the weaknesses of the previous and existing centralized and distributed approaches and enhances the performance of MWSN in terms of communication and memory overhead.
    Matched MeSH terms: Computer Communication Networks
  17. Yee PL, Mehmood S, Almogren A, Ali I, Anisi MH
    PeerJ Comput Sci, 2020;6:e326.
    PMID: 33816976 DOI: 10.7717/peerj-cs.326
    Opportunistic routing is an emerging routing technology that was proposed to overcome the drawback of unreliable transmission, especially in Wireless Sensor Networks (WSNs). Over the years, many forwarder methods were proposed to improve the performance in opportunistic routing. However, based on existing works, the findings have shown that there is still room for improvement in this domain, especially in the aspects of latency, network lifetime, and packet delivery ratio. In this work, a new relay node selection method was proposed. The proposed method used the minimum or maximum range and optimum energy level to select the best relay node to forward packets to improve the performance in opportunistic routing. OMNeT++ and MiXiM framework were used to simulate and evaluate the proposed method. The simulation settings were adopted based on the benchmark scheme. The evaluation results showed that our proposed method outperforms in the aspect of latency, network lifetime, and packet delivery ratio as compared to the benchmark scheme.
    Matched MeSH terms: Computer Communication Networks
  18. Harum H
    PMID: 15747966
    The Integrated Telehealth Project of Malaysia is considered a principal enabler for the nation's Vision 2020 as well as the National Health Vision. Being in such an unenviable position, of being not only the pioneer for such an integrated project, but also with no benchmark to compare with, the project implementers have faced manifold challenges along the way. This chapter deals with some of the challenges and lessons learnt that have accumulated as the project progressed.
    Matched MeSH terms: Computer Communication Networks
  19. Jan S, Yafi E, Hafeez A, Khatana HW, Hussain S, Akhtar R, et al.
    Sensors (Basel), 2021 Apr 25;21(9).
    PMID: 33922886 DOI: 10.3390/s21093000
    A significant increase has been observed in the use of Underwater Wireless Sensor Networks (UWSNs) over the last few decades. However, there exist several associated challenges with UWSNs, mainly due to the nodes' mobility, increased propagation delay, limited bandwidth, packet duplication, void holes, and Doppler/multi-path effects. To address these challenges, we propose a protocol named "An Efficient Routing Protocol based on Master-Slave Architecture for Underwater Wireless Sensor Network (ERPMSA-UWSN)" that significantly contributes to optimizing energy consumption and data packet's long-term survival. We adopt an innovative approach based on the master-slave architecture, which results in limiting the forwarders of the data packet by restricting the transmission through master nodes only. In this protocol, we suppress nodes from data packet reception except the master nodes. We perform extensive simulation and demonstrate that our proposed protocol is delay-tolerant and energy-efficient. We achieve an improvement of 13% on energy tax and 4.8% on Packet Delivery Ratio (PDR), over the state-of-the-art protocol.
    Matched MeSH terms: Computer Communication Networks
  20. Goh A
    PMID: 10724956
    In this paper, we present a Java-based framework for the processing, storage and delivery of Electronic Medical Records (EMR). The choice of Java as a developmental and operational environment ensures operability over a wide-range of client-side platforms, with our on-going work emphasising migration towards Extensible Markup Language (XML) capable Web browser clients. Telemedicine in support of womb-to-tomb healthcare as articulated by the Multimedia Supercorridor (MSC) Telemedicine initiative--which motivated this project--will require high-volume data exchange over an insecure public-access Wide Area Network (WAN), thereby requiring a hybrid cryptosystem with both symmetric and asymmetric components. Our prototype framework features a pre-transaction authentication and key negotiation sequence which can be readily modified for client-side environments ranging from Web browsers without local storage capability to workstations with serial connectivity to a tamper-proof device, and also for point-to-multipoint transaction processes.
    Matched MeSH terms: Computer Communication Networks*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links