Version-1 (March-April 2015)
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sensor Networks |
| Country | : | India |
| Authors | : | Kumaraswamy M || Shaila K || Tejaswi V || Venugopal K R || S S Iyengar || L M Patnaik |
Abstract: In this paper, we propose a Multihop Multi-Channel Distributed QoS Scheduling MAC scheme (MMDQS-MAC) to improve the network performance of WSNs, which selects the best channel for an individual wireless sensor node. MMDQS-MAC supports dynamic channel assignment mechanism where each sensor node is equipped with a directional antennas. The proposed protocol helps to decrease the probability of collision, interferences and improves the overall network performance of Wireless Sensor Networks (WSNs). The protocol is most suitable for short packet transmission under low traffic networks and has ability to utilize parallel transmission among neighboring nodes and achieves increased energy efficiency when multi-channels are available. Simulation result shows that the proposed protocol improves the performance of aggregate throughput, probability of successful transmission, packet delivery ratio, energy consumption and average end-to-end delay.
Keywords: Medium Access Control (MAC); Quality of Service (QoS); Wireless Sensor Networks (WSNs); Multi-Channel (MC)
[1]. Stallings and William, "Wireless Communications and Networks," Second Edition New Jersey, Pearson Education International,
2005.
[2]. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks," In IEEE Communicatio n
Magazine, vol. 40, no. 8, pp. 102–114, August 2002.
[3]. D. Cruller, D. Estrin and M. Srivastava, "Overview of Sensor Networks," In IEEE Computer, vol. 37, no. 8, pp. 41 –49, August
2004.
[4]. W. Ye, J. Heidemann and D. Estrin, "An Energy-Efficient MAC Protocol for Wireless Sensor Networks," In proceedings of 21st
IEEE INFOCOM, New York, pp. 1567–1576, June 2002.
[5]. F. Cuomo, A. Baiocchi and R. Cautelier, "A MAC Protocol for a Wireless LAN based on OFDM-CDMA," In IEEE
Communications Magazine, vol. 38, no. 9, pp. 152–159, September 2000.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | DSNs & X.400 assist in ensuring email reliability |
| Country | : | Iraq |
| Authors | : | Bassam Talib Sabri |
Abstract: While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of e- mail, which passes responsibility for delivering email from one mail server to another, but in doing so exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to email unreliability than others, and seek tools with which they can detect and recover from email failures. This paper describes tools that allow email sending software to automatically respond to reports of undeliverability by persisting with retransmission or retransmitting to alternate recipients.
[1]. P. Lyman and H. Varian: "How Much Information", http://www.sims.berkeley.edu/how-much-info-2003
[2]. T. Moors: "Email reliability", http://uluru.ee.unsw.edu.au/~tim/dependable/email/
[3]. M. Afergan and R. Beverly: "The state of the email address", Computer Communication Review, 35(1):29- 35, Jan. 2005
[4]. S. Garriss, M. Kaminsky, M. Freedman, B. Karp, D. Mazihres and H. Yu: "RE: Reliable Email", Proc. NSDI, pp. 297-310, May 2006
[5]. J. Klensin: "Simple Mail Transfer Protocol," IETF, RFC 2821, Apr. 2001
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Survey on Mobile Forensic for Android Smartphones |
| Country | : | Sudan |
| Authors | : | Abdalazim Abdallah Mohammed Alamin || Dr.Amin Babiker A/Nabi Mustafa |
Abstract: Mobile forensic is fast becoming an abbreviated term that describes the process of applying digital forensics in mobile phones world. The rapid development in mobile phones industry has led to the emergence of the so-called smart phones which have become nearly the same as computers. Android Smartphones refer to all types of smartphones that use Android operating system. This paper aims to survey the tools and techniques that are used to forensically investigate Android mobile and then provides comparison between the tools according to their roles in the investigation process. Finally, the paper gives recommendation for following the best practices for investigating Android smartphones.
[1]. A. Hoog, Android Forensics:Investigation, Analysis and Mobile Security for Google Android: Syngress, 2011.
[2]. L. ı. N. Claudio Maia, Lu´ıs Miguel Pinho. (2014, Evaluating Android OS for Embedded Real-Time Systems. Cyber Forensics.
[3]. E. H. S. Brian D. Carrier. 02/02/2015). An Event-Based Digital Forensic Investigation Framework. Available: http://www.digital-evidence.org/papers/dfrws_event.pdf
[4]. Android.com. (2014). History of Android. Available: http://www.android.com/history/
[5]. idc.com. Smartphones Market share , Q3 2014. Available: http://www.idc.com/prodserv/smartphone-os-market-share.jsp
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Novel Approach for Workload Optimization and Improving Security in Cloud Computing Environments |
| Country | : | India |
| Authors | : | Atul U. Patil || A.P.Pande || R.U.Patil |
Abstract: This paper discusses a propose cloud infrastructure that combines On-Demand allocation of resources with improved utilization, opportunistic provisioning of cycles from idle cloud nodes to other processes.Because for cloud computing to avail all the demanded services to the cloud consumers is very difficult. It is a major issue to meet cloud consumer's requirements. Hence On-Demand cloud infrastructure using Hadoop configuration with improved CPU utilization and storage utilization is proposed using splitting algorithm by using Map-Reduce. Henceall cloud nodes which remains idle are all in use and also improvement in security challenges and achieves load balancing and fast processing of large data in less amount of time. Here we compare the FTP and HDFS for file uploading and file downloading; and enhance the CPU utilization and storage utilization. Cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. Therefore this security problem is solve by encrypting the data using encryption/decryption algorithm and Map-Reducing algorithm which solve the problem of utilization of all idle cloud nodes for larger data.
Keywords: CPU utilization, Storage utilization, Map-Reduce,Splitting algorithm, Encryption/decryption algorithm.
[1]. Paul Marshall "Improving Utilization of Infrastructure Clouds",CO USA, IEEE/ACM Cloud Computing May 2011.
[2]. Shah, M.A., et.al., "Privacy-preserving audit and extraction of digital contents", Cryptology ePrint Archive, Report 2008/186 (2008).
[3]. Juels, A., Kaliski Jr., et al.; "proofs of retrievability for large files", pp. 584–597. ACM Press, New York (2007).
[4]. Aspera an IBM company (2014,07,14). Big Data Cloud[English].Available:http://cloud.asperasoft.com/big-data-cloud/.
[5]. Divyakant Agrawal et al., " Big Data and Cloud Computing: Current State and Future Opportunities" , EDBT, pp 22-24, March 2011.
[6]. The Apache Software Foundation(2014,07,14). Hadoop[English]. Available:http://hadoop.apache.org/.