Displaying publications 61 - 80 of 91 in total

Abstract:
Sort:
  1. Jahanirad M, Anuar NB, Wahab AWA
    Forensic Sci Int, 2017 Mar;272:111-126.
    PMID: 28129583 DOI: 10.1016/j.forsciint.2017.01.010
    The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification. Although initial results were promising but theoretical reasoning for this is yet to be found. The study suggested computing entropy of mel-frequency cepstrum coefficients (entropy-MFCC) from near-silent segments as an intrinsic feature set that captures the device response function due to the tolerances in the electronic components of individual computer devices. By applying the supervised learning techniques of naïve Bayesian, linear logistic regression, neural networks and support vector machines to the entropy-MFCC features, state-of-the-art identification accuracy of near 99.9% has been achieved on different sets of computer devices for both call recording and microphone recording scenarios. Furthermore, unsupervised learning techniques, including simple k-means, expectation-maximization and density-based spatial clustering of applications with noise (DBSCAN) provided promising results for call recording dataset by assigning the majority of instances to their correct clusters.
    Matched MeSH terms: Computer Communication Networks*
  2. Onwuegbuzie IU, Abd Razak S, Fauzi Isnin I, Darwish TSJ, Al-Dhaqm A
    PLoS One, 2020;15(8):e0237154.
    PMID: 32797055 DOI: 10.1371/journal.pone.0237154
    Data prioritization of heterogeneous data in wireless sensor networks gives meaning to mission-critical data that are time-sensitive as this may be a matter of life and death. However, the standard IEEE 802.15.4 does not consider the prioritization of data. Prioritization schemes proffered in the literature have not adequately addressed this issue as proposed schemes either uses a single or complex backoff algorithm to estimate backoff time-slots for prioritized data. Subsequently, the carrier sense multiple access with collision avoidance scheme exhibits an exponentially increasing range of backoff times. These approaches are not only inefficient but result in high latency and increased power consumption. In this article, the concept of class of service (CS) was adopted to prioritize heterogeneous data (real-time and non-real-time), resulting in an optimized prioritized backoff MAC scheme called Class of Service Traffic Priority-based Medium Access Control (CSTP-MAC). This scheme classifies data into high priority data (HPD) and low priority data (LPD) by computing backoff times with expressions peculiar to the data priority class. The improved scheme grants nodes the opportunity to access the shared medium in a timely and power-efficient manner. Benchmarked against contemporary schemes, CSTP-MAC attained a 99% packet delivery ratio with improved power saving capability, which translates to a longer operational lifetime.
    Matched MeSH terms: Computer Communication Networks*
  3. Khan AW, Abdullah AH, Anisi MH, Bangash JI
    Sensors (Basel), 2014 Feb 05;14(2):2510-48.
    PMID: 24504107 DOI: 10.3390/s140202510
    Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink.
    Matched MeSH terms: Computer Communication Networks
  4. Moradi M, Rezazadeh J, Ismail AS
    Sensors (Basel), 2012;12(4):4352-80.
    PMID: 22666034 DOI: 10.3390/s120404352
    Underwater Wireless Sensor Networks (UWSNs) provide new opportunities to observe and predict the behavior of aquatic environments. In some applications like target tracking or disaster prevention, sensed data is meaningless without location information. In this paper, we propose a novel 3D centralized, localization scheme for mobile underwater wireless sensor network, named Reverse Localization Scheme or RLS in short. RLS is an event-driven localization method triggered by detector sensors for launching localization process. RLS is suitable for surveillance applications that require very fast reactions to events and could report the location of the occurrence. In this method, mobile sensor nodes report the event toward the surface anchors as soon as they detect it. They do not require waiting to receive location information from anchors. Simulation results confirm that the proposed scheme improves the energy efficiency and reduces significantly localization response time with a proper level of accuracy in terms of mobility model of water currents. Major contributions of this method lie on reducing the numbers of message exchange for localization, saving the energy and decreasing the average localization response time.
    Matched MeSH terms: Computer Communication Networks
  5. Rifai D, Abdalla AN, Razali R, Ali K, Faraj MA
    Sensors (Basel), 2017 Mar 13;17(3).
    PMID: 28335399 DOI: 10.3390/s17030579
    The use of the eddy current technique (ECT) for the non-destructive testing of conducting materials has become increasingly important in the past few years. The use of the non-destructive ECT plays a key role in the ensuring the safety and integrity of the large industrial structures such as oil and gas pipelines. This paper introduce a novel ECT probe design integrated with the distributed ECT inspection system (DSECT) use for crack inspection on inner ferromagnetic pipes. The system consists of an array of giant magneto-resistive (GMR) sensors, a pneumatic system, a rotating magnetic field excitation source and a host PC acting as the data analysis center. Probe design parameters, namely probe diameter, an excitation coil and the number of GMR sensors in the array sensor is optimized using numerical optimization based on the desirability approach. The main benefits of DSECT can be seen in terms of its modularity and flexibility for the use of different types of magnetic transducers/sensors, and signals of a different nature with either digital or analog outputs, making it suited for the ECT probe design using an array of GMR magnetic sensors. A real-time application of the DSECT distributed system for ECT inspection can be exploited for the inspection of 70 mm carbon steel pipe. In order to predict the axial and circumference defect detection, a mathematical model is developed based on the technique known as response surface methodology (RSM). The inspection results of a carbon steel pipe sample with artificial defects indicate that the system design is highly efficient.
    Matched MeSH terms: Computer Communication Networks
  6. Jawad HM, Nordin R, Gharghan SK, Jawad AM, Ismail M
    Sensors (Basel), 2017 Aug 03;17(8).
    PMID: 28771214 DOI: 10.3390/s17081781
    Wireless sensor networks (WSNs) can be used in agriculture to provide farmers with a large amount of information. Precision agriculture (PA) is a management strategy that employs information technology to improve quality and production. Utilizing wireless sensor technologies and management tools can lead to a highly effective, green agriculture. Based on PA management, the same routine to a crop regardless of site environments can be avoided. From several perspectives, field management can improve PA, including the provision of adequate nutrients for crops and the wastage of pesticides for the effective control of weeds, pests, and diseases. This review outlines the recent applications of WSNs in agriculture research as well as classifies and compares various wireless communication protocols, the taxonomy of energy-efficient and energy harvesting techniques for WSNs that can be used in agricultural monitoring systems, and comparison between early research works on agriculture-based WSNs. The challenges and limitations of WSNs in the agricultural domain are explored, and several power reduction and agricultural management techniques for long-term monitoring are highlighted. These approaches may also increase the number of opportunities for processing Internet of Things (IoT) data.
    Matched MeSH terms: Computer Communication Networks
  7. Waheed M, Ahmad R, Ahmed W, Drieberg M, Alam MM
    Sensors (Basel), 2018 Feb 13;18(2).
    PMID: 29438278 DOI: 10.3390/s18020565
    The fabrication of lightweight, ultra-thin, low power and intelligent body-borne sensors leads to novel advances in wireless body area networks (WBANs). Depending on the placement of the nodes, it is characterized as in/on body WBAN; thus, the channel is largely affected by body posture, clothing, muscle movement, body temperature and climatic conditions. The energy resources are limited and it is not feasible to replace the sensor's battery frequently. In order to keep the sensor in working condition, the channel resources should be reserved. The lifetime of the sensor is very crucial and it highly depends on transmission among sensor nodes and energy consumption. The reliability and energy efficiency in WBAN applications play a vital role. In this paper, the analytical expressions for energy efficiency (EE) and packet error rate (PER) are formulated for two-way relay cooperative communication. The results depict better reliability and efficiency compared to direct and one-way relay communication. The effective performance range of direct vs. cooperative communication is separated by a threshold distance. Based on EE calculations, an optimal packet size is observed that provides maximum efficiency over a certain link length. A smart and energy efficient system is articulated that utilizes all three communication modes, namely direct, one-way relay and two-way relay, as the direct link performs better for a certain range, but the cooperative communication gives better results for increased distance in terms of EE. The efficacy of the proposed hybrid scheme is also demonstrated over a practical quasi-static channel. Furthermore, link length extension and diversity is achieved by joint network-channel (JNC) coding the cooperative link.
    Matched MeSH terms: Computer Communication Networks
  8. Jabeen T, Jabeen I, Ashraf H, Ullah A, Jhanjhi NZ, Ghoniem RM, et al.
    Sensors (Basel), 2023 Jul 02;23(13).
    PMID: 37447952 DOI: 10.3390/s23136104
    Programmable Object Interfaces are increasingly intriguing researchers because of their broader applications, especially in the medical field. In a Wireless Body Area Network (WBAN), for example, patients' health can be monitored using clinical nano sensors. Exchanging such sensitive data requires a high level of security and protection against attacks. To that end, the literature is rich with security schemes that include the advanced encryption standard, secure hashing algorithm, and digital signatures that aim to secure the data exchange. However, such schemes elevate the time complexity, rendering the data transmission slower. Cognitive radio technology with a medical body area network system involves communication links between WBAN gateways, server and nano sensors, which renders the entire system vulnerable to security attacks. In this paper, a novel DNA-based encryption technique is proposed to secure medical data sharing between sensing devices and central repositories. It has less computational time throughout authentication, encryption, and decryption. Our analysis of experimental attack scenarios shows that our technique is better than its counterparts.
    Matched MeSH terms: Computer Communication Networks
  9. Woo MK, Ng KH
    J Med Internet Res, 2003 Jan-Mar;5(1):e3.
    PMID: 12746208
    Medical physics is a relatively small community but it spans great geographical distances, usually with a scarcity of experts whose expertise could greatly benefit students entering into the field. In addition there are many software systems for which an interactive education method would be most advantageous.
    Matched MeSH terms: Computer Communication Networks/economics; Computer Communication Networks/trends
  10. Ayatollahitafti V, Ngadi MA, Mohamad Sharif JB, Abdullahi M
    PLoS One, 2016;11(1):e0146464.
    PMID: 26771586 DOI: 10.1371/journal.pone.0146464
    Body Area Networks (BANs) consist of various sensors which gather patient's vital signs and deliver them to doctors. One of the most significant challenges faced, is the design of an energy-efficient next hop selection algorithm to satisfy Quality of Service (QoS) requirements for different healthcare applications. In this paper, a novel efficient next hop selection algorithm is proposed in multi-hop BANs. This algorithm uses the minimum hop count and a link cost function jointly in each node to choose the best next hop node. The link cost function includes the residual energy, free buffer size, and the link reliability of the neighboring nodes, which is used to balance the energy consumption and to satisfy QoS requirements in terms of end to end delay and reliability. Extensive simulation experiments were performed to evaluate the efficiency of the proposed algorithm using the NS-2 simulator. Simulation results show that our proposed algorithm provides significant improvement in terms of energy consumption, number of packets forwarded, end to end delay and packet delivery ratio compared to the existing routing protocol.
    Matched MeSH terms: Computer Communication Networks
  11. Hindia MN, Reza AW, Noordin KA, Chayon MH
    PLoS One, 2015;10(4):e0121901.
    PMID: 25830703 DOI: 10.1371/journal.pone.0121901
    Smart grid (SG) application is being used nowadays to meet the demand of increasing power consumption. SG application is considered as a perfect solution for combining renewable energy resources and electrical grid by means of creating a bidirectional communication channel between the two systems. In this paper, three SG applications applicable to renewable energy system, namely, distribution automation (DA), distributed energy system-storage (DER) and electrical vehicle (EV), are investigated in order to study their suitability in Long Term Evolution (LTE) network. To compensate the weakness in the existing scheduling algorithms, a novel bandwidth estimation and allocation technique and a new scheduling algorithm are proposed. The technique allocates available network resources based on application's priority, whereas the algorithm makes scheduling decision based on dynamic weighting factors of multi-criteria to satisfy the demands (delay, past average throughput and instantaneous transmission rate) of quality of service. Finally, the simulation results demonstrate that the proposed mechanism achieves higher throughput, lower delay and lower packet loss rate for DA and DER as well as provide a degree of service for EV. In terms of fairness, the proposed algorithm shows 3%, 7 % and 9% better performance compared to exponential rule (EXP-Rule), modified-largest weighted delay first (M-LWDF) and exponential/PF (EXP/PF), respectively.
    Matched MeSH terms: Computer Communication Networks
  12. Bello Tambawal A, Md Noor R, Salleh R, Chembe C, Oche M
    PLoS One, 2019;14(4):e0214664.
    PMID: 30946766 DOI: 10.1371/journal.pone.0214664
    A vehicular ad hoc network (VANET) is an emerging and promising wireless technology aimed to improve traffic safety and provide comfort to road users. However, the high mobility of vehicles and frequent topology changes pose a considerable challenge to the reliable delivery of safety applications. Clustering is one of the control techniques used in VANET to make the frequent topology changes less dynamic. Nevertheless, research has shown that most of the existing clustering algorithms focus on cluster head (CH) election with very few addressing other critical issues such as cluster formation and maintenance. This has led to unstable clusters which could affect the timely delivery of safety applications. In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. We considered any vehicle moving on the same road segment with the same road ID and within the transmission range of its neighbour to be suitable for the cluster formation process. This was attributed to the fact that all safety messages are expected to be shared among the vehicles within the vicinity irrespective of their relative speedto avoid any hazardous situation. To elect a CH, we identified some metrics on the basis of the vehicle mobility information. Each vehicle was associated with a predefined weight value based on its relevance. A vehicle with the highest weight value was elected as the primary cluster head (PCH). We also introduced a secondary cluster head (SeCH) as a backup to the PCH to improve the cluster stability. SeCH took over the leadership whenever the PCH was not suitable for continuing with the leadership. The simulation results of the proposed approach showed a better performance with an increase of approximately40%- 45% in the cluster stability when compared with the existing approaches. Similarly, cluster formation messages were significantly minimized, hence reducing the communication overhead to the system and improving the reliable delivery of the safety applications.
    Matched MeSH terms: Computer Communication Networks
  13. Syed-Mohamad SM, Ali SH, Mat-Husin MN
    Health Inf Manag, 2010;39(1):30-5.
    PMID: 20335647
    This paper describes the method used to develop the One Stop Crisis Centre (OSCC) Portal, an open source web-based electronic patient record system (EPR) for the One Stop Crisis Center, Hospital Universiti Sains Malaysia (HUSM) in Kelantan, Malaysia. Features and functionalities of the system are presented to demonstrate the workflow. Use of the OSCC Portal improved data integration and data communication and contributed to improvements in care management. With implementation of the OSCC portal, improved coordination between disciplines and standardisation of data in HUSM were noticed. It is expected that this will in turn result in improved data confidentiality and data integrity. The collected data will also be useful for quality assessment and research. Other low-resource centers with limited computer hardware and access to open-source software could benefit from this endeavour.
    Matched MeSH terms: Computer Communication Networks
  14. Razzaque MA, Javadi SS, Coulibaly Y, Hira MT
    Sensors (Basel), 2014 Dec 29;15(1):440-64.
    PMID: 25551485 DOI: 10.3390/s150100440
    Wireless body sensor networks (WBSNs) for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Considering the criticality of healthcare and medical applications, WBSNs need to fulfill users/applications and the corresponding network's QoS requirements. For instance, for a real-time application to support on-time data delivery, a WBSN needs to guarantee a constrained delay at the network level. A network coding-based error recovery mechanism is an emerging mechanism that can be used in these systems to support QoS at very low energy, memory and hardware cost. However, in dynamic network environments and user requirements, the original non-adaptive version of network coding fails to support some of the network and user QoS requirements. This work explores the QoS requirements of WBSNs in both perspectives of QoS. Based on these requirements, this paper proposes an adaptive network coding-based, QoS-aware error recovery mechanism for WBSNs. It utilizes network-level and user-/application-level information to make it adaptive in both contexts. Thus, it provides improved QoS support adaptively in terms of reliability, energy efficiency and delay. Simulation results show the potential of the proposed mechanism in terms of adaptability, reliability, real-time data delivery and network lifetime compared to its counterparts.
    Matched MeSH terms: Computer Communication Networks*
  15. Soleymani A, Nordin MJ, Sundararajan E
    ScientificWorldJournal, 2014;2014:536930.
    PMID: 25258724 DOI: 10.1155/2014/536930
    The rapid evolution of imaging and communication technologies has transformed images into a widespread data type. Different types of data, such as personal medical information, official correspondence, or governmental and military documents, are saved and transmitted in the form of images over public networks. Hence, a fast and secure cryptosystem is needed for high-resolution images. In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. The scheme uses Arnold cat map for bit- and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. Both the encryption and decryption processes are explained, formulated, and graphically presented. The results of security analysis of five different images demonstrate the strength of the proposed cryptosystem against statistical, brute force and differential attacks. The evaluated running time for both encryption and decryption processes guarantee that the cryptosystem can work effectively in real-time applications.
    Matched MeSH terms: Computer Communication Networks*
  16. Zubair S, Fisal N, Baguda YS, Saleem K
    Sensors (Basel), 2013;13(10):13005-38.
    PMID: 24077319 DOI: 10.3390/s131013005
    Interest in the cognitive radio sensor network (CRSN) paradigm has gradually grown among researchers. This concept seeks to fuse the benefits of dynamic spectrum access into the sensor network, making it a potential player in the next generation (NextGen) network, which is characterized by ubiquity. Notwithstanding its massive potential, little research activity has been dedicated to the network layer. By contrast, we find recent research trends focusing on the physical layer, the link layer and the transport layers. The fact that the cross-layer approach is imperative, due to the resource-constrained nature of CRSNs, can make the design of unique solutions non-trivial in this respect. This paper seeks to explore possible design opportunities with wireless sensor networks (WSNs), cognitive radio ad-hoc networks (CRAHNs) and cross-layer considerations for implementing viable CRSN routing solutions. Additionally, a detailed performance evaluation of WSN routing strategies in a cognitive radio environment is performed to expose research gaps. With this work, we intend to lay a foundation for developing CRSN routing solutions and to establish a basis for future work in this area.
    Matched MeSH terms: Computer Communication Networks/instrumentation*
  17. Rassam MA, Zainal A, Maarof MA
    Sensors (Basel), 2013;13(8):10087-122.
    PMID: 23966182 DOI: 10.3390/s130810087
    Wireless Sensor Networks (WSNs) are important and necessary platforms for the future as the concept "Internet of Things" has emerged lately. They are used for monitoring, tracking, or controlling of many applications in industry, health care, habitat, and military. However, the quality of data collected by sensor nodes is affected by anomalies that occur due to various reasons, such as node failures, reading errors, unusual events, and malicious attacks. Therefore, anomaly detection is a necessary process to ensure the quality of sensor data before it is utilized for making decisions. In this review, we present the challenges of anomaly detection in WSNs and state the requirements to design efficient and effective anomaly detection models. We then review the latest advancements of data anomaly detection research in WSNs and classify current detection approaches in five main classes based on the detection methods used to design these approaches. Varieties of the state-of-the-art models for each class are covered and their limitations are highlighted to provide ideas for potential future works. Furthermore, the reviewed approaches are compared and evaluated based on how well they meet the stated requirements. Finally, the general limitations of current approaches are mentioned and further research opportunities are suggested and discussed.
    Matched MeSH terms: Computer Communication Networks/instrumentation*
  18. Logeswaran R, Chen LC
    J Med Syst, 2012 Apr;36(2):483-90.
    PMID: 20703702 DOI: 10.1007/s10916-010-9493-0
    Current trends in medicine, specifically in the electronic handling of medical applications, ranging from digital imaging, paperless hospital administration and electronic medical records, telemedicine, to computer-aided diagnosis, creates a burden on the network. Distributed Service Architectures, such as Intelligent Network (IN), Telecommunication Information Networking Architecture (TINA) and Open Service Access (OSA), are able to meet this new challenge. Distribution enables computational tasks to be spread among multiple processors; hence, performance is an important issue. This paper proposes a novel approach in load balancing, the Random Sender Initiated Algorithm, for distribution of tasks among several nodes sharing the same computational object (CO) instances in Distributed Service Architectures. Simulations illustrate that the proposed algorithm produces better network performance than the benchmark load balancing algorithms-the Random Node Selection Algorithm and the Shortest Queue Algorithm, especially under medium and heavily loaded conditions.
    Matched MeSH terms: Computer Communication Networks/organization & administration
  19. Mohammed S, Orabi A, Fiaidhi J, Orabi M, R. Benlamri
    Int J Electron Healthc, 2008;4(1):24-42.
    PMID: 18583294
    Web 2.0 technologies such as wikis, podcasts/vodcasting, blogs and semantic portals could be quite effective tools in e-learning for health professionals. If effectively deployed, such tools can offer a way to enhance students', clinicians' and patients' learning experiences, and deepens levels of learners' engagement and collaboration within medical learning environments. However, Web 2.0 requires simplicity of use as well as integration with modern web technologies. This article presents a Web 2.0 telemedical portal, which provides a social community-learning paradigm from the desk of the physician, the student, the hospital administrator, or the insurer. The presented portal utilises RESTful web services and techniques like content syndication, mushups and Asynchronous JavaScript API and XML (AJAX). The designed portal is based on the Apache Cocoon RESTful framework for sharing Digital Imaging and Communications in Medicine (DICOM) medical case studies. Central to this article is the integration between Cocoon and AJAX. The proposed AJAX-Cocoon portal utilises a JSP portlet architecture, which manages the interaction dynamics and overcomes the shortcomings of the JSR 168 and WSRP 1.0 standards.
    Matched MeSH terms: Computer Communication Networks/organization & administration
  20. Abidi SS, Yusoff Z
    PMID: 10724889
    The Malaysian Telemedicine initiative advocates a paradigm shift in healthcare delivery patterns by way of implementing a person-centred and wellness-focused healthcare system. This paper introduces the Malaysian Telemedicine vision, its functionality and associated operational conditions. In particular, we focus on the conceptualisation of one key Telemedicine component i.e. the Lifetime Health Plan (LHP) system--a distributed multimodule application for the periodic monitoring and generation of health-care advisories for all Malaysians. In line with the LHP project, we present an innovative healthcare delivery info-structure--LifePlan--that aims to provide life-long, pro-active, personalised, wellness-oriented healthcare services to assist individuals to manage and interpret their health needs. Functionally, LifePlan based healthcare services are delivered over the WWW, packaged as Personalised Lifetime Health Plans that allow individuals to both monitor their health status and to guide them in healthcare planning.
    Matched MeSH terms: Computer Communication Networks/trends
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links