Traditional health care services can hardly meet the needs

Size: px
Start display at page:

Download "Traditional health care services can hardly meet the needs"

Transcription

1 Mobile Big Data Fault-Tolerant Processing for ehealth Networks Kun Wang, Yun Shao, Lei Shu, Chunsheng Zhu, and Yan Zhang Abstract In daily life, people tend to use mobile networks for more accurate overall data. With intelligent mobile devices, almost all kinds of data can be collected automatically, which contributes directly to the blooming of ehealth. However, large amounts of data are also leading us into the era of big data, in which new data collection, transmission, and processing techniques are required. To ensure ubiquitous data collection, the scale of mobile ehealth networks has to be expanded. Also, networks will face more pressure to transmit large amounts of ehealth data. In addition, because the processing time increases with data volume, even powerful processors cannot always be regarded as efficient for big data. To solve these problems, in this article, an interests-based reduced variable neighborhood search (RVNS) queue architecture (IRQA) is proposed. In this three-layer architecture, a fault-tolerant mechanism based on interests matching is designed to ensure the completeness of ehealth data in the data gathering layer. Then the data integrating layer checks the accuracy of data, and also prepares for data processing. In the end, an RVNS queue is adopted for rapid data processing in the data analyzing layer. After processing with relevant rules, only valuable data will be reported to health care providers, which saves their effort to identify these data. Simulation shows that IRQA is steady and fast enough to process large amounts of data. Traditional health care services can hardly meet the needs of the growing population because hospital capacity and medical workers are limited in terms of the continuously increasing treatment requests. On this background, a new kind of ehealth service using intelligent device to monitor people s lives is developing rapidly with the benefits of big data technique. In this era of big data, large amount of data has been transmitted on the Internet, stored in servers and clouds, and even collected around people s life by mobile networks [1]. Characterized by their volume, velocity, variability, and veracity, mobile big data networks are used to describe those extremely large or complex data sets in the network for which traditional processing methods are inadequate. Specifically, data collected by mobile ehealth networks are becoming more ubiquitous with the development of hardware, and a group of collecting nodes are required to get more overall data [2]. Meanwhile, the number of collecting nodes in a network tends to increase, and each collecting node tends to Ken Wang is with Nanjing University of Posts and Telecommunications. Yun Shao is with the University of Southern California. Lei Shu is the corresponding author for this article, and is with Guangdong University of Petrochemical Technology, Dalian University of Technology, and Guangdong Provincial Key Laboratory of Petrochemical Equipment Fault Analysis. Chunsheng Zhu is with the University of British Columbia. Yan Zhang is with Simula Research Laboratory and the University of Oslo. have higher sampling frequency. Some typical types of sensors (e.g., brain sensors) will generate huge amounts of data, the size of which can even grow to the terabyte level. Also, the size of records of a clinic agency easily grows to the exabyte level. All the factors mentioned above increase the scale of a network, as well as the data volume transmitted in an ehealth network. On the other hand, due to the limited energy and functionality of mobile nodes, data has to be converged and processed in a central server. As shown in Fig. 1, the monitoring of people s status is always completed by the combination of body sensors and environmental sensors. The reason that sensor data (e.g., blood pressure, blood sugar, heart rate) from body sensors and environmental sensors should be combined in analysis is that some environmental factors (e.g., temperature, pressure) will affect an elderly person s physiological conditions a lot. In addition, we also show status sensors in Fig. 1. That is because moving status may cause inaccurate analysis. For example, the movement of some kinds of transportation (e.g., cars and elevators) will cause fall detection to be out of order in some cases. However, with the expansion of network scale caused by more powerful functionalities, it is highly possible that some interruptive nodes or network congestion block the routing so that it becomes difficult for data to reach the server. Accordingly, the server cannot have complete data for analysis, and it will be interested in the value of lost data. Based on this idea, the foundation of interests matching is formed: let a server generate interest requests according to lost data, and nodes match the received requests in their buffer; then the lost data could be recollected. In addition, on the server side, the increasing amount of data definitely slows down the processing speed. With the /16/$ IEEE IEEE Network January/February 216

2 IRQA Health care provider Congestion Status sensors Interruptive node Normal node Environmental sensors Brain Vision Hearing Blood pressure Falling Heart rate Toxins Body sensors Figure 1. Problem statement of mobile big data network. development of a network, it is highly possible that the processing ratio will be slower than the data receiving ratio, which means lots of the newest data arrives while old data is still being processed because of the increment of data processing time. Under this circumstance, if data is still organized in sequence as is tradition, a processor will analyze those earlier arriving data first, and the queue used to store the newest data is going to elongate infinitely so that the newest data will never be processed promptly. Therefore, how to process these collected data efficiently and return valuable information deserves further exploration. To this end, we mainly focus on reliable data transmission in a mobile ehealth network and rapid data processing in a central server under a big data scenario, and propose an interests-based Reduced Variable Neighborhood Search (RVNS) queue architecture (IRQA) to solve unreliable transmission and data processing problems caused by the expansion of a network. The contributions of our article are summarized as follows: A new fault-tolerant mechanism is proposed using interests matching to ensure the reliability of data transmission. An RVNS queue is designed based on the RVNS algorithm [3], which is always used for solving combinational optimization problems. RVNS queue improves processing speed dramatically under a big data scenario. Big data is a very hot topic, and much research is still in the exploration phase. Currently, research toward big data can be divided into two fields. Lots of research works focus on algorithms and strategies for big data mining. Zhang et al. designed a novel community-centric framework to predict community activities [4]. The framework consists of community detection and community activity modeling. It extracts community activity patterns from big data collected physically and virtually. Kuang et al. proposed a unified tensor model [5]. This model can represent unstructured, semistructured, and structured data with a tensor model. In detail, each kind of data is represented by a subtensor, which is finally merged with a unified tensor. Also, a small but valuable core tensor is extracted using an incremental high order singular value decomposition. Yu et al. designed an RTIC-C system to handle the huge data volume based on cloud computing [6]. RTIC-C includes a distribute data management service to ensure large-scale data storage, a parallel distributed framework to run various mining applications based on the Map-Reduce mechanism, and a restful web service interface for third-party mining services. Gu et al. proposed a cost minimization method [7]. In this method, a 2D Markov chain is adopted to generate an efficient solution to linearize mixed-integer nonlinear programming problems about average task completion time. The other track concentrates on methodologies for big data storage. Dou et al. proposed a privacy-aware cross-cloud service composition method [8]. In the method, evaluations of services are promoted by quality of service (QoS) history records to enhance credibility. Also, a k-means algorithm is adopted as the filter for representative historical records. Yin et al. proposed an efficient storage model based on code erasing [9]. In the proposed model, the large amount of data is separated into various storage nodes, and different users can set different coding parameters to improve the robustness of the overall storage system. Yang et al. proposed a novel approach for error detection in big sensor data [1]. The approach first classifies typical data errors. Then clustered wireless sensor networking (WSN) is introduced for fast error detection based on scale-free network topology. Most detection operations are carried out in spatial data blocks, which ensure its timeliness. To sum up, even though much research in these two directions has been carried out, there are few comprehensive designs to solve problems in ambient assisted living (AAL). The necessity of big data analysis was already pointed out by Mao et al. [11]. A universal method for big data abstraction was also presented in the article. Forkan et al. also proposed a context-aware monitoring based on big data techniques [12]. However, most traditional data processing algorithms use firstin first-out (FIFO) queues to carry data [13]. Such a queue is effective with powerful processors, but it may be that a processor cannot meet the required speed in some scenarios. Under this circumstance, massive data are left in the queue, and cannot be processed quickly, so essentially a breakthrough is necessary to solve the problem. Actually, we have delved into the research of data processing in ehealth networks before, and proposed a local data processing architecture in [14]. In that article, we also adopted the RVNS algorithm as a methodology for data processing, but we explore more essential characteristics about RVNS now, and propose the concept of an RVNS queue. In addition, we consider more about big data transmission in mobile ehealth networks, and propose a interests-matching mechanism to ensure the reliability of data transmission. Based on the above description, an interests-matching RVNS queue architecture is introduced in this article to help health care providers identify valuable data more efficiently. The rest of the article is organized as follows. The main idea of RVNS is presented. We demonstrate how IRQA ensures reliable rapid processing through a three-layer architecture with simulation results. We present a conclusion. Overview of RVNS Algorithm In this section, we introduce RVNS and its original algorithm, Variable Neighborhood Search (VNS). VNS is a meta-heuristic algorithm for solving combinational optimization problems [3]. Normally, for a combinational optimization problem, there is always a solution space S = {x 1, x 2, x 3,, x n }, and an optimal solution selected from S based on some specific utility function. However, in VNS, there are two kinds of optimal solutions, called global and local optimal solutions, denoted as x and x, respectively. A global optimal solution is the currently found x S contributing to the maximum result of x. For every global optimal solution x, there is a neighborhood structure N(x) constructed based on x. N(x) is a subset of S. Also, the neighborhood structure consists of k neighborhoods. These specific IEEE Network January/February

3 Solution space Global optimal solution: X Neighborhoods Figure 2. Overall idea of RVNS. Randomly generate X < X neighborhoods are denoted as N k, where k [1, k max ]. Particularly, when x is a feasible global optimal solution, these k specific neighborhoods are denoted as N k (x). N k is reconstructed continuously through a series of predefined rules when a new feasible global optimal solution is found. A new feasible global optimal solution is always generated from local optimal solutions. In VNS, if we cannot find another x i in a specific neighborhood satisfying (x ) < (x i ) using a specific subroutine, x will be regarded as a local optimal solution of those neighborhoods, where i [1, n]. However, RVNS simplifies the adoption of a subroutine, and just takes an element in current neighborhoods randomly as the local optimal solution. Considering the necessity of rapid processing, we use RVNS for guidance in reorganizing received data in this article. After the confirmation of the local optimal solution, the original global optimal solution x will be replaced by local optimal solution x if (x) < (x ), so a new feasible global optimal solution is generated. At the beginning of RVNS, a global optimal solution x is generated randomly, and a corresponding neighborhood structure N k (x) is constructed. The first local optimal solution x is generated from N 1 (x). If the original global optimal solution x is replaced by the current local optimal solution x, a new neighborhood structure is constructed based on the new feasible global optimal solution. The second local optimal solution isfound in N 2 (x), and the above work flow is repeated. The procedure of RVNS is presented in Fig. 2. To sum up, the whole execution process of VNS mainly includes two parts: constructing changeable neighborhoods systematically and searching for local optimal solutions. The merits of this algorithm are to reduce the calculation complexity through local search and to avoid local optima through changing neighborhood structure systematically. In this article, we rearrange the data process sequence based on the neighborhood structure in RVNS, which differs from the traditional processing pattern and provides the possibility of real-time processing in the big data background. Interests-Based RVNS Queue Architecture In this section, we introduce how IRQA works in detail. As shown in Fig. 3, IRQA can be divided into three layers: data gathering layer (DGL), data integrating layer (DIL), and data analyzing layer (DAL). DGL takes charge of collecting and storing relevant collected data. Also, it checks the status of mobile nodes, and reports interruptive nodes with a fault-tolerant mechanism. Converged data enter DIL, which is used to Local optimal solution: X X > X check the effectiveness of data. Due to the influence of working status and environment, a learning machine is adopted to optimize the checking process. Also, data is divided into different levels in DIL. In the end, DAL puts data into an RVNS queue and reports valuable data. Data Gathering Layer (DGL) In the proposed architecture, data collected by deployed mobile nodes will be converged to a local server and wait for processing. The server interacts with people directly. Usually, in mobile big data networks, nodes are portable, and they can be carried by people, by transportation, or moving themselves. For energy, battery power is used to for monitoring and moving. The continuous moving of these nodes serves as the basis of interests matching. Each node is assigned a unique index during initialization as its identification in system. After data collection, nodes package the data into packets using node indexes for identification of packets. On the other hand, a local server can retrieve the source node of a packet through looking up the node index on that packet. In addition, considering the difference between sending sequence and receiving sequence in the real world, a timestamp is given before sending a packet. Based on this timestamp, a server can sort the collected data in time sequence. Initially, nodes relay packets according to the original routing algorithm. However, due to the unreliable network condition, some packets have to face network delay. Meanwhile, because of interruptive nodes, a server cannot achieve complete data. Accordingly, an effective fault-tolerant mechanism is necessary. In this article, a new fault-tolerant mechanism is designed using the thought of interests matching, as shown in Fig. 4. Lost packets can be found by referring the node indexes when sorting packets based on timestamp. Then an index interest is generated and broadcast for each lost packet according to the found timestamp and node index. Nodes search relevant packets among their buffer once interests are received. If those packets have not been found, nodes take no action except to help broadcast. On the contrary, the node resends corresponding packets matched with interests. The reason that the interests matching mechanism works is the existence of movable nodes. Initially, the routing algorithm sets up a routing path for packet transmission, but the server does not receive the packets because of a routing break. Then an interest is generated and broadcast. Note that there is an interval between the original relay of a lost packet and receiving interest. During this interval, the routing path changes because nodes are moving continuously. Accordingly, packet retransmission may more possibly reach the server. Data Integrating Layer (DIL) Filter: Even though DIL ensures the completeness of a packet, the correctness of data has not been checked. In the real world, it is hard to keep all the data unchanged due to the influence of the network environment. Accordingly, a filter is designed in this section. To give a reference, a relevant data set is introduced. This relevant data set stores massive historical data collected by various nodes. When packets enter DIL, they are first decapsulated. At this moment, a filter checks representative data according to the range retrieved from a relevant data set, based on which some invalid data can be found. Also, a learning machine is adopted in the filter to accumulate common errors so that similar errors can be detected faster. Corresponding error packets are returned to DGL with 38 IEEE Network January/February 216

4 node indexes and timestamp, where relevant interests are generated and data are recollected. Level Division: The mechanisms above ensure data completeness and accuracy. Then the data with various timestamps from different nodes can be organized as a matrix, which can be regarded as a solution space S of RVNS. Data inside the matrix are put in an RVNS queue later. In the matrix, the column and row represent data collected by different nodes at the same time, and data collected by one node at different times, respectively. Afterward, data in S will be divided into several levels randomly. Note that we do not design a complex algorithm for level division. That is because in a big data scenario, data volume could be unthinkable, and has already increased the processing time. If some algorithms with higher complexity are adopted, the processing time further increases with algorithm complexity. At that time, it is impossible to control the processing time. Also, the size of each level tends to be equal when data volume becomes extremely large based on the probabilistic rule. As a result, all the data in S are divided into corresponding levels, which serve as the foundation of neighborhood construction, or what we call RVNS queue construction. Data Analyzing Layer In this section, we first introduce the idea of risk function. Then we analyze how an RVNS queue is used for rapid data processing as well as its detailed design. RVNS Queue Construction: After level division, a neighborhood structure is constructed according to the current global optimal solution. Specifically, an initial global optimal solution (current global optimal solution) is selected randomly from s, that is, one column from the matrix, denoted as x. Neighborhood structure is constructed according to the level of x, denoted as N(X). Suppose X L(opt) (opt [1, max]), and the level of another column from the matrix is denoted as L(temp) (temp [1, max]); then that column will belong to Data analyzing layer Data integrating layer Data gathering layer N k (X), where k = L(temp) L(opt). When all the data is set in its corresponding neighborhood, original RVNS queue construction is finished. Unlike other queues, an RVNS queue is modified during the running of RVNS, which is called neighborhood reconstruction. Before the start of RVNS, every column is assigned into a specific neighborhood according to X. At this moment, data in the solution space are not carried by a traditional FIFO queue anymore, but in the RVNS queue. Since every application scenario analyzing rule has a given threshold, the initial global optimal solution is processed by adopting the corresponding rule, and the result of the initial global optimal solution is recorded. When a new RVNS turn is launched, a function is called to generate a local optimal solution X from the first neighborhood randomly. If the result of X is larger than that of x after being processed by the rule, the relevant data of X is more valuable. In this case, current global optimal solution x will be replaced by local optimal solution X, and the RVNS queue is reconstructed according to the new global optimal solution just as for neighborhood reconstruction. Specifically, Figure 3. Structure of IRQA. Processing unit Valuable data Buffer 1:9 Action A1 1:9 Action A2 1:9 Action A3 1:9 Action A4 1:9 Action A 1:9 Actio Filter Packet Sensor index Timestamp Health care provider RVNS queue Interests Levels when the result is large enough, its relevant data is reported. On the other hand, if the result of current local optimal solution X is smaller than the current global optimal solution, RVNS continues to search in the next neighborhood. Detailed Design of an RVNS Queue: There are two factors that can influence the performance of an RVNS queue. The first factor is the size of the solution space. Because RVNS randomly picks data in the RVNS queue to process, the possibility of selection risk decreases with the expansion of the solution size. On the contrary, if the solution space is too small, the RVNS queue is essentially close to a traditional FIFO queue. Another factor is the interval of neighborhood reconstruction. Since newly generated data enter DAL continuously, the newest data cannot be processed promptly if the interval is too large. On the other hand, data in the solution space do not have enough processing time if the interval is too small. In addition, cross impact may exist between these two factors. For example, assuming that the solution space is relatively small, the time needed for analysis would be definitely shorter than the time needed for analysis with a larger solution IEEE Network January/February

5 A buffer Data packet A5 Source: A Timestamp: 5 A buffer Data packet A5 Source: A Timestamp: 5 Blocked Figure 4. Fault-tolerant mechanism: a) original transmission process; b) fault tolerant transmission process Delivery ratio (%) C C A A Interruptive node space. Thus, without considering the current size of the solution space, a proper interval of neighborhood reconstruction cannot be achieved. Based on this, a group of simulations is designed to demonstrate their optimal value. In the end, we need to pay attention to the terminal condition of RVNS. There are two conventional terminal conditions: maximum time of neighborhood reconstruction and maximum CPU running time. If we adopt the former as the terminal condition, RVNS will stop once the maximum time is achieved. At this moment, because the newest data still need to be analyzed, the former larger results and their relevant data are invalid, which increases the amount of neighborhood (a) (b) D D Blocked B B E Interruptive node Figure 5. Delivery ratio of original scenario and interestsbased scenario. E Original Interests-based Number of faulted trunk nodes reconstruction. On the other hand, if the maximum CPU running time is adopted as the terminal condition, this problem is still unsolved. In this case, it is notable that once a result is larger than a given threshold, IRQA sends a report, and the result must be at its peak at this time. However, it cannot ensure that there is no result larger than the threshold and smaller than the current highest risk factor, which means other smaller results are ignored in the following analysis. In this case, relevant data are ignored without a report. Accordingly, we need to change the conventional terminal conditions, and as described above, the terminal condition should be set as the sending of a report, because the report signal is still generated in a new RVNS queue with a result larger than the threshold and smaller than the former peak. Performance Evaluation The performance evaluation is divided into two parts. The first part evaluates the effectiveness of the interests-based mechanism by virtually setting up a network environment. The second part evaluates the performance of an RVNS queue. Interests-Based Mechanism Evaluation: In this section, we test the improvement resulting from the interests-based mechanism by observing the delivery ratio, which is the ratio of received packets to total generated packets. We first set up a network using C++. In the simulated network, there are 1 movable nodes, each of which represents a set of sensors carried by an elderly person. These nodes move in a 1 m 1 m area with speed varying from 3 m/s to 5 m/s. To assist the transmission, we also set 1 fixed nodes as the trunk nodes. The communication radius of both the moveable nodes and the trunk nodes is 7 m. To simulate the interruption, we gradually reduce the number of available trunk nodes from 1 to 5, and compare the delivery ratio of the original scenario and interests-based scenario in 5, s. The results are presented in Fig. 5. As we can see, the interests-based mechanism can obviously improve the delivery ratio. The reason for the improvement is that when a node carrying lost packets receives corresponding interests, the lost packets are resent. In this way, the environment of the node is favorable after moving for a while. RVNS Queue Evaluation: The performance of an RVNS queue is evaluated through simulation in this section. In this article, a server is simulated using C++. Some of the simulation data come from the Arrhythmia Data Set in the UCI Machine Learning Repository [15]. In simulation, for every 5 s, the server receives a group of packets, the number of which reaches the factorial of 2 (2!). Each group of data enters an RVNS queue with four levels and a FIFO queue, respectively. Data is processed within an assumed rule with complexity of O(2 n ), and the processing time of each data group varies from 5 s to 12 s (integer). The maximum analyzing result is 1, and the given threshold is 9. Simulation length is 5, s. We designed three groups of simulation. The first group finds the optimal parameters of an RVNS queue by changing the size of the solution space and the interval of neighborhood reconstruction, and the results are shown in Fig. 6a. The second group compares the increment of maximum results with time between an RVNS queue and a FIFO queue, and the results are shown in Fig. 6b. The third group compares the waiting time between an RVNS queue and a FIFO queue when average data processing time changes, and the results 4 IEEE Network January/February 216

6 are shown in Fig. 6c. Specifically, in the third group, the average processing time changes from 5 s to 15 s (integer). Based on the analysis above, due to the existence of cross impact, two parameters change together in Fig. 6a. Results show that the optimums of reconstruction interval and solution space size are 1 s and 1, respectively. Thus, these values are used in the following simulation. In addition, Figs. 6b and 6c reveal that the RVNS queue is stable enough to generate quick response when processing time increases with the amount of data. The most important reason is that the sequence of data processing changes because of the RVNS queue so that the potential valuable data can be analyzed and reported early. Conclusion In the big data era, ubiquitous sensing is not always a hard problem. However, the real problems are how to transfer collected data and analyze them efficiently. In this article, a three-layer architecture is proposed for a mobile ehealth network, where a fault-tolerant mechanism is proposed using interests matching to ensure the reliability of network transmission. In addition, filtered data are set in an RVNS queue for rapid processing in the data analyzing layer, and only valuable data are returned to health care providers, which saves people effort in identifying them. In further research, we will focus more on the specific design of the fault-tolerant mechanism to meet the needs of more universal networks. Acknowledgments This work is supported by NSFC ( , , ); SFDPH ( ); NSF of Jiangsu Province (BK ), NUPT (NY21497, XJKY1411); Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education (NYKL2157); Educational Commission of Guangdong Province (213KJCX131); Guangdong High-Tech Development Fund (213B14135); the 214 Guangdong Province Outstanding Young Professor Project and 213 Top Level Talents Project in the Sailing Plan of Guangdong Province; projects 2479F/2 funded by the Research Council of Norway, and the European Commission FP7 Project CROWN (grant no. PIRSES-GA ). References [1] C. Jardak, P. Mahon, and J. Riihijar, Spatial Big Data and Wireless Networks: Experiences, Applications, and Research Challenges, IEEE Network, vol. 28, no. 4, 214, pp [2] A. Hristova, A. M. Bernardos, and J. R. Casar, Context-Aware Services for Ambient Assisted Living: A Case-Study, 1st Int l. Symp. Applied Sciences on Biomedical and Commun. Technologies, 28, pp [3] P. Hansen and N. Mladenovic, Variable Neighborhood Search: Principles and Applications, Euro. J. Oper. Res., vol. 13, no. 3, 21, pp [4] Y. Zhang et al., Cap: Community Activity Prediction Based on Big Data Analysis, IEEE Network, vol. 28, no. 4, 214, pp [5] L. Kuang et al., A tensor-based Approach for Big Data Representation and Dimensionality Reduction, IEEE Trans. Emerg. Topics Comp., vol. 2, no. 3, 214, pp [6] J. Yu, F. Jiang, and T. Zhu, RTIC-C: A Big Data System for Massive Traffic Information Mining, IEEE Int l. Conf. Cloud Computing and Big Data, 213, pp [7] L. Gu et al., Cost Minimization for Big Data Processing in Geo-Distributed Data Centers, IEEE Trans. Emerg. Topics Comp., vol. 2, no. 3, 214, pp [8] W. Dou et al., Hiresome-ii: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications, IEEE Trans. Parallel Distrib. Sys., vol. 26, no. 2, 213, pp [9] C. Yin et al., Robot: An Efficient Model for Big Data Storage Systems Based on Erasure Coding, 213 IEEE Int l. Conf. Big Data, 213, pp [1] C. Yang et al., A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud, IEEE Trans. Parallel Distrib. Sys., vol. 26, no. 2, 215, pp Processing time (s) Result values Waiting time (s) Figure 6. Simulation results: a) processing time with different reconstruction interval and solution space size; b) change of highest founded result with time; and c) waiting time of data when average data processing time changes. [11] R. Mao et al., Overcoming the Challenge of Variety: Big Data Abstraction, the Next Evolution of Data Management for AAL Communication Systems, IEEE Commun. Mag., vol. 53, no. 1, Jan. 215, pp [12] A. R. M. Forkan et al., BDCaM: Big Data for Context-aware Monitoring A Personalized Knowledge Discovery Framework for Assisted Healthcare, IEEE Trans. Cloud Comp., vol. PP, no. 99, 215, pp [13] S. Prakash, H. L. Yann, and T. Johnson, A Nonblocking Algorithm for Shared Queues Using Compare-and-Swap, IEEE Trans. Comp., vol. 43, no. 5, 1994, pp [14] K. Wang et al., LDPA: A Local Data Processing Architecture in Ambient Assisted Living Communications, IEEE Commun. Mag., vol. 53, no. 1, Jan. 215, pp [15] H. A. Guvenir, B. Acar and H. Muderrisoglu, Arrhythmia Data Set in UCI Machine Learning Repository, UC Irvine, 1998; uci.edu/ml/datasets/arrhythmia. Biographies Reconstruction interval (s) (a) Solution space size Time (s) (b) Kun Wang [M] is an associate professor in the School of Internet of Things, Nanjing University Posts and Telecommunications, China. He received his Ph.D. degree from the School of Computers, Nanjing University of Posts and Telecommunications in 29 and was a postdoctoral fellow in the Electrical Engineering Department, University of California, Los Angeles (UCLA) from 213 to 214. He has published over 5 papers in related international conferences and journals, including IEEE Transactions on Industrial Informat RVNS FIFO 2 4 RVNS FIFO Average processing time (s) (c) 1 IEEE Network January/February

7 ics, the IEEE Sensors Journal, IEEE Communications Magazine, IEEE GLOBE- COM, and IEEE ICC. His current research interests include wireless sensor networks, delay-tolerant metworks, stream computing, ubiquitous computing, mobile cloud computing, and information security technologies. He is a member of ACM. Yun Shao is a postgraduate student in the Viterbi School of Engineering, Department of Computer Science, University of Southern California (USC). He received his Bachelor s degree at Nanjing University of Posts and Telecommunications. His current research interests include wireless sensor networks, delay-tolerant networks, and stream computing. Lei Shu [M] (lei.shu@live.ie) received his Ph.D. degree from the Digital Enterprise Research Institute, National University of Ireland, Galway, in 21. Until March 212, he was a specially assigned researcher in the Department of Multimedia Engineering, Graduate School of Information Science and Technology, Osaka University, Japan. In October 212, he joined Guangdong University of Petrochemical Technology, China, as a full professor. In 213, he started to serve at Dalian University of Technology as a Ph.D supervisor. Meanwhile, he is also working as vice director of the Guangdong Provincial Key Laboratory of Petrochemical Equipment Fault Diagnosis, China. He is the founder of the Industrial Security and Wireless Sensor Networks Lab. His research interests include wireless sensor networks, multimedia communication, middleware, and security. He was awarded the IEEE GLOBECOM 21 and ICC 213 Best Paper Awards. He has been serving as Editor in Chief for IEEE CommSoft E-letter and EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. Chunsheng Zhu received his B.E. degree in network engineering from Dalian University of Technology in June 21 and his M.Sc. degree in computer science from St. Francis Xavier University, Antigonish, Nova Scotia, Canada, in May 212. He has been working toward his Ph.D. degree in the Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, since September 212. He has around 4 papers published or accepted by refereed international journals (e.g., IEEE Transactions on Industrial Electronics, IEEE Systems Journal) and conferences (e.g., IEEE ICC). His current research interests are mainly in the areas of wireless sensor networks and mobile cloud computing. Yan Zhang [SM] is currently head of the Department of Networks at Simula Research Laboratory, Norway, and an associate professor (part-time) at the Department of Informatics, University of Oslo, Norway. He received a Ph.D. degree from the School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore. He is an Associate Editor or on the Editorial Boards of a number of well-established scientific international journals, such as Wiley Wireless Communications and Mobile Computing. He has also served as a Guest Editor for IEEE Transactions on Smart Grid, IEEE Transactions on Industrial Informatics, IEEE Communications Magazine, IEEE Wireless Communications, and IEEE Transactions on Dependable and Secure Computing. He has served or is serving as Chair of a number of conferences, including IEEE PIMRC 216, IEEE CCNC 216, WICON 216, IEEE SmartGridComm 215, and IEEE CloudCom 215. He has served as a TPC member for numerous international conference including IEEE INFOCOM, IEEE ICC, IEEE GLOBECOM, and IEEE WCNC. His current research interest include wireless networks and reliable and secure cyber-physical systems (e.g., healthcare, transport, smart grid). He has received seven Best Paper Awards. 42 IEEE Network January/February 216

Multi-Method Data Delivery for Green Sensor-Cloud

Multi-Method Data Delivery for Green Sensor-Cloud Green Communications and Computing Multi-Method Data Delivery for Green Sensor-Cloud Chunsheng Zhu, Victor C. M. Leung, Kun Wang, Laurence T. Yang, and Yan Zhang The authors discuss the potential applications

More information

Collaborative Next Generation Networking

Collaborative Next Generation Networking CALL-FOR-PAPERS ACM/Springer Mobile Networks & Applications (MONET) http://link.springer.com/journal/11036 SPECIAL ISSUE ON Collaborative Next Generation Networking Overview: To catch up with the ever-increasing

More information

Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City

Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City Emerging Trends, Issues, and Challenges in Big Data and Its Implementation toward Future Smart Cities Secure Multimedia Big Data in Trust-Assisted Sensor- for Smart City Chunsheng Zhu, Lei Shu, Victor

More information

Call for Papers for Communication QoS, Reliability and Modeling Symposium

Call for Papers for Communication QoS, Reliability and Modeling Symposium Call for Papers for Communication QoS, Reliability and Modeling Symposium Scope and Motivation: In modern communication networks, different technologies need to cooperate with each other for end-to-end

More information

An Improved Spray and Wait Algorithm based on RVNS in Delay Tolerant Mobile Sensor Networks

An Improved Spray and Wait Algorithm based on RVNS in Delay Tolerant Mobile Sensor Networks An Improved Spray and Wait Algorithm based on RVNS in Delay Tolerant Mobile Sensor Networks Kun Wang1,3, Yun Shao1, Lei Shu2, Yanfei Sun1, and Lei He3 1 Nanjing University of Posts and Telecommunications,

More information

Software Defined Networking for Flexible and Green Energy Internet

Software Defined Networking for Flexible and Green Energy Internet Integrated Communications, Control, and Computing Technologies for Enabling Autonomous Smart Grid Software Defined Networking for Flexible and Green Energy Internet Weifeng Zhong, Rong Yu, Shengli Xie,

More information

Cost Based Efficient Routing for Wireless Body Area Networks

Cost Based Efficient Routing for Wireless Body Area Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks 1 T.R.Gopalakrishnan Nair (SM-IEEE), 2 R. Selvarani, 3 Vaidehi M. 1 Director Research & Industry

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Decision analysis of the weather log by Hadoop

Decision analysis of the weather log by Hadoop Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 2016) Decision analysis of the weather log by Hadoop Hao Wu Department

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

Intelligent Operations Utilizing IT to Accelerate Social Innovation

Intelligent Operations Utilizing IT to Accelerate Social Innovation 324 Hitachi Review Vol. 63 (2014), No. 6 Featured Articles Operations Utilizing IT to Accelerate Social Innovation Toshiyuki Moritsu, Ph.D. Keiko Fukumoto Junji Noguchi, Ph.D. Takeshi Ishizaki Katsuya

More information

Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2

Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2 International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1,

More information

ITS (Intelligent Transportation Systems) Solutions

ITS (Intelligent Transportation Systems) Solutions Special Issue Advanced Technologies and Solutions toward Ubiquitous Network Society ITS (Intelligent Transportation Systems) Solutions By Makoto MAEKAWA* Worldwide ITS goals for safety and environment

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space Distortion

Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space Distortion Multimedia Big Data Frame Combination Storage Strategy Based on Virtual Space https://doi.org/0.399/ijoe.v3i02.66 Jian Luo Zhejiang Technical Institute of Economics, Hangzhou Zhejiang, China jiansluo@yahoo.com

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing Sung Ho Jang, Tae Young Kim, Jae Kwon Kim and Jong Sik Lee School of Information Engineering Inha University #253, YongHyun-Dong,

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

The Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network

The Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network Applied Mechanics and Materials Submitted: 2014-06-18 ISSN: 1662-7482, Vol. 665, pp 674-678 Accepted: 2014-07-31 doi:10.4028/www.scientific.net/amm.665.674 Online: 2014-10-01 2014 Trans Tech Publications,

More information

Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines

Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines The Scientific World Journal Volume 2013, Article ID 596724, 6 pages http://dx.doi.org/10.1155/2013/596724 Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines Weizhe

More information

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang

More information

ITEE Journal. Information Technology & Electrical Engineering

ITEE Journal. Information Technology & Electrical Engineering An Overview of QoE for 5G Networks 1 Hajra Masood, 2 Safdar Rizvi, 3 Bilal Muhammad Iqbal Department of Computer Sciences, Bahria University, Karachi, Pakistan E-mail: 1 Hajra.cs@gmail.com, 2 dr.safdar@bimcs.edu.pk,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

APPLICATION OF DYNAMIC CLUSTERING ALGORITHM IN MEDICAL SURVEILLANCE

APPLICATION OF DYNAMIC CLUSTERING ALGORITHM IN MEDICAL SURVEILLANCE APPLICATION OF DYNAMIC CLUSTERING ALGORITHM IN MEDICAL SURVEILLANCE Zhuohui Ren 1 and Cong Wang 2 1 Department of Software Engineering, Beijing University of Posts and Telecommunications, BeiJing City,

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks

Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1133 1140 2012 International Conference on Solid State Devices and Materials Science Improvement of AODV Routing Protocol with QoS

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Evaluation of traffic dispersion methods for synchronous distributed multimedia data transmission on multiple links for group of mobile hosts

Evaluation of traffic dispersion methods for synchronous distributed multimedia data transmission on multiple links for group of mobile hosts Int. J. Applied Systemic Studies, Vol. 3, No. 1, 2010 89 Evaluation of traffic dispersion methods for synchronous distributed multimedia data transmission on multiple links for group of mobile hosts Yoshia

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Towards (More) Data Science in Communication Networks NetSys KuVS Preisverleihung - Presentation

Towards (More) Data Science in Communication Networks NetSys KuVS Preisverleihung - Presentation Towards (More) Data Science in Communication Networks NetSys 2017 - KuVS Preisverleihung - Presentation Andreas Schmidt, MSc Telecommunications Lab Saarland Informatics Campus - Saarbrücken March 15, 2017

More information

A Fault Tolerant Approach for WSN Chain Based Routing Protocols

A Fault Tolerant Approach for WSN Chain Based Routing Protocols International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 27 32 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A Fault

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS

MOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

A Fault-recovery Routing Approach for Loop-based Clustering WSN

A Fault-recovery Routing Approach for Loop-based Clustering WSN A Fault-recovery Routing Approach for Loop-based Clustering WSN Ming Xu 1, Shengdong Zhang 1, Jiannong Cao 2, Xiaoxing Guo 3 ( 1 School of Computer, National Univ. of Defense Technology, Changsha, China)

More information

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017

Discover Viterbi: Computer Science, Cyber Security & Informatics Programs. Viterbi School of Engineering University of Southern California Fall 2017 Discover Viterbi: Computer Science, Cyber Security & Informatics Programs Viterbi School of Engineering University of Southern California Fall 2017 WebEx Quick Facts Will I be able to get a copy of the

More information

ISSN: [Powar * et al., 7(6): June, 2018] Impact Factor: 5.164

ISSN: [Powar * et al., 7(6): June, 2018] Impact Factor: 5.164 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ROUTING TECHNIQUES FOR ENERGY EFFICIENT PROTOCOL OF UNDERWATER WIRELESS SENSOR NETWORK (UWSN) IN THE INTERNET OF UNDERWATER THINGS

More information

An Introduction to Cyber-Physical Systems INF5910/INF9910

An Introduction to Cyber-Physical Systems INF5910/INF9910 An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More

More information

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

Service-Oriented Middleware for Smart Grid: Principle, Infrastructure, and Application

Service-Oriented Middleware for Smart Grid: Principle, Infrastructure, and Application ULTIMATE TECHNOLOGIES AND ADVANCES FOR FUTURE SMART GRID UTASG Service-Oriented Middleware for Smart Grid: Principle, Infrastructure, and Application Liang Zhou, Nanjing University of Posts and Telecommunications

More information

A RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE

A RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE A RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE Chris Mattmann University of Southern California University Park Campus, Los Angeles, CA 90007 mattmann@usc.edu

More information

Analysis Range-Free Node Location Algorithm in WSN

Analysis Range-Free Node Location Algorithm in WSN International Conference on Education, Management and Computer Science (ICEMC 2016) Analysis Range-Free Node Location Algorithm in WSN Xiaojun Liu1, a and Jianyu Wang1 1 School of Transportation Huanggang

More information

Mubug: a mobile service for rapid bug tracking

Mubug: a mobile service for rapid bug tracking . MOO PAPER. SCIENCE CHINA Information Sciences January 2016, Vol. 59 013101:1 013101:5 doi: 10.1007/s11432-015-5506-4 Mubug: a mobile service for rapid bug tracking Yang FENG, Qin LIU *,MengyuDOU,JiaLIU&ZhenyuCHEN

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation

A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation , pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,

More information

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need

More information

Network Processing Technology for Terminals Enabling High-quality Services

Network Processing Technology for Terminals Enabling High-quality Services : Services for Hikari Era: Terminal Component Technologies Network Processing Technology for Terminals Enabling High-quality Services Yukikuni Nishida and Keiichi Koike Abstract This article describes

More information

An Energy-Efficient Technique for Processing Sensor Data in Wireless Sensor Networks

An Energy-Efficient Technique for Processing Sensor Data in Wireless Sensor Networks An Energy-Efficient Technique for Processing Sensor Data in Wireless Sensor Networks Kyung-Chang Kim 1,1 and Choung-Seok Kim 2 1 Dept. of Computer Engineering, Hongik University Seoul, Korea 2 Dept. of

More information

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network Send Orders for Reprints to reprints@benthamscience.ae 690 The Open Electrical & Electronic Engineering Journal, 2014, 8, 690-694 Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation

More information

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017

White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 White Paper: Next generation disaster data infrastructure CODATA LODGD Task Group 2017 Call for Authors This call for authors seeks contributions from academics and scientists who are in the fields of

More information

The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN

The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN 2017 5th International Conference on Enterprise Systems The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN Weilan Lin linweilan@gz.sia.cn Shuangfei Zi zishuangfei@gz.sia.cn Zhiyi Fan Department

More information

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,

More information

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Mobile Health Monitoring Based On New Power Management Approach

Mobile Health Monitoring Based On New Power Management Approach Mobile Health Monitoring Based On New Power Management Approach R.Kanimozhi 1, M.Suguna 2 Department of Information Technology, SNS College of Technology, Coimbatore, Tamilnadu, India 1, 2 ABSTRACT- Mobile

More information

Message Processing at Integrated PHD Gateways for Servicing Various PHDs

Message Processing at Integrated PHD Gateways for Servicing Various PHDs , pp.367-374 http://dx.doi.org/10.14257/ijmue.2014.9.3.35 Message Processing at Integrated PHD Gateways for Servicing Various PHDs KeeHyun Park and Seunghyeon Lim Department of Computer Engineering, Keimyung

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network. A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks Yuxin Mao School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, P.R

More information

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

More information

IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014

IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014 IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014 DLT Planning This was my first DLT (Distinguished Lecture

More information

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake Mobile Information Systems 5 (009) 3 DOI 0.333/MIS-009-0070 IOS Press A new MAC protocol for reducing effect of needless transmission deferment induced by missed / handshake Tetsuya Shigeyasu a, Daishi

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian Evaluation of Power Aware Routing Protocols Mohammad Mahmud Wireless Networks Professor: Dr. Lijun Qian Power Aware Routing In a typical network, the route of a packet will be determined by calculating

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Real-time Calculating Over Self-Health Data Using Storm Jiangyong Cai1, a, Zhengping Jin2, b

Real-time Calculating Over Self-Health Data Using Storm Jiangyong Cai1, a, Zhengping Jin2, b 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Real-time Calculating Over Self-Health Data Using Storm Jiangyong Cai1, a, Zhengping Jin2, b 1

More information

Text Clustering Incremental Algorithm in Sensitive Topic Detection

Text Clustering Incremental Algorithm in Sensitive Topic Detection International Journal of Information and Communication Sciences 2018; 3(3): 88-95 http://www.sciencepublishinggroup.com/j/ijics doi: 10.11648/j.ijics.20180303.12 ISSN: 2575-1700 (Print); ISSN: 2575-1719

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

An overview of infrastructures and data managers for dependable sensor networks

An overview of infrastructures and data managers for dependable sensor networks EYEWIRE An overview of infrastructures and data managers for dependable sensor networks This article describes issues and challenges for secure sensor information management. In particular, we will discuss

More information

Research on adaptive network theft Trojan detection model Ting Wu

Research on adaptive network theft Trojan detection model Ting Wu International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 215) Research on adaptive network theft Trojan detection model Ting Wu Guangdong Teachers College of Foreign

More information

Approaches to Green Networks

Approaches to Green Networks Approaches to Green Networks Mitsuaki Kakemizu Akira Chugo (Manuscript received March 26, 2009) Communication networks show promise as a means of reducing carbon dioxide emissions. However, as networks

More information

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey Journal of Computer Science 7 (1): 114-119, 2011 ISSN 1549-3636 2011 Science Publications Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey K. Indra Gandhi and

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

O&M Service for Sustainable Social Infrastructure

O&M Service for Sustainable Social Infrastructure O&M Service for Sustainable Social Infrastructure Hitachi Review Vol. 62 (2013), No. 7 370 Toshiyuki Moritsu, Ph. D. Takahiro Fujishiro, Ph. D. Katsuya Koda Tatsuya Kutsuna OVERVIEW: Hitachi is developing

More information

Effective Data Transmission in Distributed Visual Sensor Systems

Effective Data Transmission in Distributed Visual Sensor Systems Wei Song Effective Data Transmission in Distributed Visual Sensor Systems Wei Song (weisong@cs.brown.edu) Abstract: Objective of this research project is to design an effective and stable data transmission

More information

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks

An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks An Energy Efficient Coverage Method for Clustered Wireless Sensor Networks J. Shanbehzadeh, M. Mehrani, A. Sarrafzadeh, and Z. Razaghi Abstract an important issue in WSN is the regional covering. A coverage

More information

Distributed Service Discovery Algorithm Based on Ant Colony Algorithm

Distributed Service Discovery Algorithm Based on Ant Colony Algorithm 70 JOURNAL OF SOFTWARE, VOL. 9, NO. 1, JANUARY 2014 Distributed Service Discovery Algorithm Based on Ant Colony Algorithm Chijun Zhang College of Management Science and Information Engineering, Jilin University

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

Study ON Remote Medical Monitoring System Based ON MSP430 AND CC2530

Study ON Remote Medical Monitoring System Based ON MSP430 AND CC2530 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) Study ON Remote Medical Monitoring System Based ON MSP430 AND CC2530 SONG Aijuan, SI Guangyuan, GU Qiongchan

More information

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks

Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks Mohammad Mehrani, Ali Shaeidi, Mohammad Hasannejad, and Amir Afsheh Abstract Routing is one of the most important issues

More information

AYAN MONDAL ayan.mondal/

AYAN MONDAL ayan.mondal/ AYAN MONDAL +91-7872773669 mondalayan12@gmail.com, ayanmondal@iitkgp.ac.in http://cse.iitkgp.ac.in/ ayan.mondal/ Present Address Kharagpur - 721302 India Permanent Address Ashrampara (Teachers Colony)

More information

Research on Control Routing Technology in Communication Network

Research on Control Routing Technology in Communication Network Appl. Math. Inf. Sci. 6 No. 1S pp. 129S-133S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Research on Control Routing Technology

More information

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1

Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Acta Technica 62 No. 3B/2017, 141 148 c 2017 Institute of Thermomechanics CAS, v.v.i. Fast K-nearest neighbors searching algorithms for point clouds data of 3D scanning system 1 Zhang Fan 2, 3, Tan Yuegang

More information

Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things

Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things Zheng Yue-zhai and Chen Xiao-ying Abstract With the development of network and communication technology, this article

More information

3 log 2 B Fiber Delay Lines

3 log 2 B Fiber Delay Lines Constructing Optical LIFO Buffers of Size B with 3 log 2 B Fiber Delay Lines Xiaoliang Wang, Xiaohong Jiang Graduate School of Information Sciences Tohoku University Sendai, Japan 980-8579 Email: {waxili,jiang}@ecei.tohoku.ac.jp

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information

More information

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1,

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS Saraswati Mishra 1 and Prabhjot Kaur 2 Department of Electrical, Electronics and Communication Engineering,

More information