Dalhousie University

Displaying 1-28 of 28 results

  • White Papers // Apr 2013

    On Modeling Geometric Joint Sink Mobility with Delay-Tolerant Cluster-Less Wireless Sensor Networks

    Moving Sink (MS) in Wireless Sensor Networks (WSNs) has appeared as a blessing because it collects data directly from the nodes where the concept of relay nodes is becomes obsolete. There are, however, a few challenges to be taken care of, like data delay tolerance and trajectory of MS which...

    Provided By Dalhousie University

  • White Papers // Apr 2013

    Analyzing Delay in Wireless Multi-hop Heterogeneous Body Area Networks

    With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g., Electro CardioGram (ECG), Electro EncephaloGram (EEG), ElectroNystagmoGraphy (ENG) etc....

    Provided By Dalhousie University

  • White Papers // Apr 2013

    Analyzing Medium Access Techniques in Wireless Body Area Network

    In this paper, the authors presents comparison of access techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA...

    Provided By Dalhousie University

  • White Papers // Apr 2013

    HEER: Hybrid Energy Efficient Reactive Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed data to base station. Energy conservation is an important issue for sensor nodes as they have limited power. Many routing protocols have been proposed earlier for energy efficiency of both homogeneous and heterogeneous environments. The authors can prolong their...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    Towards LP Modeling for Maximizing Throughput and Minimizing Routing Delay in Proactive Protocols in Wireless Multi-hop Networks

    Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP-models) for WMhNs. In WMhNs, different routing protocols are...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks

    In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users' demands. In this paper, the authors present Linear Programming models (LP models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP models over reactive protocols, they...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    Density Controlled Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks

    Cluster based routing technique is most popular routing technique in Wireless Sensor Networks (WSNs). Due to varying need of WSN applications efficient energy utilization in routing protocols is still a potential area of research. In this paper, the authors introduced a new energy efficient cluster based routing technique. In this...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    SRP-MS: A New Routing Protocol for Delay Tolerant Wireless Sensor Networks

    Sink Mobility is becoming popular due to excellent load balancing between nodes and ultimately resulting in prolonged network lifetime and throughput. A major challenge is to provide reliable and energy-efficient operations are to be taken into consideration for different mobility patterns of sink. Aim of this paper is lifetime maximization...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    E-HORM: An Energy-Efficient Hole Removing Mechanism in Wireless Sensor Networks

    Cluster based routing protocols for Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holes are created due to quickly drain the energy of a few nodes due to non-uniform node...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    EAST: Energy-Efficient Adaptive Scheme for Transmission in Wireless Sensor Networks

    In this paper, the authors propose Energy-efficient Adaptive Scheme for Transmission (EAST) in WSNs. EAST is IEEE 802.15.4 standard compliant. In this approach, open-loop is used for temperature-aware link quality estimation and compensation. Whereas, closed-loop feedback helps to divide network into three logical regions to minimize overhead of control packets...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    Energy Efficient MAC Protocols in Wireless Body Area Sensor Networks - A Survey

    In this paper, the authors presented an analytically discussion about energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). For this purpose, different energy efficient MAC protocols with their respective energy optimization techniques; Low Power Listening (LPL), scheduled contention and Time Division Multiple Access...

    Provided By Dalhousie University

  • White Papers // Jan 2013

    Multi-GPU Computing for Achieving Speedup in Real-time Aggregate Risk Analysis

    Stochastic simulation techniques employed for portfolio risk analysis often referred to as Aggregate Risk Analysis, can benefit from exploiting state-of-the-art high-performance computing platforms. In this paper, the authors propose parallel methods to speedup aggregate risk analysis for supporting real-time pricing. To achieve this an algorithm for analyzing aggregate risk is...

    Provided By Dalhousie University

  • White Papers // Dec 2012

    On Link Availability Probability of Routing Protocols for Urban Scenario in VANETs

    This paper presents the link availability probability. The authors evaluate and compare the link availability probability for routing protocols; Ad hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) for different number of connections and node density. A novel contribution of this work is enhancement...

    Provided By Dalhousie University

  • White Papers // Dec 2012

    On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using 802.11 and 802.11p

    Mobile Ad-hoc NETworks (MANETs) comprise on wireless mobile nodes that are communicating with each other without any infrastructure. Vehicular Ad-hoc NETwork (VANET) is a special type of MANETs in which vehicles with high mobility need to communicate with each other. In this paper, the authors present a novel framework for...

    Provided By Dalhousie University

  • White Papers // Dec 2012

    TSEP: Threshold-Sensitive Stable Election Protocol for WSNs

    Wireless Sensor Networks (WSNs) are expected to find wide applicability and increasing deployment in near future. In this paper, the authors propose a new protocol, Threshold Sensitive Stable Election Protocol (TSEP), which is reactive protocol using three levels of heterogeneity. Reactive networks, as opposed to proactive networks, respond immediately to...

    Provided By Dalhousie University

  • White Papers // Aug 2012

    Privacy Preservation for Smart Grid Multicast Via Hybrid Group Key Scheme

    Privacy preservation is a crucial issue for smart grid security. With more and more group applications, data and appliances proliferated in smart grid, electricity customers are faced with extended privacy risks. Meanwhile, the natures of smart grid - such as limitation in computation power of smart meters, requirement to be...

    Provided By Dalhousie University

  • White Papers // Jun 2012

    A Platform for Parallel R-Based Analytics on Cloud Infrastructure

    Analytical workloads abound in application domains ranging from computational finance and risk analytics to engineering and manufacturing settings. In this paper, the authors describe a Platform for Parallel R-based Analytics on the Cloud (P2RAC). The goal of this platform is to allow an Analyst to take a simulation or optimization...

    Provided By Dalhousie University

  • White Papers // May 2012

    Relay Selection in Network Coded Communications With Power Control

    This paper is concerned with the computationally efficient selection of relays and assignment of transmit power values in wireless networks deploying cooperating nodes. The objective is to minimize the transmitted power required to exchange the data between two nodes. Specifically, the design of routing protocols with multiple store-and-forward relays along...

    Provided By Dalhousie University

  • White Papers // Apr 2012

    Hardware Performance Evaluation of SHA-3 Candidate Algorithms

    Secure Hashing Algorithms (SHA) showed a significant importance in today's information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions. In this paper, the authors present...

    Provided By Dalhousie University

  • White Papers // Mar 2012

    Modeling and Evaluating Enhancements in Expanding Ring Search Algorithm For wireless Reactive Protocols

    WMhNs provides accessibility to the users in different rates of nodes' mobilities and densities. Routing protocols operated on WMhNs are responsible for calculating efficient end-to-end paths. There are two categories of routing protocols; reactive and proactive, based on their routing behavior. Bandwidth is a critical issue of wireless networks which...

    Provided By Dalhousie University

  • White Papers // Mar 2012

    On Using Multiple Quality Link Metrics with Destination Sequenced Distance Vector Protocol For wireless Multi-Hop Networks

    In this paper, the authors compare and analyze performance of five quality link metrics for Wireless Multi-hop Networks (WMhNs). The metrics are based on loss probability measurements; ETX, ETT, InvETX, ML and MD, in a distance vector routing protocol; DSDV. Among these selected metrics, they have implemented ML, MD, InvETX...

    Provided By Dalhousie University

  • White Papers // Feb 2012

    Evaluating Wireless Proactive Routing Protocols Under Scalability and Traffic Constraints

    In this paper, the authors evaluate and analyze the impact of different network loads and varying no. of nodes on distance vector and link state routing algorithms. They select three well known proactive protocols; Destination Sequenced Distance Vector (DSDV) operates on distance vector routing, while Fisheye State Routing (FSR) and...

    Provided By Dalhousie University

  • White Papers // Jul 2011

    Semantic Web Services for Ocean Knowledge Management

    The authors present a web-services based e-research platform to support scientific research about oceans and marine life. The featured Platform for Ocean Knowledge Management (POKM) employs a services-oriented approach to offer a suite of web services to support the handling, filtering and visualization of large-scale marine-life and ocean data sets....

    Provided By Dalhousie University

  • White Papers // Jul 2011

    Ontology Modeling for Oceans Knowledge and Data Management

    The authors present a knowledge modeling solution for representing knowledge about oceans and marine life. Taking a knowledge management approach, they have employed semantic web technologies to model both the domain knowledge and the service descriptions in terms of domain and service ontologies. They present details of the domain and...

    Provided By Dalhousie University

  • White Papers // Jul 2011

    Heuristics for Evaluating IT Security Management Tools

    The usability of IT Security Management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and collaborative context that involves diverse stakeholders. The authors propose a set of ITSM usability...

    Provided By Dalhousie University

  • White Papers // Oct 2008

    Knowledge Management and International Organizations: Perspectives on Information Professionals' Role

    The rapid evolution of information and communication technology in recent years has seen knowledge management become a key tool for the success of a variety of institutions. Many international organizations have developed knowledge management programs as key to their future development strategies. The number of international organizations that have identified...

    Provided By Dalhousie University

  • White Papers // Dec 2007

    SPOT: A System for Detecting Projected Outliers From High-dimensional Data Streams

    In this paper, the authors present a new technique, called Stream Projected Ouliter deTector (SPOT), to deal with outlier detection problem in high-dimensional data streams. SPOT is unique in a number of aspects. SPOT employs a novel window-based time model and decaying cell summaries to capture statistics from the data...

    Provided By Dalhousie University

  • White Papers // Jun 2007

    Adaptive Tuple Differential Coding

    It is desirable to employ compression techniques in Relational OLAP systems to reduce disk space requirements and increase disk I/O throughput. Tuple Differential Coding (TDC) techniques have been introduced to compress views on a tuple level by storing only the differences between consecutive ordered tuples. These techniques work well for...

    Provided By Dalhousie University

  • White Papers // Apr 2013

    On Modeling Geometric Joint Sink Mobility with Delay-Tolerant Cluster-Less Wireless Sensor Networks

    Moving Sink (MS) in Wireless Sensor Networks (WSNs) has appeared as a blessing because it collects data directly from the nodes where the concept of relay nodes is becomes obsolete. There are, however, a few challenges to be taken care of, like data delay tolerance and trajectory of MS which...

    Provided By Dalhousie University

  • White Papers // Jun 2012

    A Platform for Parallel R-Based Analytics on Cloud Infrastructure

    Analytical workloads abound in application domains ranging from computational finance and risk analytics to engineering and manufacturing settings. In this paper, the authors describe a Platform for Parallel R-based Analytics on the Cloud (P2RAC). The goal of this platform is to allow an Analyst to take a simulation or optimization...

    Provided By Dalhousie University

  • White Papers // Jul 2011

    Semantic Web Services for Ocean Knowledge Management

    The authors present a web-services based e-research platform to support scientific research about oceans and marine life. The featured Platform for Ocean Knowledge Management (POKM) employs a services-oriented approach to offer a suite of web services to support the handling, filtering and visualization of large-scale marine-life and ocean data sets....

    Provided By Dalhousie University

  • White Papers // Jul 2011

    Ontology Modeling for Oceans Knowledge and Data Management

    The authors present a knowledge modeling solution for representing knowledge about oceans and marine life. Taking a knowledge management approach, they have employed semantic web technologies to model both the domain knowledge and the service descriptions in terms of domain and service ontologies. They present details of the domain and...

    Provided By Dalhousie University

  • White Papers // Jul 2011

    Heuristics for Evaluating IT Security Management Tools

    The usability of IT Security Management (ITSM) tools is hard to evaluate by regular methods, making heuristic evaluation attractive. However, standard usability heuristics are hard to apply as IT security management occurs within a complex and collaborative context that involves diverse stakeholders. The authors propose a set of ITSM usability...

    Provided By Dalhousie University

  • White Papers // Mar 2012

    Modeling and Evaluating Enhancements in Expanding Ring Search Algorithm For wireless Reactive Protocols

    WMhNs provides accessibility to the users in different rates of nodes' mobilities and densities. Routing protocols operated on WMhNs are responsible for calculating efficient end-to-end paths. There are two categories of routing protocols; reactive and proactive, based on their routing behavior. Bandwidth is a critical issue of wireless networks which...

    Provided By Dalhousie University

  • White Papers // Mar 2012

    On Using Multiple Quality Link Metrics with Destination Sequenced Distance Vector Protocol For wireless Multi-Hop Networks

    In this paper, the authors compare and analyze performance of five quality link metrics for Wireless Multi-hop Networks (WMhNs). The metrics are based on loss probability measurements; ETX, ETT, InvETX, ML and MD, in a distance vector routing protocol; DSDV. Among these selected metrics, they have implemented ML, MD, InvETX...

    Provided By Dalhousie University

  • White Papers // Feb 2012

    Evaluating Wireless Proactive Routing Protocols Under Scalability and Traffic Constraints

    In this paper, the authors evaluate and analyze the impact of different network loads and varying no. of nodes on distance vector and link state routing algorithms. They select three well known proactive protocols; Destination Sequenced Distance Vector (DSDV) operates on distance vector routing, while Fisheye State Routing (FSR) and...

    Provided By Dalhousie University

  • White Papers // May 2012

    Relay Selection in Network Coded Communications With Power Control

    This paper is concerned with the computationally efficient selection of relays and assignment of transmit power values in wireless networks deploying cooperating nodes. The objective is to minimize the transmitted power required to exchange the data between two nodes. Specifically, the design of routing protocols with multiple store-and-forward relays along...

    Provided By Dalhousie University

  • White Papers // Dec 2012

    On Link Availability Probability of Routing Protocols for Urban Scenario in VANETs

    This paper presents the link availability probability. The authors evaluate and compare the link availability probability for routing protocols; Ad hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Fisheye State Routing (FSR) for different number of connections and node density. A novel contribution of this work is enhancement...

    Provided By Dalhousie University

  • White Papers // Dec 2012

    On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using 802.11 and 802.11p

    Mobile Ad-hoc NETworks (MANETs) comprise on wireless mobile nodes that are communicating with each other without any infrastructure. Vehicular Ad-hoc NETwork (VANET) is a special type of MANETs in which vehicles with high mobility need to communicate with each other. In this paper, the authors present a novel framework for...

    Provided By Dalhousie University

  • White Papers // Dec 2012

    TSEP: Threshold-Sensitive Stable Election Protocol for WSNs

    Wireless Sensor Networks (WSNs) are expected to find wide applicability and increasing deployment in near future. In this paper, the authors propose a new protocol, Threshold Sensitive Stable Election Protocol (TSEP), which is reactive protocol using three levels of heterogeneity. Reactive networks, as opposed to proactive networks, respond immediately to...

    Provided By Dalhousie University

  • White Papers // Aug 2012

    Privacy Preservation for Smart Grid Multicast Via Hybrid Group Key Scheme

    Privacy preservation is a crucial issue for smart grid security. With more and more group applications, data and appliances proliferated in smart grid, electricity customers are faced with extended privacy risks. Meanwhile, the natures of smart grid - such as limitation in computation power of smart meters, requirement to be...

    Provided By Dalhousie University

  • White Papers // Apr 2013

    Analyzing Delay in Wireless Multi-hop Heterogeneous Body Area Networks

    With increase in ageing population, health care market keeps growing. There is a need for monitoring of health issues. Wireless Body Area Network (WBAN) consists of wireless sensors attached on or inside human body for monitoring vital health related problems e.g., Electro CardioGram (ECG), Electro EncephaloGram (EEG), ElectroNystagmoGraphy (ENG) etc....

    Provided By Dalhousie University

  • White Papers // Apr 2013

    Analyzing Medium Access Techniques in Wireless Body Area Network

    In this paper, the authors presents comparison of access techniques used in Medium Access Control (MAC) protocol for Wireless Body Area Networks (WBANs). Comparison is performed between Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), Pure ALOHA and Slotted ALOHA...

    Provided By Dalhousie University

  • White Papers // Apr 2013

    HEER: Hybrid Energy Efficient Reactive Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of numerous sensors which send sensed data to base station. Energy conservation is an important issue for sensor nodes as they have limited power. Many routing protocols have been proposed earlier for energy efficiency of both homogeneous and heterogeneous environments. The authors can prolong their...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    Towards LP Modeling for Maximizing Throughput and Minimizing Routing Delay in Proactive Protocols in Wireless Multi-hop Networks

    Wireless Multi-hop Networks (WMhNs) provide users with the facility to communicate while moving with whatever the node speed, the node density and the number of traffic flows they want, without any unwanted delay and/or disruption. This paper contributes Linear Programming models (LP-models) for WMhNs. In WMhNs, different routing protocols are...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks

    In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users' demands. In this paper, the authors present Linear Programming models (LP models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP models over reactive protocols, they...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    Density Controlled Divide-and-Rule Scheme for Energy Efficient Routing in Wireless Sensor Networks

    Cluster based routing technique is most popular routing technique in Wireless Sensor Networks (WSNs). Due to varying need of WSN applications efficient energy utilization in routing protocols is still a potential area of research. In this paper, the authors introduced a new energy efficient cluster based routing technique. In this...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    SRP-MS: A New Routing Protocol for Delay Tolerant Wireless Sensor Networks

    Sink Mobility is becoming popular due to excellent load balancing between nodes and ultimately resulting in prolonged network lifetime and throughput. A major challenge is to provide reliable and energy-efficient operations are to be taken into consideration for different mobility patterns of sink. Aim of this paper is lifetime maximization...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    E-HORM: An Energy-Efficient Hole Removing Mechanism in Wireless Sensor Networks

    Cluster based routing protocols for Wireless Sensor Networks (WSNs) have been widely used for better performance in terms of energy efficiency. Efficient use of energy is challenging task of designing these protocols. Energy holes are created due to quickly drain the energy of a few nodes due to non-uniform node...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    EAST: Energy-Efficient Adaptive Scheme for Transmission in Wireless Sensor Networks

    In this paper, the authors propose Energy-efficient Adaptive Scheme for Transmission (EAST) in WSNs. EAST is IEEE 802.15.4 standard compliant. In this approach, open-loop is used for temperature-aware link quality estimation and compensation. Whereas, closed-loop feedback helps to divide network into three logical regions to minimize overhead of control packets...

    Provided By Dalhousie University

  • White Papers // Mar 2013

    Energy Efficient MAC Protocols in Wireless Body Area Sensor Networks - A Survey

    In this paper, the authors presented an analytically discussion about energy efficiency of Medium Access Control (MAC) protocols for Wireless Body Area Sensor Networks (WBASNs). For this purpose, different energy efficient MAC protocols with their respective energy optimization techniques; Low Power Listening (LPL), scheduled contention and Time Division Multiple Access...

    Provided By Dalhousie University

  • White Papers // Jun 2007

    Adaptive Tuple Differential Coding

    It is desirable to employ compression techniques in Relational OLAP systems to reduce disk space requirements and increase disk I/O throughput. Tuple Differential Coding (TDC) techniques have been introduced to compress views on a tuple level by storing only the differences between consecutive ordered tuples. These techniques work well for...

    Provided By Dalhousie University

  • White Papers // Jan 2013

    Multi-GPU Computing for Achieving Speedup in Real-time Aggregate Risk Analysis

    Stochastic simulation techniques employed for portfolio risk analysis often referred to as Aggregate Risk Analysis, can benefit from exploiting state-of-the-art high-performance computing platforms. In this paper, the authors propose parallel methods to speedup aggregate risk analysis for supporting real-time pricing. To achieve this an algorithm for analyzing aggregate risk is...

    Provided By Dalhousie University

  • White Papers // Apr 2012

    Hardware Performance Evaluation of SHA-3 Candidate Algorithms

    Secure Hashing Algorithms (SHA) showed a significant importance in today's information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace SHA1 and SHA2 with the new SHA-3, to ensure long term robustness of hash functions. In this paper, the authors present...

    Provided By Dalhousie University

  • White Papers // Dec 2007

    SPOT: A System for Detecting Projected Outliers From High-dimensional Data Streams

    In this paper, the authors present a new technique, called Stream Projected Ouliter deTector (SPOT), to deal with outlier detection problem in high-dimensional data streams. SPOT is unique in a number of aspects. SPOT employs a novel window-based time model and decaying cell summaries to capture statistics from the data...

    Provided By Dalhousie University

  • White Papers // Oct 2008

    Knowledge Management and International Organizations: Perspectives on Information Professionals' Role

    The rapid evolution of information and communication technology in recent years has seen knowledge management become a key tool for the success of a variety of institutions. Many international organizations have developed knowledge management programs as key to their future development strategies. The number of international organizations that have identified...

    Provided By Dalhousie University