Ad hoc system : a software architecture for ubiquitous environment

Author(s):  
Chih-Chung Lai ◽  
Ren-Song Ko ◽  
Chia-Kuan Yen
2017 ◽  
Vol 8 (1) ◽  
pp. 70-97 ◽  
Author(s):  
Shobha Tyagi ◽  
Subhranil Som ◽  
Qamar Parvez Rana

The mobile environment in MANETs (Mobile Ad hoc Networks) itself is a major constraint to deal with, and assuring reliability on the top of that strengthens the problem more. This paper which is entirely an extension of the authors' previous work based on trust based group formation using Fuzzy Logic. They herein propose a model which is highly inspired by natural and social behavior of human beings that man is a social animal and is always associated with different types of dynamic groups. Before ensuring the reliable route take into account the trust (T) and the speed (S) of the intermediate nodes which may take part in routing. Trust is actually a matter of feeling with which one feels connected with some person/s in the form of multicast groups. Thus, the proposed Multicast Route Reliability (MRR) is a purely a probabilistic function of Cartesian product of past relationships and present moving patterns.


Policy-based resource access and data sharing are the most specific in context-aware computing. Granting authentication to the wireless and ad hoc users is usually difficult because the system has got to take into account several context factors whereas authoring access. During this epoch, the mobile phone plays a significant role in info access in a ubiquitous environment. Wireless technologies, significantly the GSM-SMS is efficient and efficient to access shared data around the world with fewer security issues. The shared resources like printers, scanners, databases, books, email, etc. are liable to the users once they try and access with proper authentication. The proposed system provides systematic access policy schemes and creates the access mechanism to remote users. These policies and mechanisms are entirely supported context info. The user should satisfy the defined context and defined the user level. This mechanism provides the facilities to users to request and access control through SMS.


2020 ◽  
Vol 12 (1) ◽  
pp. 34-44
Author(s):  
Agaraoli Aravazhi ◽  
Berit Irene Helgheim ◽  
Bjørn Jæger

AbstractThe literature on product variety provides great insights into various businesses. However, little research has been conducted on product variety in the healthcare industry. This study aims to explore the influence of product variety on inventory in hospitals. Since most hospitals are known to replenish products using a homegrown ad-hoc system, a model is developed for exploring all possible product combinations and substitutions. This article presents the behaviour of product substitution, which may be either one-to-one or many-to-one for both sterile and non-sterile products, in the hospital with cost factors. It discusses the product variety reduction and its corresponding cost impacts. The data on a hospital inventory over the course of six years has been procured from a hospital in Norway. Based on the results, the hospital could have a potential product variety reduction of approximately 11% and cost savings from the spending of approximately NOK 3.6 million. Reducing the variety of products in hospital inventories proves to be an approach to reducing costs. The model developed for the research is universal in nature and could be used in other fields, such as retail, marketing etc.


2016 ◽  
Vol 78 (9-3) ◽  
Author(s):  
Teo Rhun Ming ◽  
Ong Beng Liang ◽  
Noris Mohd Norowi ◽  
Evi Indriasari Mansor ◽  
Prasenjit Dey ◽  
...  

This paper presents the study on the mobiTop system- a collocated multi-mobile system. The mobiTop system allows users to come together with their mobile devices in an ad-hoc manner to create one seamless and extended interactive display surface. The collocated multi-mobile system allows a group of people to play digital games together in an impromptu manner without having to buy an interactive tabletop equipment. This study investigates the user experience and system design of a collocated multi-mobile system when users play a collaborative game-based application using the mobiTop system. The findings show that the extended screen size of the mobiTop system enhanced the collaborative experience of the users. This study also highlights several design considerations to further improve such systems such as employing a faster network configuration, reducing the bezel effect, catering for dynamic device movements and making the object of interest more prominent and visible. With this understanding, this study present design guidelines to help designers create digital game-based multi-mobile systems for ad-hoc collaboration.


2018 ◽  
Vol 34 (S1) ◽  
pp. 119-120
Author(s):  
Elisa Puigdomenech Puig ◽  
Santiago Gómez ◽  
Conxa Castell ◽  
Mireia Espallargues ◽  
Toni Dedeu

Introduction:We aimed to pilot the evaluation of the PEGASO system, a smartphone-based intervention (apps/wearables/game) to improve lifestyles and increase awareness.Methods:We conducted a before-after quasi-experimental pilot controlled study. Teenagers aged 13–16 in a 2:1 (intervention: comparative group [IG:CG]) basis from Spain, Italy and the United Kingdom were recruited. The IG had access to the apps and game for six months, and to smart sensors for the last two months. Schools were recruited by convenience sampling. Participants in both groups undertook (i) anthropometric measurements, (ii) diet (KIDMED), physical activity (PAQ-A) and sleep (HELENA study) validated questionnaires, and (iii) ad-hoc lifestyles knowledge questionnaire. PEGASO, if used, continuously recorded diet and physical activity. User experience was assessed through focus groups.Results:Five hundred and fifty-eight participants were included (IG:365 / CG:193). The mean (standard deviation; SD) age was 14.8 (0.8), and 52.3 percent were girls. At baseline, mean scores (SD) of KIDMED, PAQ-A and weekday and weekend sleep hours were 5.60 (2.41), 2.48 (0.66), 8.34 (1.07) and 9.99 (1.66), respectively. The percentage of correct answers of lifestyle's knowledge was 65.2 percent (range 13–100 percent). The IG and CG did not show differences for main outcome variables. At six months, a higher percentage of participants in the IG reported an increase of at least one point in the adherence to Mediterranean Diet (43.8 percent vs. 35.4). No differences were observed for other lifestyles. Focus group results showed a predisposition of adolescents to use mHealth for health promotion; the platform was considered to be useful and complete and personalized suggestions were positively valued. Participants reported few limited interest ion the game and several technical issues.Conclusions:Although participants were motivated and excited about their involvement in the study, and that PEGASO was something desirable for them, the system only showed some impact in specific areas – namely, diet – and could improve some its technological features. Several challenges and opportunities are associated with the implementation of mHealth.


2012 ◽  
Vol 1 (1) ◽  
pp. 47-55
Author(s):  
Belacel Madani ◽  
B. Messabih

Mobile   ad   hoc   networks   (MANETs)   are   multi-hop   wireless   networks   ofautonomous  mobile  nodes  without  any  fixed  infrastructure.  In  MANETs,  it  isdifficult to detect malicious nodes because the network topology constantly changesdue  to  node  mobility.  Intrusion  detection  is  the  means  to  identify  the  intrusivebehaviors and provide useful information to intruded systems to respond fast and toavoid  or  reduce  damages.  The  anomaly  detection  algorithms  have  the  advantagebecause  they  can  detect  new  types  of  attacks  (zero-day  attacks).In  this  paper,  wepresent  a  Intrusion  Detection  System  clustering-based  (ID-Cluster)  that  fits  therequirement of MANET. This dissertation addresses both routing layer misbehaviorsissues,  with  main  focuses  on  thwarting  routing  disruption  attack  Dynamic  SourceRouting  (DSR).  To  validate  the  research,  a  case  study  is  presented  using  thesimulation with GloMoSum at different mobility levels. Simulation results show thatour  proposed  system  can  achieve  desirable  performance  and  meet  the  securityrequirement of MANET.DOI: 10.18495/comengapp.11.047056


Author(s):  
Masa-aki Fukase

Ubiquitous network is really one of remarkable trends of next generation information and communication technologies. However, the rapid increase of ubiquitous technologies has given rise to serious concerns about security issues which are getting worse, especially in the case of ad-hoc network because it is resource constrained. Both transience and secureness are characteristic features of ad-hoc network. In order to provide a sophisticated processor accompanied with such characteristics, we have so far developed HCgorilla. This is a ubiquitous processor that unifies basic aspects of PC processors, mobile processors, Java CPUs, cryptography processors, etc. The unification of these processors has shown effectiveness to achieve not only power and chip area saving but also secureness for ubiquitous environment. The secureness provided by HCgorilla is temporal with practically enough cipher strength and without relying on permanent network infrastructure. This is really one of qualitative conditions required for ad-hoc networks. Considering the ever growing ubiquitous network, the target of this study is the total optimum design of HCgorilla chips with particular emphasis on small resource and secure implementation. The improved version, HCgorilla.7 is implemented in a CMOS standard cell chip. Specific features of HCgorilla.7 are described regarding occupied area, power consumption, throughput, and cipher strength. Judging from these results, HCgorilla is one of most profitable candidates for the next generation ubiquitous environment.


Sign in / Sign up

Export Citation Format

Share Document