Performance evaluation of low rate WPANs for medical applications

Author(s):  
N. Golmie ◽  
D. Cypher ◽  
O. Rebala
Author(s):  
Luca Superiori ◽  
Olivia Nemethova ◽  
Markus Rupp

In this chapter, we present the possibility of detecting errors in H.264/AVC encoded video streams. Standard methods usually discard the damaged received packet. Since they can still contain valid information, the localization of the corrupted information elements prevents discarding of the error-free data. The proposed error detection method exploits the set of entropy coded words as well as range and significance of the H.264/AVC information elements. The performance evaluation of the presented technique is performed for various bit error probabilities. The results are compared to the typical packet discard approach. Particular focus is given on low-rate video sequences.


Author(s):  
Md. Mohibur Rahaman ◽  
Mohammad Khairul Islam ◽  
Kazi Ashrafuzzaman ◽  
Mohammad Sanaullah Chowdhury

<p>The IEEE 802.15.4 is the standard for Low Rate Wireless Personal Area network (LR-WPAN). It is widely used in many application areas. The standard uses Slotted CSMA/CA mechanism in its contention access period (CAP) for the beacon enabled mode. The protocol has two modes - single sensing (SS) and double sensing (DS). The protocol also adopts a binary exponential backoff (BEB) algorithm. In this paper, we explore the saturation throughput, delay and energy consumption of this standard with double sensing (DS) using the existing BEB algorithm. We also investigate three other backoff schemes - exponential increase exponential decrease (EIED), exponential increase linear decrease (EILD) and exponential increase multiplicative decrease (EIMD). From simulation results, it is found that the EIED, EILD, EIMD perform better than the BEB for higher loads. It shows that the EIED, EILD, EIMD have better throughput and lower delay than the BEB. The EIED outperforms the other schemes in terms of throughput, delay and energy for the higher loads.</p>


The data of medical applications over the internet contains sensitive data. There exist several methods that provide privacy for these data. Most of the privacy-preserving data mining methods make the assumption of the separation of quasi-identifiers (QID) from multiple sensitive attributes. But in reality, the attributes in a dataset possess both the features of QIDs and sensitive data. In this paper privacy model namely (vi…vj)-diversity is proposed. The proposed anonymization algorithm works for databases containing numerous sensitive QIDs. The real dataset is used for performance evaluation. Our system reduced the information loss for even huge number of attributes and the values of sensitive QID’s are protected.


Sign in / Sign up

Export Citation Format

Share Document