- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Energy Harvesting in Wireless Networks
- Chaos-based Image/Signal Encryption
- Context-Aware Activity Recognition Systems
- Indoor and Outdoor Localization Technologies
- Privacy-Preserving Technologies in Data
- Advanced Steganography and Watermarking Techniques
- Data Quality and Management
- IoT and Edge/Fog Computing
- Quantum-Dot Cellular Automata
- Cooperative Communication and Network Coding
- Wireless Networks and Protocols
- Advanced Memory and Neural Computing
- Genomics and Phylogenetic Studies
- Cryptography and Data Security
- Security in Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Digital Media Forensic Detection
- Online Learning and Analytics
- Smart Agriculture and AI
- IoT-based Smart Home Systems
- Traffic Prediction and Management Techniques
- Face and Expression Recognition
University of Memphis
2006-2024
International Institute of Information Technology
2023-2024
Galgotias University
2023-2024
Amrita Vishwa Vidyapeetham
2024
Spicer Adventist University
2023
Chandigarh University
2023
National Health Systems Resource Centre
2022
Ministry of Health and Family Welfare
2022
Shri Ramswaroop Memorial University
2021
Hindustan Institute of Technology and Science
2019-2020
In old times, castles were surrounded by moats (deep trenches filled with water, and even alligators) to thwart or discourage intrusion attempts. One can now replace such barriers stealthy wireless sensors. this paper, we develop theoretical foundations for laying of We define the notion k-barrier coverage a belt region using propose efficient algorithms which one quickly determine, after deploying sensors, whether is covered. Next, establish optimal deployment pattern achieve when sensors...
Sensor networks are often desired to last many times longer than the active lifetime of individual sensors. This is usually achieved by putting sensors sleep for most their lifetime. On other hand, surveillance kind applications require guaranteed k-coverage protected region at all times. As a result, determining appropriate number deploy that achieves both goals simultaneously becomes challenging problem. In this paper, we consider three kinds deployments sensor network on unit square - √n...
It is well-known that placing disks in the triangular lattice pattern optimal for achieving full coverage on a plane. With emergence of wireless sensor networks, however, it now no longer enough to consider alone when deploying network; connectivity must also be con-sidered. While moderate loss can tolerated by applications fatal. Moreover, since sensors are subject unanticipated failures after deployment, not have network just connected, should k-connected (for k > 1 ). In this paper, we...
The decreasing cost along with rapid progress in next-generation sequencing and related bioinformatics computing resources has facilitated large-scale discovery of SNPs various model nonmodel plant species. Large numbers genome-wide availability make them the marker choice partially or completely sequenced genomes. Although excellent reviews have been published on sequencing, its associated challenges, applications genetic studies, a comprehensive review connecting these three intertwined...
Mobile health technology has great potential to increase healthcare quality, expand access services, reduce costs, and improve personal wellness public health. However, mHealth also raises significant privacy security challenges.
Project ExScal (for extreme scale) fielded a 1000+ node wireless sensor network and 200+ peer-to-peer ad hoc of 802.11 devices in 13km by 300m remote area Florida, USA during December 2004. In comparison with previous deployments, the application is relatively complex its networks are largest ones either type to date. this paper, we overview key requirements ExScal, corresponding design hardware/software platform application, some results our experiments.
Global barrier coverage that requires much fewer sensors than full coverage, is known to be an appropriate model of for movement detection applications such as intrusion detection. However, it has been proved given a sensor deployment, can not locally determine whether the deployment provides global making impossible develop localized algorithms, thus limiting its use in practice.
Global barrier coverage, which requires much fewer sensors than full is known to be an appropriate model of coverage for movement detection applications such as intrusion detection. However, it has been proved that given a sensor deployment, can not locally determine whether the deployment provides global making impossible develop localized algorithms, thus limiting its use in practice. In this paper, we introduce concept local address limitation. Motivated by observation movements are...
Deriving the critical density (which is equivalent to deriving radius or power) achieve coverage and/or connectivity for random deployments a fundamental problem in area of wireless networks. The probabilistic conditions normally derived, however, have limited appeal among practitioners because they areoften asymptotic, i.e., only make high probability guarantees limit large system sizes. Such are not very useful practice since deployment regions always finite. Another major limitation most...
To make a network last beyond the lifetime of an individual sensor node, redundant nodes must be deployed. What sleep-wake-up schedule can then used for so that redundancy is appropriately exploited to maximize lifetime? We develop optimal solutions both problems case when wireless are deployed form impenetrable barrier detecting movements. In addition being provably optimal, our algorithms work nondisk sensing regions and heterogeneous regions. Further, we provide solution more difficult...
With increasing popularity of media enabled hand-helds, the need for high data-rate services mobile users is evident. Large-scale Wireless LANs (WLANs) can provide such a service, but they are expensive to deploy and maintain. Open WLAN access-points (APs), on other hand, no new deployments, offer only opportunistic with guarantees short term throughput. In contrast, carefully planned sparse deployment roadside WiFi provides an economically scalable infrastructure quality service assurance...
Tracking of movements such as that people, animals, vehicles, or phenomena fire, can be achieved by deploying a wireless sensor network. So far only prototype systems have been deployed and hence the issue scale has not become critical. Real-life deployments, however, will at large achieving this prohibitively expensive if we require every point in region to covered (i.e., full coverage), case deployments. In paper therefore propose new model coverage, called trap scales well with deployment...
The problem of sleep wakeup has been extensively studied for the full coverage model, where every point in deployment region is covered by some sensor. Since sleep-wakeup NP-Hard this several heuristics exist. For model barrier coverage, however, sensors are deployed to form an impenetrable detecting moving objects (a flagship application wireless sensor networks), design optimal algorithm open. In paper, we solve open proposing algorithms not only often-used case equal lifetime but also...
Vehicular Internet access via open WLAN points (APs) has been demonstrated to be a feasible solution provide opportunistic data service moving vehicles. Using an in situ deployment, however, such does not worst-case performance guarantees due unpredictable intermittent connectivity. On the other hand, that tries cover every point entire road network with APs (full coverage) is very practical prohibitive deployment and operational cost. In this paper, we introduce new notion of coverage for...
Although potential exists for patient-reported outcome measures to assess disease impact, Quality of life evaluation is not widely used in clinical settings. Limited literature on the patients’ quality with oral potentially malignant diseases. Objectives: To evaluate how Oral Potentially Malignant Disorders (OPMDs) affect different realms quality-of-life QoL, shedding light variations QoL depending seriousness disease. Methods: This cross-sectional study included 70 patients through...
Majority of papers in the area wireless sensor networks (WSNs) have an element energy-efficiency and associated with it analysis network lifetime. Yet, there is no agreement on how to analyze lifetime a WSN. As result, errors are frequently made both sides. Some underestimate by order magnitude, while others end up overestimating significant factor. This paper presents first step towards standardizing WSNs. We focus WSNs deployed for always-on applications, where problem power management...
Although random deployment is widely used in theoretical analysis of coverage and connectivity, evaluation various algorithms (e.g., sleep-wakeup), it has often been considered too expensive as compared to optimal deterministic patterns when deploying sensors real-life. Roughly speaking, a factor log n additional are needed if deployment. This may be an illusion however, since all real-life large-scale deployments strategies result some randomness, two prime sources being placement errors...
All U.S. transit agencies receiving FTA Urbanized Area Formula Program funding under Section 5307 (Section 15) report service consumption statistics (revenue passenger miles and unlinked trips) to the National Transit Database. Passenger is an incentive-based element that generates millions of dollars annually for New York City (NYCT). Originally, 15 random sample data were collected by surveyors gathering destination information, followed manual distance calculation based on judgment likely...
Vehicular Internet access via open WiFi points (APs) has been demonstrated to be a feasible solution provide opportunistic data service moving vehicles. Using an in situ deployment, however, such does not performance guarantees due unpredictable intermittent connectivity. On the other hand, that tries cover every point entire road network with APs (a full coverage) is very practical prohibitive deployment and operational costs. In this paper, we introduce new notion of coverage for mobile...
It has become essential to protect vital infrastructures from cyber threats in an age where technology permeates every aspect of our lives. This article examines how machine learning and cybersecurity interact, providing a thorough overview this dynamic synergy might strengthen the defence critical systems services. The hazards public safety national security cyberattacks on including electricity grids, transportation networks, healthcare are significant. Traditional methods have failed keep...