Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Engineering

An Investigation Of Data Protection And Computer Security In Small Irish Medical Practices, Sean Mcgrath Jul 2011

An Investigation Of Data Protection And Computer Security In Small Irish Medical Practices, Sean Mcgrath

Dissertations

Small medical practices store and process the health information of their patients in order to aid in providing care to them. Because of this a level of trust exists between the patients and the practice to ensure the sensitive medical data is kept private and secure. There was no formalised way to test if this trust was well deserved and what level of protection was applied to such sensitive health records. A security model that is applicable to small medical practices for the purpose of protecting and securing the personal health information they store was constructed and validated by a …


Cross-Layer Design For Mobile Ad-Hoc Unmanned Aerial Vehicle Communication Networks, Abdel Ilah Nour Alshbatat Jan 2011

Cross-Layer Design For Mobile Ad-Hoc Unmanned Aerial Vehicle Communication Networks, Abdel Ilah Nour Alshbatat

Dissertations

Mobile Ad-Hoc network (MANET) is a popular type of wireless network that is formed by a collection of mobile nodes. Each node in such a network has the capability to communicate with its neighbors and non-neighbors through a wireless medium without using any existing network infrastructure. Due to the lack of infrastructure, all nodes in Ad-Hoc network are designed to act as an end system and a router for other nodes.

Traditionally, the dominant design methodology for network protocols was based on the open systems interconnection (OSI) reference model. This methodology divided the stack into seven layers in which each …


Leach-Sm: A Protocol For Extending Wireless Sensor Network Lifetime By Management Of Spare Nodes, Bilal Abu Bakr Jan 2011

Leach-Sm: A Protocol For Extending Wireless Sensor Network Lifetime By Management Of Spare Nodes, Bilal Abu Bakr

Dissertations

Operational lifetime of a wireless sensor network (WSN) depends on its energy resources. Significant improvement of WSN lifetime can be achieved by adding spare sensor nodes to WSN. Spares are ready to be switched on when any primary (a node that is not a spare) exhausts its energy. A spare replacing a primary becomes a primary itself.

The LEACH-SM protocol (Low-Energy Adaptive Clustering Hierarchy with Spare Management) proposed by us is a modification of the prominent LEACH protocol. LEACH extends WSN lifetime via rotation of cluster heads but allows for inefficiencies due to redundant sensing target coverage. There are two …