Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar Aug 2009

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar

International Conference on Information and Communication Technologies

Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …


Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby Aug 2009

Application Of Ict Iii: Use Of Information And Mobile Computing Technologies In Healthcare Facilities Of Saudi Arabia, Abdul Ahad Siddiqi, Munir Ahmed, Yasser M. Alginahi, Abdulrahman Alharby

International Conference on Information and Communication Technologies

Information technology forms an important part of the healthcare solution. Accurate and up-to-date information is essential to continuous quality improvement in any organization, and particularly so in an area as complex as healthcare. Therefore, diverse information systems must be integrated across the healthcare enterprise. The knowledge base in the medical field is large, complex, and growing rapidly. It includes scientific knowledge, as well as familiarity with the day-to-day business of providing healthcare. It is crucial to identify the processes in the healthcare sector that would most benefit from the support of information technology. This study is focused on the analysis …


Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel Aug 2009

Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel

International Conference on Information and Communication Technologies

Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true …


Networks - I: Investigating Access To Heterogeneous Storage Systems Using Linked Data In Unicore Grid Middleware, Roger Menday, M. Shahbaz Memon, A. Shiraz Memon, Achim Streit Aug 2009

Networks - I: Investigating Access To Heterogeneous Storage Systems Using Linked Data In Unicore Grid Middleware, Roger Menday, M. Shahbaz Memon, A. Shiraz Memon, Achim Streit

International Conference on Information and Communication Technologies

The Grid provides access to execution and storage resources - through middleware - by normalizing the access to resources. UNICORE calls this quality dasiaseamlessnesspsila. One result of this is that a request for some action at one resource can, with relative ease, be re-targeted to another, making possible the coordinated usage of multiple resources. In this paper we describe a seamless interface to heterogeneous storage systems, using the (Semantic) Web as middleware for the Grid. Data is accumulated by experiments and simulations running on execution systems, instruments and sensors, and by importing data from other locations. Storage systems are regular …


Networks - I: Collaborative 3d Digital Content Creation Exploiting A Grid Network, M. Gkion, M. Z. Patoli, A. Al-Barakati, W. Zhang, P. Newbury, M. White Aug 2009

Networks - I: Collaborative 3d Digital Content Creation Exploiting A Grid Network, M. Gkion, M. Z. Patoli, A. Al-Barakati, W. Zhang, P. Newbury, M. White

International Conference on Information and Communication Technologies

The increase in ease of the production of computer simulated graphics has opened new opportunities in the 3D industry. There are unlimited applications for the delivery of 3D Graphics especially concerning 3D multimedia presentation of digital content. Apart from aesthetic and entertaining reasons, experts apply computer simulations to visualize environments and to identify early errors or costs in order to limit the need of making real prototypes. Thus, 3D Graphics also minimize the time required for developing the final product. Existing 3D applications give partial support to users to engage in collaborative contribution for the production of a 3D model. …