RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Two-Relay-Based Cooperative MAC Protocol for Wireless Ad hoc Networks

        Khalid, Murad,Yufeng Wang,In-ho Ra,Sankar, Ravi IEEE 2011 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY Vol.60 No.7

        <P>The cooperative communication approach promises improved throughput and delay performance by effective use of spatial diversity in wireless ad hoc networks. The CoopMAC I protocol proposed by Liu picks either a direct path or a relay path based on rate comparison to enhance average throughput and delay performances. However, its performance deteriorates under fading conditions due to lower direct path or relay path reliability. UtdMAC, which was proposed by Agarwal , performs better than CoopMAC I in terms of average throughput and delay performances due to improved transmission reliability provided by the backup relay path. Although it is better than CoopMAC I, UtdMAC does not fully benefit from higher throughput relay path (compared with the direct path) since it uses relay path only as a secondary backup path. In this paper, a new cooperative medium access control (MAC) protocol, which is termed the 2rcMAC protocol, is proposed for a small-sized network. The protocol makes use of two cooperating nodes to achieve superior throughput and delay performances, compared with the existing cooperative MAC protocols. The secondary relay path is invoked as a backup path for better transmission reliability and higher throughput through the relay path. Moreover, handshaking and single-bit feedbacks resolve contentions among relay nodes in proximity at the time and further provide the source node with rate information on source-to-destination, source-to-relay, and relay-to-destination links. Performance gains achieved by the 2rcMAC protocol under fast-fading conditions over the existing cooperative MAC protocols are compared and discussed. Simulation results clearly show an average throughput improvement of 7% and 25% and an average delay improvement of 94.8% and 98.9%, compared with UtdMAC and CoopMAC I, respectively.</P>

      • KCI등재

        A Framework for Universal Cross Layer Networks

        Khalid, Murad,Sankar, Ravi,Joo, Young-Hoon,Ra, In-Ho Korean Institute of Intelligent Systems 2008 INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGE Vol.8 No.4

        In a resource-limited wireless communication environment, various approaches to meet the ever growing application requirements in an efficient and transparent manner, are being researched and developed. Amongst many approaches, cross layer technique is by far one of the significant contributions that has undoubtedly revolutionized the way conventional layered architecture is perceived. In this paper, we propose a Universal Cross Layer Framework based on vertical layer architecture. The primary contribution of this paper is the functional architecture of the vertical layer which is primarily responsible for cross layer interaction management and optimization. The second contribution is the use of optimization cycle that comprises awareness parameters collection, mapping, classification and the analysis phases. The third contribution of the paper is the decomposition of the parameters into local and global network perspective for opportunistic optimization. Finally, we have shown through simulations how parameters' variations can represent local and global views of the network and how we can set local and global thresholds to perform opportunistic optimization.

      • KCI등재

        A Framework for Universal Cross Layer Networks

        Murad Khalid,Ravi Sankar,Young Hoon Joo,In Ho Ra 한국지능시스템학회 2008 INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGE Vol.8 No.4

        In a resource-limited wireless communication environment, various approaches to meet the ever growing application requirements in an efficient and transparent manner, are being researched and developed. Amongst many approaches, cross layer technique is by far one of the significant contributions that has undoubtedly revolutionized the way conventional layered architecture is perceived. In this paper, we propose a Universal Cross Layer Framework based on vertical layer architecture. The primary contribution of this paper is the functional architecture of the vertical layer which is primarily responsible for cross layer interaction management and optimization. The second contribution is the lise of optimization cycle that comprises awareness parameters collection, mapping, classification and the analysis phases. The third contribution of the paper is the decomposition of the parameters into local and global network perspective for opportunistic optimization. Finally, we have shown through simulations how parameters' variations can represent local and global views of the network and how we can set local and global thresholds to perform opportunistic optimization.

      • Trends and Analysis of Cancer Incidence for Common Male and Female Cancers in the Population of Punjab Province of Pakistan during 1984 to 2014

        Masood, Khalid,Masood, Andleeb,Zafar, Junaid,Shahid, Abubaker,Kamran, Mujahid,Murad, Sohail,Masood, Misbah,Alluddin, Zafar,Riaz, Masooma,Akhter, Naseem,Ahmad, Munir,Ahmad, Fayyaz,Akhtar, Javaid,Naeem, Asian Pacific Journal of Cancer Prevention 2015 Asian Pacific journal of cancer prevention Vol.16 No.13

        Background: The Pakistan Atomic Energy Commission Cancer Registry (PAECCR) program has made availability of a common cancer incidence database possible in Pakistan. The cancer incidence data from nuclear medicine and oncology institutes were gathered and presented. Materials and Methods: The cancer incidence data for the last 30 years (1984-2014) are included to describe a data set of male and female patients. The data analysis concerning occurrence, trends of common cancers in male and female patients, stage-wise distribution, and mortality/follow-up cases is also incorporated for the last 10 years (2004-2014). Results: The total population of provincial capital Lahore is 9,800,000. The total number of cancer cases was 80,390 (males 32,156, females 48,134). The crude incidence rates in PAECCR areas were 580.8/$10^5$ during 2010 to 885.4/$10^5$ in 2014 (males 354.1/$10^5$, females 530.1/$10^5$). The cancer incidence rates for head and neck (15.70%), brain tumors (10.5%), and non-Hodgkin lymphoma (NHL, 9.53%) were found to be the highest in male patients, whereas breast cancer (46.7%), ovary tumors (6.80%), and cervix (6.31%) cancer incidence rates were observed to be the most common in female patients. The age range distribution of diagnosed and treated patients in conjunction with the percentage contribution of cancer patients from 15 different cities of Punjab province treated at the Institute of Nuclear Medicine and Oncology, Lahore are also included. Leukemia was found to be the most common cancer for the age group of 1-12 years. It has been identified that the maximum number of diagnosed cases were found in the age range of 51-60 years for males and 41-50 years for female cancer patients. Conclusions: Overall cancer incidence of the thirty years demonstrated that head and neck and breast cancers in males and in females respectively are the most common cancers in Punjab province in Pakistan, at rates almost the highest in Asia, requiring especial attention. The incidence of brain, NHL, and prostate cancers among males and ovarian and cervix cancers among females have increased rapidly. These data from a major population of Punjab province should be helpful for implementation of appropriate planning, prevention and cancer control measures and for determination of risk factors within the country.

      • SCIESCOPUS

        Semantic Interoperability in Heterogeneous IoT Infrastructure for Healthcare

        Jabbar, Sohail,Ullah, Farhan,Khalid, Shehzad,Khan, Murad,Han, Kijun WILEY INTERSCIENCE 2017 WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Vol.2017 No.-

        <P>Interoperability remains a significant burden to the developers of Internet of Things’ Systems. This is due to the fact that the IoT devices are highly heterogeneous in terms of underlying communication protocols, data formats, and technologies. Secondly due to lack of worldwide acceptable standards, interoperability tools remain limited. In this paper, we proposed an IoT based Semantic Interoperability Model (IoT-SIM) to provide Semantic Interoperability among heterogeneous IoT devices in healthcare domain. Physicians communicate their patients with heterogeneous IoT devices to monitor their current health status. Information between physician and patient is semantically annotated and communicated in a meaningful way. A lightweight model for semantic annotation of data using heterogeneous devices in IoT is proposed to provide annotations for data. Resource Description Framework (RDF) is a semantic web framework that is used to relate things using triples to make it semantically meaningful. RDF annotated patients’ data has made it semantically interoperable. SPARQL query is used to extract records from RDF graph. For simulation of system, we used Tableau, Gruff-6.2.0, and Mysql tools.</P>

      • KCI등재

        Enabling technologies for AI empowered 6G massive radio access networks

        Md. Shahjalal,Woojun Kim,Waqas Khalid,Seokjae Moon,Murad Khan,ShuZhi Liu,Suhyeon Lim,Eunjin Kim,Deok-Won Yun,Joohyun Lee,Won-Cheol Lee,Seung-Hoon Hwang,Dongkyun Kim,Jang-Won Lee,Heejung Yu,Youngchul S 한국통신학회 2023 ICT Express Vol.9 No.3

        Predictably, the upcoming six generation (6G) networks demand ultra-massive interconnectivity comprising densely congested sustainable small-to-tiny networks. The conventional radio access network (RAN) will be redesigned to provide the necessary intelligence in all areas to meet required network flexibility, full coverage, and massive access. In this respect, this paper focuses on intelligent massive RAN (mRAN) architecture and key technologies fulfilling the requirements. Particularly, we investigate potential AI algorithms for network and resource management issues in 6G mRAN. Furthermore, we summarize the research issues in edge technologies and physical layer intelligence on 6G network architecture.

      • KCI등재

        An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

        Xuan Hung Le,Sungyoung Lee,Ismail Butun,Murad Khalid,Ravi Sankar,Miso (Hyoung-IL) Kim,한만형,Young-Koo Lee,이희조 한국통신학회 2009 Journal of communications and networks Vol.11 No.6

        For many mission-critical related wireless sensor network applications such as military and homeland security, user’s access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed by Wang et al.

      • SCIESCOPUSKCI등재

        An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

        Le, Xuan Hung,Lee, Sung-Young,Butun, Ismail,Khalid, Murad,Sankar, Ravi,Kim, Miso Hyoung-Il,Han, Man-Hyung,Lee, Young-Koo,Lee, Hee-Jo The Korea Institute of Information and Commucation 2009 Journal of communications and networks Vol.11 No.6

        For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.

      • Activity-oriented access control to ubiquitous hospital information and services

        Le, Xuan Hung,Lee, Sungyoung,Lee, Young-Koo,Lee, Heejo,Khalid, Murad,Sankar, Ravi Elsevier 2010 Information sciences Vol.180 No.16

        <P><B>Abstract</B></P><P>In hospital information systems, protecting the confidentiality of health information, whilst at the same time allowing authorized physicians to access it conveniently, is a crucial requirement. The need to deliver health information at the point-of-care is a primary factor to increase healthcare quality and cost efficiency. However, current systems require considerable coordination effort of hospital professionals to locate relevant documents to support a specific activity. This paper presents a flexible and dynamic access control model, Activity-Oriented Access Control (AOAC), which is based on user activity to authorize access permissions. A user is allowed to perform an activity if he/she holds a number of satisfactory attributes (i.e. roles, assignments, etc.) under a specified condition (e.g. time, location). Results of AOAC implementation in a realistic healthcare scenario have shown to meet two important requirements: protecting confidentiality of health information by denying an unauthorized access, and allowing physicians to conveniently browse medical data at the point-of-care. Furthermore, the average execution time was 0.078s which allows AOAC to work in real-time.</P>

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼