To search, Click
below search items.
|
|

All
Published Papers Search Service
|
Title
|
Delay-Efficient Approaches for Sleep Scheduling in Wireless Sensor Networks
|
Author
|
Arul Xavier V.M, Angelin Jeyaseeli D
|
Citation |
Vol. 13 No. 11 pp. 130-134
|
Abstract
|
Wireless sensor networks (WSN) have recently used in many applications like surveillance, military applications, etc. In such applications, the sensor nodes are expected to be work long period of time without recharging their batteries. To extend the network lifetime, some sleep scheduling techniques always used, which may cause communication delay in large scale WSNs. In this paper, we present the challenges in the design of delay efficient sleep scheduling, comparison of different approaches in terms of performance metrics and future outlook of communication delay in WSN.
|
Keywords
|
sleep scheduling, wake-up pattern
|
URL
|
http://paper.ijcsns.org/07_book/201311/20131119.pdf
|
Title
|
Delay-Efficient Approaches for Sleep Scheduling in Wireless Sensor Networks
|
Author
|
Arul Xavier V.M, Angelin Jeyaseeli D
|
Citation |
Vol. 13 No. 11 pp. 130-134
|
Abstract
|
Wireless sensor networks (WSN) have recently used in many applications like surveillance, military applications, etc. In such applications, the sensor nodes are expected to be work long period of time without recharging their batteries. To extend the network lifetime, some sleep scheduling techniques always used, which may cause communication delay in large scale WSNs. In this paper, we present the challenges in the design of delay efficient sleep scheduling, comparison of different approaches in terms of performance metrics and future outlook of communication delay in WSN.
|
Keywords
|
sleep scheduling, wake-up pattern
|
URL
|
http://paper.ijcsns.org/07_book/201311/20131119.pdf
|
Title
|
Virtualization in Intrusion Detection Systems: A Study on Different Approaches for Cloud Computing Environments
|
Author
|
Josenilson Dias Araujo, Zair Abdelouahab
|
Citation |
Vol. 13 No. 11 pp. 135-142
|
Abstract
|
This article presents an overview of some of the major works that focus on the use of virtualization in intrusion detection systems to protect against threats in cloud computing environments. The elasticity and abundant availability of computational resources are attractive to attackers in order to exploit vulnerabilities of the cloud, and launch attacks against legitimate users to gain access to private and privileged data. To effectively protect the cloud users, an IDS should have the ability to expand, increase or rapidly decrease the quantity of sensors according to the quantity of resources, as well as the ability to isolate access to the system levels and infrastructures. For this purpose, characteristics of virtual machines as quick startup, fast recovery, stop, migration between different hosts and execution across multiple platforms can be exploited in VM-based IDS, making it a great alternative for monitoring intrusions in cloud computing environments.
|
Keywords
|
Cloud computing, IDS, Virtualization, VM.
|
URL
|
http://paper.ijcsns.org/07_book/201311/20131120.pdf
|

|
|