Review on Collision Avoidance Systems for Unmanned Aerial Vehicles (2015)

Unmanned Aerial Vehicles (UAVs) have seen an important growth in variousmilitary and civilian applications including surveillance, reconnaissance, homeland security and forest fire monitoring. Currently, UAVs are limited in their access to the civil airspace. The chief barrier confronting the routine and safe integration of UAVs into the civil airspace is their lack of an effective and standardized collision avoidance system.

Cache Coherence in Machine-to-Machine Information Centric Networks (2015)

Information-Centric Networking (ICN) is a new paradigm proposing a shift in the main Internet architecture from a host-centric communication model to a content-centric model. ICN architectures target to meet user demands for accessing the information regardless of its location. A major building block of ICNs concerns caching strategies. Concomitantly, Machine-to-Machine (M2M) technologies are considered the main pattern for the Internet of Things (IoT). Unifying M2M and ICN into a single framework raises the challenge of cache coherence.

ECAB: An Efficient Context-aware Multi-hop Broadcasting Protocol for Wireless Sensor Networks (2015)

Duty-cycling scheme, that consists in switching between active and sleeping modes, is widely exploited in WSNs to reduce power consumption. However, this technique raises several challenges especially for broadcast communications. In fact, as many neighboring nodes are involved in the communication, keeping them all active during a specific period of time requires a preliminary synchronization process which is a complex task and causes extra overhead. In this context, we propose an efficient context-aware multi-hop broadcasting (ECAB) over asynchronous duty cycled networks.

Study of VOD streaming on BitTorrent (2015)

Nowadays, the Peer-to-Peer (P2P) Video-on-Demand (VOD) systems knows a huge success for several reasons: a) each peer is both server and client leading to scalable system, b) it is not necessary to build and maintain infrastructures. BitTorrent is the most popular P2P file sharing protocols due to its effectiveness in the delivery of content. Thus, many VoD protocols have been proposed based on it. They investigate new ways for pieces and neighbor peers selections to assure the tight displaying time deadlines of video frames.

Cluster connectivity assurance metrics in vehicular ad hoc networks (2015)

Many applications introduced by Vehicular Ad-Hoc Networks (VANETs), such as intelligent transportation and roadside advertisement, make VANETs become an important component of metropolitan area networks. In VANETs, mobile nodes are vehicles which are equipped with wireless antennas; and they can communicate with each other by wireless communication on ad-hoc mode or infrastructure mode. Clustering vehicles into different groups can introduce many advantages for VANETs as it can facilitate resource reuse and increase system capacity.

LEATCH: Low Energy Adaptive Tier Clustering Hierarchy (2015)

In Wireless Sensor Networks, low latency, energy efficiency, and coverage problems are considered as three key issues in designing routing protocols. In this paper we present a new protocol called Low Energy Adaptive Tier Clustering Hierarchy (LEATCH), which offers a good compromise between delay and energy consumption and resolves some coverage problems. For our purpose, a two level hierarchical approach has been proposed to organize a sensor network into a set of clusters, every cluster divided into small clusters that are called Mini Clusters.

Machine-to-machine performance metrics: challenges, solutions and research opportunities (2015)

Machine-to-machine (M2M) communications have emerged as a cutting edge technology for next-generation communications, and are undergoing rapid development and inspiring numerous applications. Machine-to-machine (M2M) communications could enable machines to exchange information without the direct human intervention. Machines in M2M systems could not only collect data for their own use, but also share the data with other machines intelligently.

CSC1203

Introduction to database

This course is introduce fundamentals of database systems

ملحقات المادة الدراسية

الصفحات

اشترك ب KSU Faculty آر.إس.إس