Learn More
—A fundamental challenge in the design of Wireless Sensor Network (WSN) is to enhance the network lifetime. The area around the Sink forms a bottleneck zone due to heavy traffic-flow, which limits the network lifetime in WSN. This work attempts to improve the energy efficiency of the bottleneck zone which leads to overall improvement of the network lifetime(More)
In the present scenario, even well administered networks are susceptible to sophisticated cyber attacks. Such attack combines vulnerabilities existing on different systems/services and are potentially more harmful than single point attacks. One of the methods for analyzing such security vulnerabilities in an enterprise network is the use of attack graph. It(More)
The Internet of Everything (IoE) solutions gradually bring every object online, and processing data in centralized cloud does not scale to requirements of such environment. This is because, there are applications such as health monitoring and emergency response that require low latency and delay caused by transferring data to the cloud and then back to the(More)
Telemedicine helps to deliver health services electronically to patients with the advancement of communication systems and health informatics. Chronic wound (CW) detection and its healing rate assessment at remote distance is very much difficult due to unavailability of expert doctors. This problem generally affects older ageing people. So there is a need(More)
OBJECTIVE In this article, we describe the important aspects like major characteristics, research issues, and challenges with body area sensor networks in telemedicine systems for patient monitoring in different scenarios. Present and emerging developments in communications integrated with the developments in microelectronics and embedded system(More)
This paper presents a tele-wound framework for monitoring chronic wound status based on color variation over a period of time. This will facilitate patients at remote locations to connect to medical experts through mobile devices. Further this will help medical professionals to monitor and manage the wounds in more timely, accurate and precise manner using(More)
SUMMARY Internet of Things (IoT) aims to bring every object (e.g. smart cameras, wearable, environmental sensors, home appliances, and vehicles) online, hence generating massive amounts of data that can overwhelm storage systems and data analytics applications. Cloud computing offers services at the infrastructure level that can scale to IoT storage and(More)
With rapid technological advancements, cloud marketplace witnessed frequent emergence of new service providers with similar offerings. However, service level agreements (SLAs), which document guaranteed quality of service levels, have not been found to be consistent among providers, even though they offer services with similar functionality. In service(More)
With increasing network security threats, the network vulnerability must consider exploits in the context of multistage, multi-host attack scenarios. The general approach to this problem is to construct an attack graph for a given network configuration. An attack graph consists of a number of attack paths which are essentially series of exploits which an(More)
—Prediction of spatial attributes has attracted significant research interest in recent years. It is challenging especially when spatial data contain errors and missing values. Geostatistical estimators are used to predict the missing attribute values from the observed values of known surrounding data points, a general form of which is referred as kriging(More)