A Semi-preemptive Ad Hoc Computational Service System with Limited Resources

Author(s):  
Fang-Yie Leu ◽  
Keng-Yen Chao
Algorithms ◽  
2012 ◽  
Vol 5 (1) ◽  
pp. 113-147
Author(s):  
Fang-Yie Leu ◽  
Keng-Yen Chao ◽  
Ming-Chang Lee ◽  
Jia-Chun Lin

2021 ◽  
Vol 9 (2) ◽  
Author(s):  
Arun Kumar Singh ◽  

Integrating IoT with Wireless Ad hoc Network (WANET) capabilities can solve several problems. However, because they both rely on identity nodes to communicate with each other, they are both vulnerable to Sybil attacks. Sybil attackers illegally change into several different identities (attackers) to carry out various malicious activities such as damaging data aggregation, voting, and disrupting routing. Several defense machineries have been proposed for Sybil attacks on WANET, which are mostly based on cryptography, location or position, network behavior, resource testing, and trust. However, the drawbacks are that not all machinery are suitable for use in networks with limited resources. This paper presents a survey, classification, and comparison of various defense machineries that have been proposed for non-IoT WANETs. The author emphasizes the issue of the advantages and disadvantages of this defense mechanism when applied to the IoT infrastructure and how each method can effectively recognize properties of Sybil attacks.


Author(s):  
Bin Lu

Mobile ad hoc network (MANET) is a self-configuring and self-maintaining network characterized as dynamic topology, absence of infrastructure, and limited resources. These characteristics introduce security vulnerabilities, as well as difficulty in providing security services to MANETs. Up to date, tremendous research has been done to develop security approaches to MANETs. This work will discuss the existing approaches that have intended to defend against various attacks at different layers. Open challenges are also discussed in the chapter.


Author(s):  
Alexander F. Ale ◽  
Mercy W. Isichei ◽  
Michael A. Misauno

Background: The practice of short stay thyroidectomy is relatively new in developing nations like Nigeria. The primary reason for this is a lack of resources. Furthermore, the prevailing poverty prevents many patients from accessing tertiary health care, as such, ad hoc medical outreaches are usually conducted to bridge the gap. Thyroidectomies have not been routinely performed in these outreach settings due to safety concerns. The study seeks to analyse whether short stay thyroidectomy can be safely practiced under medical outreach settings with limited resources.Methods: The study is a prospective review of all patients that had short stay thyroidectomy at four rural medical outreach settings in Nigeria. Entire study spanned January 2019 to November 2019. Each outreach lasted one week, and patients were followed up for the duration of the outreach. All patients presenting at the outreach locations and diagnosed with goiters who have had no prior neck surgeries, are euthyroid, have no locally advanced malignancies or intrathoracic goiters, have adequate social support, possess a telephone, and have accommodation within the local government area where the outreach is carried out were included in the study. Exclusion criteria included patients who did not satisfy any of the above listed inclusion criteria. Thyroidectomy was done through a standard cervicotomy. Descriptive statistics were applied.Results: A total of 81 patients with non-toxic goiters had thyroid surgery. There were 76 (94%) females and five (6%) males. Average age was 46 years. Sixty-nine (85.2%) patients had no complication, while 12 (14.8%) patients had complications. Seventy-seven (95.1%) patients were discharged within 24 hours of surgery, while four (9.4%) patients were discharged within 48 hours. There was no mortality.Conclusions: The short-stay thyroidectomy model is feasible and safe in our environment, even in the presence of limited resources, and provides an alternative to the traditional 72 hour postoperative hospital stay.


2015 ◽  
Vol 2 (2) ◽  
pp. 9-15
Author(s):  
Balasubramanian T

In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc Networks (MANETs). Due to limited resources in MANETs, to design an efficient and reliable routing strategy is still a challenge. An intelligent routing strategy is required to efficiently use the limited resources. Also the algorithms designed for traditional wired networks such as link-state or distance vector, does not scale well in wireless environment. Routing in MANETs is a challenging task and has received a tremendous amount of attention from researchers around the world. To overcome this problem a number of routing protocols have been developed and the number is still increasing day by day. It is quite difficult to determine which protocols may perform well under a number of different network scenarios such as network size and topology etc. In this paper we provide an overview of a wide range of the existing routing protocols with a particular focus on their characteristics and functionality. Also, the comparison is provided based on the routing methodologies and information used to make routing decisions. The performance of all the routing protocols is also discussed. Further this study will help the researchers to get an overview of the existing protocols and suggest which protocols may perform better with respect to varying network scenarios.


2019 ◽  
Vol 46 (2-3) ◽  
pp. 240-260
Author(s):  
Todor Hristov

Social rights are essentially rights to the betterment of life. And because of this, they lack any internal principle of limitation. Socialist governments recognized social rights as the core of human rights and therefore as legal rights, the implementation of which was a matter of obligation rather than policy. However, since the governments commanded limited resources, they had to limit the implementation of social rights. The article describes the ad hoc limitations on the implementation of social rights, developed by the Bulgarian Communist Party, which brought forth their transformation into instruments of government, and their appropriation by different forms of counter-conduct.


2008 ◽  
Vol 4 (1) ◽  
pp. 3
Author(s):  
Helena Rifa-Pous ◽  
Jordi Herrera-Joancomarti

In ad hoc networks, due to the lack of a dedicated network infrastructure, members have to collaborate ones with the others to support the basic networking functions that allowthem to communicate. The main challenge of this model iscombating the intrinsic selfish behavior of the participants,which are usually equipped with handheld and mobile devices with limited resources. In this paper, a forwarding protocol is presented that stimulates the cooperation through a mechanism that combines both credit and reputation-based solutions. A micropayment protocol is used to charge and reward the applier and forwarders of a transmission respectively. The credits obtained for collaboration not only are a mean to pay for network services, but are a symbol of the cooperative range of a node. Using this information, the presented model benefits most cooperative nodes with preferential transmission channels and a higher quality of service. The model is suited for plain and cluster-based ad hoc networks.


Sign in / Sign up

Export Citation Format

Share Document