Peer-Based Collaborative Caching and Prefetching in Mobile Broadcast

Author(s):  
Wei Wu ◽  
Kian-Lee Tan

Caching and prefetching are two effective ways for mobile peers to improve access latency in mobile environments. With short-range communication such as IEEE 802.11 and Bluetooth, a mobile peer can communicate with neighboring peers and share cached or prefetched data objects. This kind of cooperation improves data availability and access latency. In this chapter the authors review several cooperative caching and prefetching schemes in a mobile environment that supports broadcasting. They present two schemes in detail: CPIX (Cooperative PIX) and ACP (Announcement-based Cooperative Prefetching). CPIX is suitable for mobile peers that have limited power and access the broadcast channel in a demand-driven fashion. ACP is designed for mobile peers that have sufficient power and prefetch from the broadcast channel. They both consider the data availability in local cache, neighbors’ cache, and on the broadcast channel. Moreover, these schemes are simple enough so that they do not incur much information exchange among peers and each peer can make autonomous caching and prefetching decisions.

Author(s):  
Wei Wu ◽  
Kian-Lee Tan

Caching and prefetching are two effective ways for mobile peers to improve access latency in mobile environments. With short-range communication such as IEEE 802.11 and Bluetooth, a mobile peer can communicate with neighboring peers and share cached or prefetched data objects. This kind of cooperation improves data availability and access latency. In this chapter the authors review several cooperative caching and prefetching schemes in a mobile environment that supports broadcasting. They present two schemes in detail: CPIX (Cooperative PIX) and ACP (Announcement-based Cooperative Prefetching). CPIX is suitable for mobile peers that have limited power and access the broadcast channel in a demand-driven fashion. ACP is designed for mobile peers that have sufficient power and prefetch from the broadcast channel. They both consider the data availability in local cache, neighbors’ cache, and on the broadcast channel. Moreover, these schemes are simple enough so that they do not incur much information exchange among peers and each peer can make autonomous caching and prefetching decisions.


2020 ◽  
Vol 4 (4) ◽  
pp. 3-78 ◽  
Author(s):  
Christina Leb

AbstractCross-border data and information exchange is one of the most challenging issues for transboundary water management. While the regular exchange of data and information has been identified as one of the general principles of international water law, only a minority of treaties include direct obligations related to mutual data exchange. Technological innovations related to real-time data availability, space technology and earth observation have led to an increase in quality and availability of hydrological, meteorological and geo-spatial data. These innovations open new avenues for access to water related data and transform data and information exchange globally. This monograph is an exploratory assessment of the potential impacts of these disruptive technologies on data and information exchange obligations in international water law.


Author(s):  
Kuo-Chi Fang ◽  
Husnu S. Narman ◽  
Ibrahim Hussein Mwinyi ◽  
Wook-Sung Yoo

Due to the growth of internet-connected devices and extensive data analysis applications in recent years, cloud computing systems are largely utilized. Because of high utilization of cloud storage systems, the demand for data center management has been increased. There are several crucial requirements of data center management, such as increase data availability, enhance durability, and decrease latency. In previous works, a replication technique is mostly used to answer those needs according to consistency requirements. However, most of the works consider full data, popular data, and geo-distance-based replications by considering storage and replication cost. Moreover, the previous data popularity based-techniques rely on the historical and current data access frequencies for replication. In this article, the authors approach this problem from a distinct aspect while developing replication techniques for a multimedia data center management system which can dynamically adapt servers of a data center by considering popularity prediction in each data access location. Therefore, they first label data objects from one to ten to track access frequencies of data objects. Then, they use those data access frequencies from each location to predict the future access frequencies of data objects to determine the replication levels and locations to replicate the data objects, and store the related data objects to close storage servers. To show the efficiency of the proposed methods, the authors conduct an extensive simulation by using real data. The results show that the proposed method has an advantage over the previous works in terms of data availability and increases the data availability up to 50%. The proposed method and related analysis can assist multimedia service providers to enhance their service qualities.


Author(s):  
O. A. Ostroumov ◽  
A. D. Sinyuk

The tasks of secure generating, distributing, and delivering keys to telecommunications systems correspondents that use cryptographic methods to protect information, along with accounting tasks, use order, and keys destruction are fundamental to the key life cycle task list. Traditionally, they are solved using secure communication channels, which is not economical, not always timely and in certain conditions impossible. The alternatives are key negotiation methods by transmitting information over open communication channels. The information efficiency accurate estimates are represented for some methods of open key agreement between two legitimate correspondents. They are not known for the network key formation conditions. The study purpose: an evidence-based search for potential evaluations of the open network key generation information effectiveness. The results: based on a set of represented results (including problem statement, intruder models development, channel connectivity, coder, decoder, system of quality indicators and key forming method requirements, key generation method, the network key generation asymptotic information efficiency index, proof key capacity theorem), an asymptotic information efficiency index estimate of a network key forming was made, which the key network bandwidth measurement based on the information exchange on a binary broadcast channel of communication with the component channels described by discrete symmetric channels models is proposed. Besides, Broadcast channel entropy function influence on the estimate is investigated. The pattern determining the network key forming possibility that meets the requirements is identified. The connection of the results with known scientific research is identified. The areas for further research are identified. The practical significance: the obtained results develop the wellknown scientific results in the field of the open key agreement theory and can be useful to specialists in the design and construction field of promising key management subsystems of modern cryptographic information protection systems that provide a closed telecommunication systems information exchange.


1989 ◽  
Vol 28 (02) ◽  
pp. 97-103 ◽  
Author(s):  
L. GierI ◽  
R. Greiller ◽  
Th. Landersdorfer ◽  
H. Müller ◽  
K. Überla

Abstract:The crucial feature of future communication systems in hospitals will be the heterogeneity between the individual systems. People working in a hospital do not communicate via data objects, but via highly complex functions like preparation of a patient report or diagnosis of patients’ symptoms and signs. Essentially such tasks are accomplished by initiating remote functions in various modes of a communication system. The aim of the MEDAS protocol developed by our group is to propose a definition of such a high-level medical protocol and then to implement it. Our user-oriented protocol permits information exchange between heterogeneous systems. Modules and functions are defined. Message passing to and from a processor is realized using ports. The protocol sequence of every communication request is described. The relation of ports to the ISO model is specified. First experiences in a network for a medical school are reported.


Author(s):  
Adriano Pereira ◽  
Iara Augustin

Emotions play a very important role in the learning process. Affective computing studies try to identify users’ affective state, as emotion, using affect models and affect detection techniques, in order to improve human-computer interactions, as in a learning environment. The Internet explosion makes a huge volume of information, including learning objects data, available. In this scenario, recommendation systems help users by selecting and suggesting probable interesting items, dealing with large data availability and decision making problems, and customizing users’ interaction. In u-learning context, students could learn anywhere and anytime, having different options of data objects available. Since different students have different preferences and learning styles, personalization becomes an important feature in u-learning systems. Considering all this, the authors propose the Affective-Recommender, a learning object recommendation system. In this chapter, they describe the system’s requirements and architecture, focusing on affect detection and the recommendation algorithm, an example of use case, and results of system implementation over Moodle LMS.


2019 ◽  
Author(s):  
Matthias Görges ◽  
Nicholas C West ◽  
Christian L Petersen ◽  
J Mark Ansermino

BACKGROUND In the perioperative environment, a multidisciplinary clinical team continually observes and evaluates patient information. However, data availability may be restricted to certain locations, cognitive workload may be high, and team communication may be constrained by availability and priorities. We developed the remote Portable Operating Room Tracker app (the telePORT app) to improve information exchange and communication between anesthesia team members. The telePORT app combines a real-time feed of waveforms and vital signs from the operating rooms with messaging, help request, and reminder features. OBJECTIVE The aim of this paper is to describe the development of the app and the back-end infrastructure required to extract monitoring data, facilitate data exchange and ensure privacy and safety, which includes results from clinical feasibility testing. METHODS telePORT’s client user interface was developed using user-centered design principles and workflow observations. The server architecture involves network-based data extraction and data processing. Baseline user workload was assessed using step counters and communication logs. Clinical feasibility testing analyzed device usage over 11 months. RESULTS telePORT was more commonly used for help requests (approximately 4.5/day) than messaging between team members (approximately 1/day). Passive operating room monitoring was frequently utilized (34% of screen visits). Intermittent loss of wireless connectivity was a major barrier to adoption (decline of 0.3%/day). CONCLUSIONS The underlying server infrastructure was repurposed for real-time streaming of vital signs and their collection for research and quality improvement. Day-to-day activities of the anesthesia team can be supported by a mobile app that integrates real-time data from all operating rooms.


2009 ◽  
pp. 3012-3020
Author(s):  
R. C. Joshi ◽  
Manoj Misra ◽  
Narottam Chand

Caching at the mobile client is a potential technique that can reduce the number of uplink requests, lighten the server load, shorten the query latency and increase the data availability. A cache invalidation strategy ensures that any data item cached at a mobile client has same value as on the origin server. Traditional cache invalidation strategies make use of periodic broadcasting of invalidation reports (IRs) by the server. The IR approach suffers from long query latency, larger tuning time and poor utilization of bandwidth. Using updated invalidation report (UIR) method that replaces a small fraction of the recent updates, the query latency can be reduced. To improve upon the IR and UIR based strategies, this chapter presents a synchronous stateful cache maintenance technique called Update Report (UR). The proposed strategy outperforms the IR and UIR strategies by reducing the query latency, minimizing the disconnection overheads, optimizing the use of wireless channel and conserving the client energy.


2011 ◽  
Vol 02 (03) ◽  
pp. 263-269 ◽  
Author(s):  
J. Shapiro ◽  
S. Vaidya ◽  
G. Kuperman ◽  
N. Genes

Summary Objectives: Emergency physicians are trained to make decisions quickly and with limited patient information. Health Information Exchange (HIE) has the potential to improve emergency care by bringing relevant patient data from non-affiliated organizations to the bedside. NYCLIX (New York CLinical Information eXchange) offers HIE functionality among multiple New York metropolitan area provider organizations and has pilot users in several member emergency departments (EDs). Methods: We conducted semi-structured interviews at three participating EDs with emergency physicians trained to use NYCLIX. Among “users” with > 1 login, responses to questions regarding typical usage scenarios, successful retrieval of data, and areas for improving the interface were recorded. Among “non-users” with ≤1 login, questions about NYCLIX accessibility and utility were asked. Both groups were asked to recall items from prior training regarding data sources and availability. Results: Eighteen NYCLIX pilot users, all board certified emergency physicians, were interviewed. Of the 14 physicians with more than one login, half estimated successful retrieval of HIE data affecting patient care. Four non-users (one login or less) cited forgotten login information as a major reason for non-use. Though both groups made errors, users were more likely to recall true NYCLIX member sites and data elements than non-users. Improvements suggested as likely to facilitate usage included a single automated login to both the ED information system (EDIS) and HIE, and automatic notification of HIE data availability in the EDIS All respondents reported satisfaction with their training. Conclusions: Integrating HIE into existing ED workflows remains a challenge, though a substantial fraction of users report changes in management based on HIE data. Though interviewees believed their training was adequate, significant errors in their understanding of available NYCLIX data elements and participating sites persist.


Sign in / Sign up

Export Citation Format

Share Document