Faculty Members researchs

You are here

Sales Force Management MURAMALLA VENKATA SAI SRINIVASA RAO

Because of bifercation of states such as Andhra Pradesh and Telangana in India based on linguistic backgrounds of both states, the promotion of products in these two markets was become difficult in the context of personal selling.  Sales force of these two states would confront some problems of language.  A research is needed to identify the barriers of communication between sales force and customers in these two states. 

...
Embedding Expert System in Embedded system : software and hardware implementation and co-design Faouzi Sadek Maddouri
Approche d’Analyse de Risque SpatialiséePublié le 20 août 2016

Rule based expert systems are more flexible on one hand, on an other hand embedded ststems are offen and usually far from human expert control and operates under a real time constraints. This is an real autonomy need for these systems to be controlled by themself.

A deal within hardware implementation and software implementation need to be considered at this level to get at once flexibility and performance.

...
A Spatial Risk Analysis approach : an hybrid methodoly Faouzi Sadek Maddouri

Ce papier décrit le concept d’utilisation des operateurs algébriques et topologiques utilisés dans les systèmes d’analyse spatial des données, l’adaptation d’un modèle mathématique et algébrique dans l’analyse des risques de sécurité dans les réseaux locaux d’entreprises. Il évoque entre autres et discute les règles de calcul sou jacentes, les limites éventuelles et perspectives de telle approche. Les indicateurs synthétiques d’une analyse de risque classique, traditionnellement, jugent du niveau de risque, mais ne le situe pas sur le  terrain. D’où le besoin de localiser les zones à risque, et créer une carte géographique ou un plan de représentation spatiale du risque selon ces indicateurs.

En résultat, on devra s’attendre à une analyse de risque statistique, analytique et métrique classique, mais aussi et en plus, des indicateurs spatiaux des risques, une cartographie physique des zones de risque (Fig.4) et un tableau de bord de suivie et de simulation de situation. Cette approche est développée et investie dans un contexte d’être utilisé comme base de sécurité de l’informatique embarquée, mobile et invasive/ubiquitaire.

...
Contribution of embedded system and invasive computing in security policy Faouzi Sadek Maddouri

Jusqu'à une époque récente, les systèmes embarqués étaient réservés aux utilisations professionnelles à usage limité. De nos jours ces derniers envahissent tous les milieux : de l’espace de la vie quotidienne (maisons, villes, véhicules, moyens de transports, etc.) aux réseaux informatiques professionnels, on parle alors couramment de systèmes ubiquitaires et d’objets environnants intelligents. Leur présence est devenue un fait omniprésent. Malgré leurs limitations en ressources, les systèmes ubiquitaires sont en train de s’améliorer et acquirent de nouvelles capacités de calcul et de stockage de plus en plus impressionnantes. Ils peuvent contenir dans les cinq prochaines années des centaines ou même des milliers de processeurs. On parle ainsi de systèmes ubiquitaires embarqués multiprocesseurs massivement parallèles.

Ainsi, les systèmes ubiquitaires peuvent avoir comme rôle de participer activement aux contrôles d’accès selon des directives émanant d’une politique de sécurité. Nous nous intéressons à ce point en étudiant deux points principaux :

La participation d’un composant embarqué à la mise en place d’une politique de sécurité.

La reconfiguration d’un composant ubiquitaire embarqué mobile pour respecter de nouvelles règles de sécurité en passant d’une zone A à une zone B disposants de deux politiques de sécurité différentes.

...
Book:Building an Energy-Efficient MAC Protocol for Wireless Sensor Networks

The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols and utilizing radio waves. With the rapid development of wireless networking, wireless sensor networks (WSNs) have been emerged which consist of large amount of small resource constrained devices; called sensors. S-MAC is a medium-access control (MAC) protocol designed for wireless sensor networks, it is different from traditional wireless MACs such as IEEE 802.11 in several ways such as energy conservation and self-configuration. A lot of protocols are designed to reduce energy consumption of the wireless sensor nodes. Periodic listen and sleep protocol, adaptive listen protocol and prolong listen protocol are examples of these protocols. In this book, a new S-MAC protocol named; "prediction S-MAC protocol" is proposed to improve the performance of the previous S-MAC protocols.

Book Details:

ISBN-13:

978-3-639-76497-0

ISBN-10:

3639764978

EAN:

9783639764970

Book language:

English

By (author) :

Mahmoud El-Sakhawy

Number of pages:

204

Published on:

2015-05-20

Category:

Data communication, networks 

...
An Adaptive Energy-Efficient Predictive S-MAC Protocol for Wireless Networks
Abstract – Extending network lifetime by energy efficient battery management is one of the most important research issues in the wireless sensor networks. Since sensor nodes are usually intended to be deployed in unattended or even hostile environments, it is almost impossible to recharge or replace their batteries. So, there are a lot of approaches that are designed to reduce the energy consumption of the wireless sensor nodes. In this paper, a new S-MAC protocol -medium access control (MAC) protocol designed for wireless sensor networks - named "predictive S-MAC protocol" is proposed to reduce the energy consumption of the sensor nodes and to improve the performance of the sensor nodes in the wireless network compared to the Adaptive Listen Protocol, and Prolong Listen Protocol. It leads to lower average packet delay, higher throughput, lower average node energy consumption and longer average node lifetime.    Keywords – Wireless Sensor Networks, Sensor Medium Access Control (S-MAC) Protocol, Periodic Listen And Sleep, Adaptive Listen, Prolong Listen, Predictive S-MAC Protocol.   I ...
مشروع تخرج للطلاب Abdullah Saad Alajmi

يهدف البحث على اضافة كل ماهو مهم ومتطلب لانهاء مشروع التخرج عن طريق موقع يتيح تواصل الطالب وعضو هيئة التدريس ويكون باشراف العميد والوكيل 

...
Building an Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks with Maximum Network Lifetime

The term wireless networking refers to technology that enables two or more computers to communicate using standard network protocols and utilizing radio waves. With the rapid development of wireless networking, wireless sensor networks (WSNs) have been emerged which consist of large amount of small resource constrained devices; called sensors. S-MAC is a medium-access control (MAC) protocol designed for wireless sensor networks, it is different from traditional wireless MACs such as IEEE 802.11 in several ways such as energy conservation and self-configuration. 

...
Building an Energy-Efficient Prediction S-MAC Protocol for Wireless Networks

With the rapid development of wireless networking and micro-electro-mechanical systems (MEMS), wireless sensor networks (WSNs) have been immerged. WSNs consist of large amount of small, low-end, resource constrained devices, called sensors. Since sensor nodes are usually intended to be deployed in unattended or even hostile environments, it is almost impossible to recharge or replace their batteries. One of the most important research issues in the wireless sensor networks is to extend the network lifetime by energy efficient battery management. So, there are a lot of approaches that are designed to reduce the power consumption of the wireless sensor nodes. In this paper; a new protocol named "prediction S-MAC protocol" is proposed to reduce the power consumption of the wireless sensor nodes and to improve their performance compared to the previous S-MAC protocols.

...
Prediction S-MAC protocol for Wireless Networks

   A wireless sensor node, being a microelectronic device, can only be equipped with limited power sources, e.g., batteries. Since wireless sensors are usually intended to be deployed in unattended or even hostile environments, it is almost impossible to recharge or replace their batteries. The lifetime of a sensor node is much dependent on its power consumption. Hence, energy efficiency is of highly concern to the wireless sensor networks design.

In this paper a prolong listening protocol is studied. This protocol is increasing both throughput and average node life while decreasing both average packet delay and average node power consumption compared to both periodic listen & sleep and adaptive listen protocols. A new protocol named prediction S-MAC protocol is proposed to improve the performance parameters of the existing S-MAC protocols. Simulation results show that prediction S-MAC protocol increases both throughput and average node life while decreasing both delay and average node power consumption compared to prolong listening protocol.

Key words: Wireless sensor network; Sensor medium access control (S-MAC) protocol; periodic listen and sleep; adaptive listen; prolong listen; prediction S-MAC protocol; network life.

...
QR Code for https://cbah.psau.edu.sa/en/sources/research