Mobile Ad-hoc Network (MANET) is a compilation of independent wireless mobile nodes which animatedly forms a temporary network without use of any fixed infrastructure or centralized management. A major anxiety that affects such a network that characterized by dynamically changing topology is the performance, where routing with robustness performance is one of the key challenges in deploying MANET. In this work we concentrate on routing protocols which are widely used in MANET, Destination Sequenced Distance vector (DSDV), Dynamic Source Routing(DSR) and Ad hoc On demand Distance Vector(AODV) routing protocols that are widely simulated in this paper using different scenarios in terms of different Traffic types, constant bit rate(CBR), variable bit rate(VBR) then combining both classes in one scenario to scrutinize the impact of this combination. Routing protocols are analyzed against several performance metrics, Average energy consumption, Average throughput, Normalized routing load (NRL), packet delivery fraction(PDF) and total dropped packets(TDP). Combined traffic results pronounce that DSR and AODV exhibit better behaviors overall the performance metrics examined.
{"title":"Extensive Simulation Performance Analysis for DSDV, DSR and AODV MANET Routing Protocols","authors":"Q. Razouqi, A. Boushehri, M. Gaballah, L. Alsaleh","doi":"10.1109/WAINA.2013.239","DOIUrl":"https://doi.org/10.1109/WAINA.2013.239","url":null,"abstract":"Mobile Ad-hoc Network (MANET) is a compilation of independent wireless mobile nodes which animatedly forms a temporary network without use of any fixed infrastructure or centralized management. A major anxiety that affects such a network that characterized by dynamically changing topology is the performance, where routing with robustness performance is one of the key challenges in deploying MANET. In this work we concentrate on routing protocols which are widely used in MANET, Destination Sequenced Distance vector (DSDV), Dynamic Source Routing(DSR) and Ad hoc On demand Distance Vector(AODV) routing protocols that are widely simulated in this paper using different scenarios in terms of different Traffic types, constant bit rate(CBR), variable bit rate(VBR) then combining both classes in one scenario to scrutinize the impact of this combination. Routing protocols are analyzed against several performance metrics, Average energy consumption, Average throughput, Normalized routing load (NRL), packet delivery fraction(PDF) and total dropped packets(TDP). Combined traffic results pronounce that DSR and AODV exhibit better behaviors overall the performance metrics examined.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124831363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Taleb, M. Dia, Jamal Farhat, Z. Dawy, Hazem M. Hajj
In this paper, we consider the design of 3G/WiFi heterogeneous networks under realistic operational conditions. The aim is reduce the energy consumed from batteries on mobile devices by utilizing the multiple available wireless interfaces and dynamically switching between 3G and WiFi. We conduct a set of experimental measurements in various network scenarios in order to identify the main components that impact energy consumption in mobile devices while connected to 3G and WiFi networks. The measurement results are then used to derive a generic analytical energy model as a function of the download data size and the effective download bit rate. A basic algorithm to switch dynamically between 3G and WiFi is designed based on the derived analytical energy model. An Android-based mobile application is developed to test the performance of the switching algorithm in real scenarios. Experimental results demonstrate notable energy reduction gains and, thus, highlight the potential benefits of intelligent switching in heterogeneous networks.
{"title":"On the Design of Energy-Aware 3G/WiFi Heterogeneous Networks under Realistic Conditions","authors":"S. Taleb, M. Dia, Jamal Farhat, Z. Dawy, Hazem M. Hajj","doi":"10.1109/WAINA.2013.115","DOIUrl":"https://doi.org/10.1109/WAINA.2013.115","url":null,"abstract":"In this paper, we consider the design of 3G/WiFi heterogeneous networks under realistic operational conditions. The aim is reduce the energy consumed from batteries on mobile devices by utilizing the multiple available wireless interfaces and dynamically switching between 3G and WiFi. We conduct a set of experimental measurements in various network scenarios in order to identify the main components that impact energy consumption in mobile devices while connected to 3G and WiFi networks. The measurement results are then used to derive a generic analytical energy model as a function of the download data size and the effective download bit rate. A basic algorithm to switch dynamically between 3G and WiFi is designed based on the derived analytical energy model. An Android-based mobile application is developed to test the performance of the switching algorithm in real scenarios. Experimental results demonstrate notable energy reduction gains and, thus, highlight the potential benefits of intelligent switching in heterogeneous networks.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Benkner, Chris Borckholder, M. Bubak, Yuriy Kaniovskyi, Richard Knight, Martin Koehler, Spiros Koulouzis, P. Nowakowski, Steven Wood
The VPH-Share project objective is to store, share, integrate, and link data, information, knowledge, and wisdom about the physiopathology of the human body to enable their reuse within the virtual physiological human community. Therefore, the projects develops a modular and generic data management platform on top of a distributed Cloud infrastructure. The data management platform enables the ontological annotation of VPH-relevant datasets, their provisioning in the Cloud, and supports different data integration approaches. In this paper we present the architecture and implementation of this VPH-Share Cloud and data management platform and we go into detail about two different data integration approaches: relational data mediation, which has been realized on top of a distributed data mediation engine, and semantic data integration, which is supported on the basis of the SPARQL federation extension. Both approaches are examined on top of a project-specific scenario executed in the VPH-Share Cloud environment.
{"title":"A Cloud-Based Framework for Collaborative Data Management in the VPH-Share Project","authors":"S. Benkner, Chris Borckholder, M. Bubak, Yuriy Kaniovskyi, Richard Knight, Martin Koehler, Spiros Koulouzis, P. Nowakowski, Steven Wood","doi":"10.1109/WAINA.2013.58","DOIUrl":"https://doi.org/10.1109/WAINA.2013.58","url":null,"abstract":"The VPH-Share project objective is to store, share, integrate, and link data, information, knowledge, and wisdom about the physiopathology of the human body to enable their reuse within the virtual physiological human community. Therefore, the projects develops a modular and generic data management platform on top of a distributed Cloud infrastructure. The data management platform enables the ontological annotation of VPH-relevant datasets, their provisioning in the Cloud, and supports different data integration approaches. In this paper we present the architecture and implementation of this VPH-Share Cloud and data management platform and we go into detail about two different data integration approaches: relational data mediation, which has been realized on top of a distributed data mediation engine, and semantic data integration, which is supported on the basis of the SPARQL federation extension. Both approaches are examined on top of a project-specific scenario executed in the VPH-Share Cloud environment.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129044416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Morimoto, Y. Fujita, Masaaki Yoshida, H. Yoshimizu, M. Takiyamada, T. Akehi, Masami Tanaka
This paper describes the construction of a smart outlet network as a system for automated energy-aware services utilizing various sensor information. With high-granularity sensing of power consumption of each electrical appliance in home, and with environmental (humidity, temperature, light) sensors and a motion sensor installed on the smart outlets, the appliances are under policy-based automatic control. The authors have deployed the system in real-life environments, and have implemented the following functions and power management policies, 1) visualization of power consumption data of appliances for enhancing energy-awareness, 2) policy-based power control utilizing various sensor information collected at the smart outlets, 3) automatic coordination of multiple or different appliances in both centralized and distributed manners.
{"title":"Smart Outlet Network for Energy-Aware Services Utilizing Various Sensor Information","authors":"N. Morimoto, Y. Fujita, Masaaki Yoshida, H. Yoshimizu, M. Takiyamada, T. Akehi, Masami Tanaka","doi":"10.1109/WAINA.2013.148","DOIUrl":"https://doi.org/10.1109/WAINA.2013.148","url":null,"abstract":"This paper describes the construction of a smart outlet network as a system for automated energy-aware services utilizing various sensor information. With high-granularity sensing of power consumption of each electrical appliance in home, and with environmental (humidity, temperature, light) sensors and a motion sensor installed on the smart outlets, the appliances are under policy-based automatic control. The authors have deployed the system in real-life environments, and have implemented the following functions and power management policies, 1) visualization of power consumption data of appliances for enhancing energy-awareness, 2) policy-based power control utilizing various sensor information collected at the smart outlets, 3) automatic coordination of multiple or different appliances in both centralized and distributed manners.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Micro-RNAs (miRNAs) are key regulators of gene expression. Their post-transcriptional regulatory role was conserved in all eukaryotes during evolution. However, the genomic location of conserved miRNA genes has not been studied in the context of genetic network evolution. This study is based on the data mining of miRNA and genomic annotation databases. An individual retrieval of the genomic location of the 3,216 miRNA genes annotated in Danio rerio, Xenopus tropicalis, Rattus norvegicus, Mus musculus and Homo sapiens genome was performed. Despite a fairly constant proportion of protein coding sequences in vertebrates, approximately 60% of the conserved intergenic miRNA genes reported in zebra fish shift to an intragenic location in human genome. This phenomenon may be explained by duplication and/or transposition mechanisms. The increase of tight regulatory units in higher vertebrates, in which targets of intragenic miRNAs are within the host gene network, emphasized the importance of miRNAs and probably led to the appearance of oncogenic miRNAs (oncomiRs) that are mainly intragenic.
{"title":"Data Mining Based Analysis of Genomic Location Shifts of Conserved Annotated miRNA Genes gives Preliminary Insights on Molecular Network Evolution","authors":"F. Michon","doi":"10.1109/WAINA.2013.263","DOIUrl":"https://doi.org/10.1109/WAINA.2013.263","url":null,"abstract":"Micro-RNAs (miRNAs) are key regulators of gene expression. Their post-transcriptional regulatory role was conserved in all eukaryotes during evolution. However, the genomic location of conserved miRNA genes has not been studied in the context of genetic network evolution. This study is based on the data mining of miRNA and genomic annotation databases. An individual retrieval of the genomic location of the 3,216 miRNA genes annotated in Danio rerio, Xenopus tropicalis, Rattus norvegicus, Mus musculus and Homo sapiens genome was performed. Despite a fairly constant proportion of protein coding sequences in vertebrates, approximately 60% of the conserved intergenic miRNA genes reported in zebra fish shift to an intragenic location in human genome. This phenomenon may be explained by duplication and/or transposition mechanisms. The increase of tight regulatory units in higher vertebrates, in which targets of intragenic miRNAs are within the host gene network, emphasized the importance of miRNAs and probably led to the appearance of oncogenic miRNAs (oncomiRs) that are mainly intragenic.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Docampo, Sabela Ramos, G. L. Taboada, Roberto R. Expósito, J. Touriño, R. Doallo
The presence of many-core units as accelerators has been increasing due to their ability to improve the performance of highly parallel workloads. General Purpose GPU(GPGPU) computing has allowed the graphical units to emerge as successful co-processors that can be employed to improve the performance of many different non-graphical applications with high parallel requirements, which make them suitable for many High Performance Computing workloads. While the main libraries developed to exploit the massive parallel capacity of GPUs are oriented to C/C++ programmers, there have been several efforts to extend this support to other languages. Among them, Java stands out for being one of the most extended languages and there are multiple projects that try to enable Java to take advantage of GPGPU computing. In this scenario, this paper presents an evaluation of the most relevant among the current solutions that exploit GPGPU computing in Java.
{"title":"Evaluation of Java for General Purpose GPU Computing","authors":"J. Docampo, Sabela Ramos, G. L. Taboada, Roberto R. Expósito, J. Touriño, R. Doallo","doi":"10.1109/WAINA.2013.234","DOIUrl":"https://doi.org/10.1109/WAINA.2013.234","url":null,"abstract":"The presence of many-core units as accelerators has been increasing due to their ability to improve the performance of highly parallel workloads. General Purpose GPU(GPGPU) computing has allowed the graphical units to emerge as successful co-processors that can be employed to improve the performance of many different non-graphical applications with high parallel requirements, which make them suitable for many High Performance Computing workloads. While the main libraries developed to exploit the massive parallel capacity of GPUs are oriented to C/C++ programmers, there have been several efforts to extend this support to other languages. Among them, Java stands out for being one of the most extended languages and there are multiple projects that try to enable Java to take advantage of GPGPU computing. In this scenario, this paper presents an evaluation of the most relevant among the current solutions that exploit GPGPU computing in Java.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123045013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Both external and internal stakeholders are asking companies and other institutions for transparency and compliance. To enforce compliance within their business processes, companies implement controls as the predominant approach to safeguard adherence to rules and regulations. Since modeling controls adequately is important, this contribution analyzes common business process modeling notations with regard to their capability to specify controls. First results show that BPMN 2.0 does not perfectly fit all requirements, however, it clearly outpaces the other languages.
{"title":"Modeling Controls for Compliance -- An Analysis of Business Process Modeling Languages","authors":"Hans Betke, K. Kittel, Stefan Sackmann","doi":"10.1109/WAINA.2013.53","DOIUrl":"https://doi.org/10.1109/WAINA.2013.53","url":null,"abstract":"Both external and internal stakeholders are asking companies and other institutions for transparency and compliance. To enforce compliance within their business processes, companies implement controls as the predominant approach to safeguard adherence to rules and regulations. Since modeling controls adequately is important, this contribution analyzes common business process modeling notations with regard to their capability to specify controls. First results show that BPMN 2.0 does not perfectly fit all requirements, however, it clearly outpaces the other languages.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alba Amato, Giuseppina Cretella, B. D. Martino, S. Venticinque
The selection of Cloud providers, whose offers best fit the requirements of a particular application, is a complex issue due to the heterogeneity of the Cloud services, resources, technology and service levels offered by the several providers. In order to support this selection and requirements specification, we have developed, in the context of the mOSAIC project, a Knowledge Base, representing resources and domain concepts and rules by means of Semantic Web Ontologies and inference rules, a support tool, the Semantic Engine, that helps the user to abstract the requirements in vendor independent way starting from application requirements or from specific vendor resources, a Cloud Agency, that compares the different offers of providers with the user proposal and retrieves the best offer. In this paper, we illustrate how the two components, the Semantic Engine and the Cloud Agency, interoperate in order to support the Cloud Application Developer to express the requirements and services/resources in vendor agnostic way, to translate automatically these requirements into a neutral format in order to compare it with providers' offers and to broker the best one according to defined policies.
{"title":"Semantic and Agent Technologies for Cloud Vendor Agnostic Resource Brokering","authors":"Alba Amato, Giuseppina Cretella, B. D. Martino, S. Venticinque","doi":"10.1109/WAINA.2013.163","DOIUrl":"https://doi.org/10.1109/WAINA.2013.163","url":null,"abstract":"The selection of Cloud providers, whose offers best fit the requirements of a particular application, is a complex issue due to the heterogeneity of the Cloud services, resources, technology and service levels offered by the several providers. In order to support this selection and requirements specification, we have developed, in the context of the mOSAIC project, a Knowledge Base, representing resources and domain concepts and rules by means of Semantic Web Ontologies and inference rules, a support tool, the Semantic Engine, that helps the user to abstract the requirements in vendor independent way starting from application requirements or from specific vendor resources, a Cloud Agency, that compares the different offers of providers with the user proposal and retrieves the best offer. In this paper, we illustrate how the two components, the Semantic Engine and the Cloud Agency, interoperate in order to support the Cloud Application Developer to express the requirements and services/resources in vendor agnostic way, to translate automatically these requirements into a neutral format in order to compare it with providers' offers and to broker the best one according to defined policies.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"82 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Vinod, V. Laxmi, M. Gaur, Smita Naval, Parvez Faruki
In this paper, we use machine learning techniques for classifying a Portable Executable (PE) file as malware or benign. This is achieved by extracting a new feature also referred to us as MultiComponent Feature composed of (a) PE metadata (b) Principal Instruction Code (PIC)(c) mnemonic bi-gram and (d) prominent unigrams that characterizes malware/benign files. Reduced feature set are obtained using feature selection and reduction methods such as Minimum Redundancy and Maximum Relevance (mRMR), Principal Component Analysis (PCA) and prominent EigenVector Feature (EVF). We demonstrate that amongst mRMR, PCA and EVF, mRMR feature selection method is suitable for extracting optimal PE attributes. The performance of our proposed method is compared with similar work reported in previous literature's and we have found that the detection rate with our methodology is found to be better compared to prior work. This suggest that the proposed method can be used effectively for the identification of malicious files.
{"title":"MCF: MultiComponent Features for Malware Analysis","authors":"P. Vinod, V. Laxmi, M. Gaur, Smita Naval, Parvez Faruki","doi":"10.1109/WAINA.2013.147","DOIUrl":"https://doi.org/10.1109/WAINA.2013.147","url":null,"abstract":"In this paper, we use machine learning techniques for classifying a Portable Executable (PE) file as malware or benign. This is achieved by extracting a new feature also referred to us as MultiComponent Feature composed of (a) PE metadata (b) Principal Instruction Code (PIC)(c) mnemonic bi-gram and (d) prominent unigrams that characterizes malware/benign files. Reduced feature set are obtained using feature selection and reduction methods such as Minimum Redundancy and Maximum Relevance (mRMR), Principal Component Analysis (PCA) and prominent EigenVector Feature (EVF). We demonstrate that amongst mRMR, PCA and EVF, mRMR feature selection method is suitable for extracting optimal PE attributes. The performance of our proposed method is compared with similar work reported in previous literature's and we have found that the detection rate with our methodology is found to be better compared to prior work. This suggest that the proposed method can be used effectively for the identification of malicious files.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116228878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pablo López, D. Fernández, A. Jara, A. Gómez-Skarmeta
This work carries out a technical survey about the technologies available for wireless communication of personal clinical devices. The technologies considered are the most extended Internet of Things technologies, they have different purposes and features in order to cover the gaps required to reach a Internet of Things ecosystem, where the clinical devices will be powered with new characteristics such as communications, alerts, analysis, and remote monitoring. These technologies are 6LoWPAN/IEEE 802.15.4, Bluetooth Low Energy (BT-LE), and Near Field Communication (NFC). Each one of these technologies has a function in the context of mhealth and eHealth. NFC is used by a patient to access their current health. BL-LE can be used to gather information from the same room, environment and pathology. And finally 6LoWPAN can be used to check the status of several rooms and even around the hospital by any IPv6 device. This work analyzes each one of the technologies and defines when each technology is more suitable.
{"title":"Survey of Internet of Things Technologies for Clinical Environments","authors":"Pablo López, D. Fernández, A. Jara, A. Gómez-Skarmeta","doi":"10.1109/WAINA.2013.255","DOIUrl":"https://doi.org/10.1109/WAINA.2013.255","url":null,"abstract":"This work carries out a technical survey about the technologies available for wireless communication of personal clinical devices. The technologies considered are the most extended Internet of Things technologies, they have different purposes and features in order to cover the gaps required to reach a Internet of Things ecosystem, where the clinical devices will be powered with new characteristics such as communications, alerts, analysis, and remote monitoring. These technologies are 6LoWPAN/IEEE 802.15.4, Bluetooth Low Energy (BT-LE), and Near Field Communication (NFC). Each one of these technologies has a function in the context of mhealth and eHealth. NFC is used by a patient to access their current health. BL-LE can be used to gather information from the same room, environment and pathology. And finally 6LoWPAN can be used to check the status of several rooms and even around the hospital by any IPv6 device. This work analyzes each one of the technologies and defines when each technology is more suitable.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123754550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}