Energy Efficiency: WSNs are typically powered by batteries or other low-power sources, and so energy efficiency is a crucial consideration in data dissemination. Techniques such as data aggregation, compression, and clustering can be used to reduce the amount of data transmitted and conserve energy.
Reliability: Data dissemination in WSNs must be reliable, meaning that all nodes in the network receive the necessary data without loss or duplication. Techniques such as error detection and correction can be used to ensure reliability.
Scalability: WSNs can range in size from a few nodes to thousands or even millions of nodes. Data dissemination techniques must be scalable to accommodate the number of nodes in the network.
Security: WSNs are vulnerable to security threats, such as eavesdropping, tampering, and denial of service attacks. Techniques such as encryption and authentication can be used to ensure the security of data dissemination.
Adaptability: WSNs must be adaptable to changing conditions in the environment, such as changes in the number and location of nodes, changes in data rates, and changes in network topology. Techniques such as dynamic routing and load balancing can be used to adapt to these changes.
QoS Requirements: In some applications, data dissemination may have Quality of Service (QoS) requirements such as delay, throughput, or reliability. Techniques such as priority scheduling and traffic shaping can be used to ensure that QoS requirements are met.
The data dissemination is a method of distributing or transmitting the statistical or another type of data to the end-users. The data can be in the form of audio, video or any other data services. Organizations use many ways to release data to the public, such as electronic format, CD-ROM and paper publications, i.e., PDF files based on aggregated data. Mobile devices receive output data. A mobile device can select, tune and cache the required data items, which can be used for application programs.
Nowadays, the most popular dissemination method is non-proprietary open systems using internet protocols. There are various communication infrastructures that can be used in data dissemination across any set of interconnected networks. Data is made available in standard open formats.
Some organizations use proprietary databases to disseminate the data in order to protect the sovereignty and copyright of the data. If you use proprietary databases to disseminate the data, it requires specific software for end-users to view the data. This type of transmitted data cannot be open in common open formats. This type of data is first converted into the proprietary data format, and then the organization provides specifically designed software to their user to read the data.
Standards were developed to provide an internationally accepted statistical methodology for the dissemination of statistical data. The 'International Organization for Standardization' (ISO) is an international standard-setting body with many representatives from various national standards organizations.
Communication asymmetry is one of the key aspects of dissemination-based applications. The Communications Asymmetry specifies that the communication capacity or data volume going towards servers-to-clients (also known as downstream direction) is much greater than that in going towards clients-to servers (also known as upstream direction).
Content delivery is always an asymmetric process. it doesn't matter whether it is performed over a symmetric channel such as the internet or over an asymmetric channel, such as a cable television (CATV) network.
The mobile communication between a static computer system and a mobile device is intrinsically asymmetric. A device is always allocated a limited bandwidth because there are a large number of devices that have to access the network. The bandwidth in the downstream direction is much larger than in the upstream direction. It is because mobile devices have limited power resources. It is also a fact that faster data transmission rates for long intervals of time would use greater power dissipation from the devices. The data transmission rates go up to a maximum of 14.4 kbps for both uplink and downlink direction in GSM networks. It is an example of symmetric communication, and this symmetry is maintained because GSM is only used for voice communication.
To ensure all articles meet the trusted and respected high standards of IEEE publications they undergo a rigorous peer review process to assess the originality and technical correctness of the article IEEE Access has an average acceptance rate of 27 comparable to other top IEEE journals
All published IEEE Access articles have usage and citation information available to readers The usage includes PDF downloads and HTML views and is updated on a monthly basis Usage is broken down into overall usage and by month/year Citations are also available for each published article
IEEE Access accepts multidisciplinary and interdisciplinary articles covering all IEEE fields of interest The journal is ideal for articles that do not fit neatly in traditional journals while having the prestige of being published by the IEEE
Authors using government research funding or university consortium funding may be required to publish in OA journals IEEE Access offers these authors a broadscoped alternative to the more narrowly focused IEEE fully Open Access topical journals
IEEE Access encourages submission of video to be published with the article on IEEE Xplore Video can be a great tool to enhance and promote your article Videos may be simulations demonstrations interviews with experts or a presentation of the technology Video must be sent to peer review with your manuscript for evaluation For more information on video integration please visit our FAQ
Share your thoughts and questions on articles through the commenting feature on IEEE Access the only IEEE journal to offer this feature Users may post comments questions videos images or links to other published articles Comments are moderated for appropriateness
With the application of mobile computing, there could be more intelligent ways to sense and collect data, and to reduce the workload of participants. In addition, the scale of data sensing, collection and dissemination could increase. Mobile computing makes full use of various sensing devices, such as smart phones, wireless body sensors, smart sensing devices in manufacturing, and smart meters. These devices, which sense and collect data (on the order of zettabytes in the near future), together with the computing power of mobile devices, develop a new paradigm to data sensing, collection and dissemination. Mobile Computing has emerged as a prospective computing paradigm to pave the way to pervasive computing for mobile and big-data applications.
To ensure intelligent data sensing, data collection and data processing based on mobile computing over the pervasive computing environment, there are some fundamental challenges. Many open issues remain unresolved, such as how to achieve the expected performance for intelligent data sensing, data collection, data processing, and how to ensure the data quality, data reliability, information security and privacy in data collection/dissemination with intelligence. Other relevant aspects should also be studied, such as the computation cost, the platform, tools, service discovery, data management, and analytics for intelligent data collection and dissemination. These unresolved issues have been major research hotspots for many researchers since they are critical to ensuring rigid and efficient applications for intelligent data sensing, collection and dissemination in mobile computing.
To tackle the above issues and challenges, this Special Section in IEEE Access will present innovative solutions and recent advances in the domain of intelligent data sensing, collection and dissemination in mobile computing, which will provide a guide for the application and future research of mobile computing.
Entrant must submit a video with an article submission to IEEE Access. The video submission must clearly be relevant to the submitted manuscript. Only videos that accompany an article that is accepted for publication in IEEE Access will qualify. The video may be simulations, demonstrations, or interviews with other experts, for example. Your video file should not exceed 100 MB.
Entrants who have already submitted a manuscript to IEEE Access without a video can still submit a video for inclusion in this Award so long as the video is submitted within 7 days of the article submission date. The video can be submitted via email to the article administrator. All videos must undergo peer review and be accepted along with the article submission. Videos may not be submitted after an article has already been accepted for publication.
The prize(s) for the Award are being sponsored by IEEE. No cash in lieu of prize or substitution of prize permitted, except that Sponsor reserves the right to substitute a prize or prize component of equal or greater value in its sole discretion for any reason at time of award. Sponsor shall not be responsible for service obligations or warranty (if any) in relation to the prize(s). Prize may not be transferred prior to award. All other expenses associated with use of the prize, including, but not limited to local, state, or federal taxes on the Prize, are the sole responsibility of the winner. Winner(s) understand that delivery of a prize may be void where prohibited by law and agrees that Sponsor shall have no obligation to substitute an alternate prize when so prohibited. Amazon is not a sponsor or affiliated with this Award.
Upon selecting a winner, the Sponsor will notify the winner via email. All potential winners will be notified via their email provided to the sponsor. Potential winners will have five (5) business days to respond after receiving initial prize notification or the prize may be forfeited and awarded to an alternate winner. Potential winners may be required to sign an affidavit of eligibility, a liability release, and a publicity release. If requested, these documents must be completed, signed, and returned within ten (10) business days from the date of issuance or the prize will be forfeited and may be awarded to an alternate winner. If prize or prize notification is returned as undeliverable or in the event of noncompliance with these Official Rules, prize will be forfeited and may be awarded to an alternate winner.
7fc3f7cf58