Browsing by Author "Madanian, S."
Now showing items 1-5 of 5
-
A cluster-driven energy routing protocol for optimal network lifetime in ad hoc networks
Airehrour, David; Cherrington, M.; Madanian, S. (Telecommunications Association Inc., 2019-06-11)Mobile Ad hoc Network (MANET) is a group of networked mobile devices working in a cooperative manner. Due to usage, these devices quickly run out of battery power in critical situations and consequently fail in packet ... -
Designing a memory-aid and reminder system for dementia patients and older adults
Airehrour, David; Madanian, S.; Abraham, A. M. (2018-05)The United Nations statistics show that our society is rapidly aging, and this has led to the surge in the development of assisted living technologies. Of note is the minimal attention given to the assisted living technologies ... -
mHealth and big-data integration: promises for healthcare system in India
Madanian, S.; Parry, D.; Airehrour, David; Cherrington, M. (BCS, the Chartered Institute for IT, and published by BMJ, 2019-08-23)BACKGROUND The use of mobile devices in health (mobile health/mHealth) coupled with related technologies promises to transform global health delivery by creating new delivery models that can be integrated with existing ... -
Reducing ICT carbon footprints through adoption of green computing
Airehrour, David; Cherrington, Marianne; Madanian, S.; Singh, Jagjeet (Academy of Economic Studies in Bucharest. Department of Economic Informatics and Cybernetics, 2019-05)A significant economic, environmental and sustainability topic in information and communication technology (ICT) and e-business sectors is green computing. An aspect of green informatics, green computing is gaining attention ... -
Social engineering attacks and countermeasures in the New Zealand banking system : advancing a user-reflective mitigation model
Airehrour, David; Nair, N.K.C.; Madanian, S. (MDPI (Multidisciplinary Digital Publishing Institute), 2018-05-03)Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in ...