Table of Contents
International Scholarly Research Notices
Volume 2014 (2014), Article ID 730760, 8 pages
http://dx.doi.org/10.1155/2014/730760
Research Article

Healthcare Supported by Data Mule Networks in Remote Communities of the Amazon Region

1Centro de Ciências Exatas e Tecnologia, Universidade da Amazônia, 66060-902 Belém, PA, Brazil
2Department of Computer Science, University of Arizona, Tucson, AZ 85721-0077, USA
3Computer Science and Engineering, CIDSE, Arizona State University, Tempe, AZ 85287-8809, USA

Received 16 May 2014; Revised 3 September 2014; Accepted 15 September 2014; Published 30 October 2014

Academic Editor: Jehn Ruey Jiang

Copyright © 2014 Mauro Margalho Coutinho et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. C. Shah, S. Roy, S. Jain, and W. Brunette, “Data MULEs: modeling and analysis of a three-tier architecture for sparse sensor networks,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 215–233, 2003. View at Publisher · View at Google Scholar · View at Scopus
  2. RFC 4838, “Delay-Tolerant Networking Architecture,” 2007, http://tools.ietf.org/html/rfc4838.
  3. “Map of Marajó Archipelago,” 2014, https://www.google.com.br/maps/place/Arquip%C3%A9lago+do+Maraj%C3%B3%20,+%20PA/@-0.9950443,-50.0457297,9z/data=!4m2!3m1!1s0x9298b193c0b8372d:0x5aba6a2a87297515%3E.09/01/2014.
  4. IBGE, Censo 2010, http://www.censo2010.ibge.gov.br/.
  5. M. M. Coutinho, T. Moreira, E. Silva, A. Efrat, and T. Johnson, “Work in progress: a new proposal of data mule network focused on Amazon riverine population,” in Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition (ExtremeCom '11), ACM, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Sundararaj and P. Vellaiyan, “An overview of Alagappa University delay tolerant water monitoring network,” International Journal of Computer Science and Network Security, vol. 10, no. 5, p. 19, 2010. View at Google Scholar
  7. G. Anastasi, M. Conti, and M. D. Francesco, “Data collection in sensor networks with data mules: an integrated simulation analysis,” in Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC '08), pp. 1096–1102, IEEE, July 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Keränen, J. Ott, and T. Kärkkäinen, “The ONE simulator for DTN protocol evaluation,” in Proceedings of the 2nd International Conference on Simulation Tools and Techniques (Simutools '09), Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2009.
  9. A. Pentland, R. Fletcher, and A. Hasson, “Daknet: rethinking connectivity in developing nations,” Computer, vol. 37, no. 1, pp. 78–83, 2004. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Naidu, S. Chintada, M. Sen, and S. Raghavan, “Challenges in deploying a delay tolerant network,” in Proceedings of the 3rd ACM workshop on Challenged networks (CHANTS '08), pp. 65–71, ACM, September 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. L. Viet-Duc, H. Scholten, and P. Havinga, “Evaluation of opportunistic routing algorithms on opportunistic mobile sensor networks with infrastructure assistance,” International Journal on Advances in Networks and Services, vol. 5, no. 3-4, pp. 279–290, 2012. View at Google Scholar
  12. I. Christian, C. H. W. Oey, and S. Moh, “A simple temporal node mobility model for performance analysis in delay tolerant networks,” Journal of Communications and Information Sciences, vol. 3, no. 3, pp. 200–206, 2013. View at Publisher · View at Google Scholar
  13. Q. Wang and Z. J. Haas, “Analytical model of epidemic routing for delay-tolerant networks,” in Proceedings of the 1st ACM Workshop on High Performance Mobile Opportunistic Systems, pp. 1–8, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. O. Khalid, S. U. Khan, J. Kolodziej et al., “A checkpoint based message forwarding approach for opportunistic communication,” in Proceedings of the 26th European Conference on Modelling and Simulation, (ECMS '12), June 2012. View at Scopus
  15. A. C. Smith, M. Bensink, N. Armfield, J. Stillman, and L. Caffery, “Telemedicine and rural health care applications,” Journal of Postgraduate Medicine, vol. 51, no. 4, pp. 286–293, 2005. View at Google Scholar · View at Scopus
  16. P. S. Pandian, K. P. Safeer, D. T. I. Shakunthala, P. Gopal, and V. C. Padaki, “Store and forward applications in telemedicine for wireless IP based networks,” Journal of Networks, vol. 2, no. 6, pp. 58–65, 2007. View at Google Scholar · View at Scopus
  17. P. Corr, I. Couper, S. J. Beningfield, and M. Mars, “A simple telemedicine system using a digital camera,” Journal of Telemedicine and Telecare, vol. 6, no. 4, pp. 233–236, 2000. View at Publisher · View at Google Scholar · View at Scopus
  18. Z.-P. Ho and C.-S. Wu, “Application of simulated annealing algorithm to optimization deployment of mobile wireless base stations,” Advances in Intelligent and Soft Computing, vol. 169, no. 2, pp. 665–670, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. A. Kalyanpur, V. P. Neklesa, D. T. Pham, H. P. Forman, S. T. Stein, and J. A. Brink, “Implementation of an international teleradiology staffing model,” Radiology, vol. 232, no. 2, pp. 415–419, 2004. View at Publisher · View at Google Scholar · View at Scopus
  20. “IDESP (Institute of Economic, Social and Environmental Development of Pará),” http://www.idesp.pa.gov.br/.
  21. “The Network Simulator ns-2,” 2012, http://www.isi.edu/nsnam/ns.
  22. L. Begg, F. Y. Chan, G. Edie, R. Hockey, and R. Wootton, “Minimum acceptable standards for digital compression of a fetal ultrasound video-clip,” Journal of Telemedicine and Telecare, vol. 7, supplement 2, pp. 88–90, 2001. View at Publisher · View at Google Scholar · View at Scopus
  23. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: an efficient routing scheme for intermittently connected mobile networks,” in Proceedings of the ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN '05), pp. 252–259, ACM, August 2005. View at Publisher · View at Google Scholar · View at Scopus
  24. M. Ababou, R. Elkouch, M. Bellafkih, and N. Ababou, “New strategy to optimize the performance of epidemic routing protocol,” International Journal of Computer Applications, vol. 92, no. 7, pp. 27–33, 2014. View at Google Scholar
  25. N. Rahnavard, B. N. Vellambi, and F. Fekri, “Rateless codes with unequal error protection property,” IEEE Transactions on Information Theory, vol. 53, no. 4, pp. 1521–1532, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  26. D. J. C. MacKay, “Fountain codes,” IEE Proceedings-Communications, vol. 152, no. 6, pp. 1062–1068, 2005. View at Google Scholar