ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (3,692)
  • 2020-2022  (247)
  • 2010-2014  (3,445)
  • 1980-1984
  • 1975-1979
  • 1950-1954
  • International Journal of Distributed Sensor Networks  (1,234)
  • IEEE Signal Processing Letters  (684)
  • 1267
  • 163708
  • Electrical Engineering, Measurement and Control Technology  (3,692)
  • Process Engineering, Biotechnology, Nutrition Technology
Collection
  • Articles  (3,692)
Years
Year
Topic
  • Electrical Engineering, Measurement and Control Technology  (3,692)
  • Process Engineering, Biotechnology, Nutrition Technology
  • 1
    Publication Date: 2020-08-01
    Description: Wireless Sensor Networks are very convenient to monitor structures or even materials, as in McBIM project (Materials communicating with the Building Information Modeling). This project aims to develop the concept of “communicating concretes,” which are concrete elements embedding wireless sensor networks, for applications dedicated to Structure Health Monitoring in the construction industry. Due to applicative constraints, the topology of the wireless sensor network follows a chain-based structure. Node batteries cannot be replaced or easily recharged, it is crucial to evaluate the energy consumed by each node during the monitoring process. This area has been extensively studied leading to different energy models to evaluate energy consumption for chain-based structures. However, no simple, practical, and analytical network energy models have yet been proposed. Energy evaluation models of periodic data collection for chain-based structures are proposed. These models are compared and evaluated with an Arduino XBee–based platform. Experimental results show the mean prediction error of our models is 5%. Realizing aggregation at nodes significantly reduces energy consumption and avoids hot-spot problem with homogeneous consumptions along the chain. Models give an approximate lifetime of the wireless sensor network and communicating concretes services. They can also be used online by nodes for a self-assessment of their energy consumptions.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2020-07-01
    Description: As concrete is a building material that is widely used in the field of infrastructure construction, and its quality is related to the quality and service life in infrastructure engineering, concrete strength is an important reference index that reflects the concrete quality. Based on this, two commercial concretes A and B are selected in Henan Province, China, to perform the concrete strength test under same condition curing and standard condition curing in the pull-out post-insert method, cubic compression, rebound method, and drilling core method. The relationships between the different curing conditions, cubic compressive strength, core sample strength, rebound strength, and pull-out force of different commercial concretes are compared and analyzed. Through a comparative analysis and while considering the convenience and accuracy requirements, the strength curves of the two different concretes based on the pull-out post-insert method were fitted and analyzed, and the local strength curve test in Henan based on the pull-out post-insert method was established. The research results provide technical support for evaluating the strength of concrete structures using the pull-out post-insert method, which has important engineering significance for improving the popularize and application of the pull-out post-insert method.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2020-07-01
    Description: This correspondence proposes a jointly-designed quasi-cyclic (QC) low-density parity-check (LDPC)-coded multi-relay cooperation with a destination node realized by multiple receive antennas. First, a deterministic approach is utilized to construct different classes of binary QC-LDPC codes with no length-4 cycles. Existing methods put some limitations in terms of code length and rate in order to provide high error-correction performance. Therefore, this article gives three classes of QC-LDPC codes based on a combinatoric design approach, known as cyclic difference packing (CDP), with flexibility in terms of code-length and rate selection. Second, the proposed CDP-based construction is utilized to jointly-design QC-LDPC codes for coded-relay cooperation. At the receiver, the destination node is realized by multiple receive antennas, where maximal-ratio combining (MRC) and sum-product algorithm (SPA)-based joint iterative decoding are utilized to decode the corrupted sequences coming from the source and relay nodes. Simulation results show that the proposed QC-LDPC coded-relay cooperations outperform their counterparts with a coding gain of about 0.25 dB at bit-error rate (BER) [Formula: see text] over a Rayleigh fading channel in the presence of additive white Gaussian noise. Furthermore, the extrinsic-information transfer (EXIT) chart analysis has been used to detect the convergence threshold of proposed jointly-designed QC-LDPC codes. Numerical analysis shows that the proposed jointly-designed QC-LDPC codes provide a better convergence as compared to their counterparts under the same conditions.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2020-07-01
    Description: Vehicular ad-hoc networks allow vehicles to exchange messages pertaining to safety and road efficiency. Building trust between nodes can, therefore, protect vehicular ad-hoc networks from malicious nodes and eliminate fake messages. Although there are several trust models already exist, many schemes suffer from varied limitations. For example, many schemes rely on information provided by other peers or central authorities, for example, roadside units and reputation management centers to ensure message reliability and build nodes’ reputation. Also, none of the proposed schemes operate in different environments, for example, urban and rural. To overcome these limitations, we propose a novel trust management scheme for self-organized vehicular ad-hoc networks. The scheme is based on a crediting technique and does not rely on other peers or central authorities which distinguishes it as an economical solution. Moreover, it is hybrid, in the sense it is data-based and entity-based which makes it capable of revoking malicious nodes and discarding fake messages. Furthermore, it operates in a dual-mode (urban and rural). The simulation has been performed utilizing Veins, an open-source framework along with OMNeT++, a network simulator, and SUMO, a traffic simulator. The scheme has been tested with two trust models (urban and rural). The simulation results prove the performance and security efficacy of the proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2020-07-01
    Description: In underwater wireless sensor networks, sensor position information has important value in network protocols and collaborative detection. However, many challenges were introduced in positioning sensor nodes due to the complexity of the underwater environment. Aiming at the problem of the stratification effect of underwater acoustic waves, the long propagation delay of messages, as well as the mobility of sensor nodes, a mobile target localization scheme for underwater wireless sensor network is proposed based on iterative tracing. Four modules are established in the mobile target localization based on iterative tracing: the data collection and rough position estimation, the estimation and compensation of propagation delay, the node localization, and the iteration. The deviation of distance estimation due to the assumption that acoustic waves propagate along straight lines in an underwater environment is compensated by the mobile target localization based on iterative tracing, and weighted least squares estimation method is used to perform linear regression. Moreover, an interacting multiple model algorithm is put forward to reduce the positioning error caused by the mobility of sensor nodes, and the two services of node time synchronization and localization assist each other during the iteration to improve the accuracy of both parties. The simulation results show that the proposed scheme can achieve higher localization accuracy than the similar schemes, and the positioning errors caused by the above three problems can be reduced effectively.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Sage Publications
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2013-09-10
    Description: This work provides a distributed fault-tolerant event region detection algorithm for wireless sensor networks. The proposed algorithm can identify faulty and fault-free sensors and ignore the abnormal readings to avoid false alarm. Moreover, every event region can also be detected and identified. Simulation results show that fault detection accuracy (FDA) is greater than 92%, false alarm rate (FAR) is near 0%, and event detection accuracy (EDA) is greater than 99% under uniform distribution. FDA is greater than 92%, FAR is less than 1.2%, and EDA is greater than 88% under random distribution when sensor fault probability is less than 0.3.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-11
    Description: A higher order statistics (HOS)-based method is proposed in this letter to estimate the nonlinear amplitude-to-phase (AM/PM) conversion function of power amplifiers (PAs) in communications systems. By utilizing the symmetry property of the modulated signal, the proposed method estimates the AM/PM conversion function using only the PA output signal, from which the phase predistorter (PD) function can be derived. Simulation results show that the HOS-based method can accurately determine the phase PD function required to compensate for the AM/PM distortion in the PA, yielding a linearization performance close to that of non-blind methods in terms of adjacent channel power ratio and error vector magnitude.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2013-09-13
    Description: The components and claddings of low-rise buildings are usually destroyed first during typhoon disasters in coastal areas. Roof accessory structures can change the flow pattern on the roof, thus effectively reducing the wind load on the roof surface and the damage to the low-rise buildings. Three types of aerodynamic mitigation plates, that is, (1) 0.3 m high full-length roof-edge plate, (2) 0.3 m high and 0.5 m + 0.5 m long roof-corner plate, and (3) discrete roof-edge plates with different spaces (which can be used as advertisement boards), are studied on the basis of the field measurement results under roof pitches of 10° and 18.4°. By comparing the results of the roof with and without constructed plates, it is implied that the three types of plates can affect the formation of conical vortexes and can significantly reduce the mean and fluctuating pressure coefficients in the windward corner. Compared with the constructed plate, the roof ridge has a larger influence on the wind loads on leeward roof.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-14
    Description: We introduce a method to create lossy versions of one image, either by successively merging the constant regions of the original image, or by iteratively splitting the regions from a created lossy image using horizontal or vertical line segments. Merging and split decisions are greedily taken, according to the best slope towards next point in the rate-distortion curve. For each created lossy image, the region contours and the optimal depth values can be entropy coded in three ways: with a new algorithm, or with two existing lossless coding algorithms. The obtained results compare favorably with the existing lossy methods.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2013-09-15
    Description: Cooperative communications that take advantage of the broadcasting nature of wireless environments can help to increase system throughput in wireless ad hoc networks. However, the promised throughput might be lost in presence of the error transmission and the interference caused by relay transmission in cooperative communication. In this paper, we introduced the relay selection schemes that can control the interference at the relay to prevent the relay that may harm other pairs. Then, we proposed the throughput-optimal scheduling that takes into account error probability in decision and maximizes throughput, that is, the amount of packets transmitted without error in network. In addition, we derive a simple and lightweight framework to implement the proposed policy in distributed manner. The simulation results show that the proposed scheduling policy outperforms the noncooperative policy and multihop relay policy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-18
    Description: This letter deals with the Kalman filter (KF) based on a third-order integrated random walk model (RW3). The resulting filter, noted as RW3-KF, is well suited to track slow time-varying parameters with strong trend behaviour. We first prove that the RW3-KF in steady-state admits an equivalent structure to the third-order digital phase-locked loops (DPLL). The approximate asymptotic mean-squared-error (MSE) is obtained by solving the Riccati equations, which is given in a closed-form expression as a function of the RW3 model parameter: the state noise variance. Then, the closed-form expression of the optimum state noise variance is derived to minimize the asymptotic MSE. Simulation results are given for the particular case where the parameter to be estimated is a Rayleigh channel coefficient with Jakes' Doppler spectrum.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2013-09-19
    Description: A novel preference ranking organization method by similarity to ideal solution (PROMSIS) vertical handoff algorithm is proposed for heterogeneous wireless networks, and its essential idea includes the preference structure of the PROMETHEE and the concept of Euclid distance of the TOPSIS. Four 3GPP defined traffic classes are considered in performance evaluation. An attribute matrix is constructed considering some major attributes. Handoff decision meeting multiattribute QoS requirement is made according to the traffic features. The weight relation of decision elements is determined with the least square (LS) approach. The final decision is made using the proposed PROMSIS algorithm based on the attribute matrix and weight vector. The simulation results have manifested that the proposed PROMSIS algorithm can provide satisfactory vertical handoff performance, and the LS-PROMSIS algorithm can be fit to the characteristics of the traffic.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-21
    Description: To avoid the transmission of side information and decrease the computational complexity in the conventional selected mapping (SLM) scheme, a novel set of conversion matrices (CMs) is proposed for the modified SLM scheme, and the signal processing scheme to remove the weighted factors on each subcarrier is also derived for wireless orthogonal frequency-division multiplexing (OFDM) systems. Computer simulations show that, without side information, the new scheme can achieve similar peak-to-average power ratio (PAPR) reduction and bit error rate (BER) performance with even lower computational complexity as compared with the available modified SLM schemes with the CMs.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-21
    Description: In this letter, we propose a robust and real-time visual tracking algorithm via a novel kernel based multiple cue adaptive appearance model (KBMCAAM). In particular, the appearance model is constructed with a naive Bayes classifier which is trained utilizing sparse multi-scale Haar-like features weighted by a spatial kernel function. Moreover, multiple image cues are integrated to improve the model's discriminative capacity. Experimental results demonstrate the superior performance of our proposed method to many state-of-art algorithms.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-21
    Description: In this letter, we propose a high throughput stochastic Low Bits Computation (LBC) turbo decoder. We represent the signal by a 3-bits width stochastic stream, which improves the accuracy of stochastic computation significantly. We have designed and synthesized our design based on CMOS 90 nm technology. The report shows that the proposed decoder can achieve 4.0 Gbps with 7.1 M gate count to decode a 2048-length ${rm R}=1/3$ turbo code, when the bit error rate (BER) is $10^{-5}$ @ ${rm E}_{rm b}/{rm N}_{0}=1.25 {rm dB}$ .
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-21
    Description: In this letter, a new class of real-valued matrices is presented for deterministic compressed sensing. A base matrix is constructed by cyclic shifts of binary sequences in an optical orthogonal code (OOC). Then, a Hadamard matrix is used for its extension, which ultimately produces a real-valued matrix that takes the entries of 0, ${-}1$ and ${+}1$ before normalization. The new sensing matrix forms a tight frame with small coherence, which theoretically guarantees the average recovery performance of sparse signals with uniformly distributed supports. Several example sensing matrices are presented by employing a special type of OOCs obtained from modular Golomb rulers.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Publication Date: 2013-09-22
    Description: With the growing interest in ubiquitous technologies recently, many studies have been conducted in order to manage wireless sensor network, which is the central component in ubiquitous environment. To manage a certain wireless sensor network, a variety of techniques can be applied and thereby the network can be managed. However, it is very complicated and time-consuming to incorporate and manage more than a heterogeneous wireless sensor network since each network has different data, meanings, and terms. Instead of conducting verification through examining the detailed technology or simulation in order to manage a variety of wireless sensor networks, we suggest a methodology which manages data coming from the various sensors mentioned above, a technique by which those data from various sensor networks are managed in each different network, and a methodology which manages sensor networks where management languages exist. This paper defined the network-related terminology using Protégé for the tools and definitions necessary for ontology-based methodology, thereby defined OWL and the related rules, and suggested a methodology for incorporated management. In addition, this study showed that the methodology presented in this study has expandability and it can incorporate and manage a variety of wireless sensor networks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Publication Date: 2013-09-26
    Description: Wireless sensor networks (WSNs) are becoming bigger, and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solutions were already proposed for mobile ad hoc networks but they either (i) do not scale well for WSN; (ii) have no energy constraints; (iii) have no security considerations; (iv) or have no mechanisms to handle fusion of network partitions. We proposed an address self-assignment protocol which uses negative acknowledgements and an improved version of a flood control mechanism to minimize the energy spent; uses a technique named whispering to achieve robustness against malicious nodes; is able to detect dynamic network re-joint and dynamic node addition without exchanging specific messages; and handles both dynamic events without compromising routing tables.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2013-09-27
    Description: Seismic sensors are invaluable for intruder detection and perimeter security. In a typical wireless sensor network application of seismic sensors, the units are battery powered and low power consumption becomes critical while fulfilling system requirements. Although many systems utilize 24-bit ADC for seismic signal processing, we employed 12-bit ADC for low power consumption. Because of this relatively low resolution ADC, preamplifier and filters require careful hardware design. We employ bidirectional T-type filtering, noise reduction, and distributed filtering between gain stages before the signal is input to ADC. The proposed design was verified with measurements. Seismic data signals due to footsteps at varying distances were successfully measured.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Publication Date: 2013-09-27
    Description: In ad hoc and sensor networks, reputation-based trust management schemes have been widely used to identify the malicious nodes. These schemes leverage each node’s behaviors for malicious node detection and thus require a certain amount of time to observe the behaviors of nodes. In mobile sensor networks, however, malicious nodes frequently move to different locations, and thus it is likely difficult to collect enough evidence for them. Moreover, when reputation-based schemes are employed, it is not easy to revoke the malicious nodes due to the risk of false positives. To mitigate these limitations of reputation-based schemes, we propose mobile malicious node detection schemes based on software attestation technique, which virtually fulfills zero false positives. In particular, we propose a probabilistic detection scheme in which each node attests its neighboring node with a certain probability. In order to reduce the attestation overhead of the probabilistic detection scheme, we also propose the SPRT (Sequential Probability Ratio Test) based detection scheme that uses the SPRT to determine when to perform the attestations. Through analysis and simulation, we show that our proposed schemes detect mobile malicious nodes through software attestations in robust and efficient manner.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-28
    Description: View synthesis prediction (VSP) is a coding mode that predicts video blocks from synthesised frames. It is particularly useful in a multi-camera setup with large inter-camera distances. Adding a VSP-based SKIP mode to a standard Multiview Video Coding (MVC) framework improves the rate-distortion (RD) performance but increases the time complexity of the encoder. This letter proposes an early mode decision technique for VSP SKIP-enhanced MVC. Our method uses the correlation between the RD costs of the VSP SKIP mode in neighbouring views and Bayesian decision theory to reduce the number of candidate coding modes for a given macroblock. Simulation results showed that our technique can save up to 36.20% of the encoding time without any significant loss in RD performance.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-28
    Description: The Slepian-Bangs formula provides a very convenient way to compute the Fisher information matrix (FIM) for Gaussian distributed data. The aim of this letter is to extend it to a larger family of distributions, namely elliptically contoured (EC) distributions. More precisely, we derive a closed-form expression of the FIM in this case. This new expression involves the usual term of the Gaussian FIM plus some corrective factors that depend only on the expectations of some functions of the so-called modular variate. Hence, for most distributions in the EC family, derivation of the FIM from its Gaussian counterpart involves slight additional derivations. We show that the new formula reduces to the Slepian-Bangs formula in the Gaussian case and we provide an illustrative example with Student distributions on how it can be used.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-28
    Description: The use of proper, i.e., circularly symmetric, complex Gaussian signals for all users is known to be optimal in broadcast channels with proper complex Gaussian noise from an information theoretic point of view, i.e., they are employed in the capacity-achieving strategy. However, such proper per-user transmit signals are not necessarily optimal for problems with quality-of-service (QoS) constraints if the transmit strategy is restricted to widely linear transceivers without time-sharing. This is shown by deriving the QoS feasibility region of the multiple-input multiple-output broadcast channel with improper Gaussian per-user transmit signals and widely linear transceivers.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Publication Date: 2013-10-01
    Description: The wireless sensor networks are usually deployed in various application-specific contexts, which can be treated as distributed databases with big data. The event-involved query responses can be obtained by issuing query requests to this kind of database. However, the constraints of the energy and delay have had a great impact on the operation of wireless sensor networks. How to design the query-involved network model and the corresponding query processing algorithms is extremely challenging. This work investigates query processing problem in resource-constrained wireless sensor networks with the two-tier architecture and multiple query agents, where the multiple nodes of query agents are configured in the networks and the corresponding source cluster-heads send collected events to only one optimum query agent. To reduce the energy consumption and shorten the delivery delay, an efficient query processing algorithm inspired by the swarm intelligence of ants is proposed, which takes advantage of the beneficial clustering and routing emerging in a hybrid self-organized way from the positive interaction of ants. The experimental results demonstrated that the proposed algorithm can deliver collected events to the optimum query agents efficiently. Not only is the energy cost reduced but also the delivery delay is shortened significantly when transmitting the named events to the appropriate query agents.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Publication Date: 2013-10-01
    Description: This paper presents a nonuniform node configuration of wireless sensor networks (WSNs) for long-span bridge health monitoring. The methodology and strategy of two-phase node arrangement for nonuniform WSN configuration are firstly presented, and then numerical examples are carried out by a long-span suspension bridge. Three cases, which are four sensor nodes distributed on one side of the girder, ten sensor nodes distributed on one side of the girder, and eight sensor nodes distributed averagely on two sides of the girder, are employed. In case I and case II, three schemes that are the nonuniform node configuration arranged by the two-phase node arrangement method, the uniform nodes configuration, and the independent sensor nodes configuration are used for comparison. And in case III, two schemes that are nonuniform nodes configuration and the independent sensor nodes configuration are adopted. The results indicate that the nonuniform node configuration can balance energy consumption, eliminate “energy hole,” and maximize network performance effectively, which shows the most outstanding performance when compared with other conventional node configurations. So, the efficiency of the two-phase node arrangement method is validated.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Publication Date: 2013-10-02
    Description: This paper proposes a noncoherent spectrum sensing scheme for the cognitive coexistent heterogeneous networks with the assistance of geolocation information of primary and secondary nodes. Different from the conventional networks with single secondary network, the spectrum sensing scheme in the coexistence scenario should not only detect the primary signal but also detect the secondary signals to avoid the interference with both the primary network and the operating coexistent secondary networks. Therefore, the sensing scheme in this case should be able to differentiate the primary signal from each kind of the secondary signals. However, in the coexistent heterogeneous scenarios, the secondary signals may exploit different PHY modes (some of them may be the same as the primary PHY mode), which imposes difficulties in the coherent signal detection schemes. Aiming to tackle this problem, the parallel detection of both primary signal and each kind of secondary signals is implemented through a proposed noncoherent power decomposition scheme. In this scheme, the power decomposition is formulated into a problem of solving a nonhomogeneous linear equation matrix. During the signal detection, the characteristics of both primary and secondary signals are not required. Both the analysis and the simulation results show the feasibility and efficiency of the proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2013-10-02
    Description: The existing electronic tagging system traces the location of a sex offender using triangulation by communicating with Global Positioning System (GPS) satellites and mobile phone base stations. The acquired location information is used to prevent the offenders from perpetrating repeat crimes. However, the battery resources of such a system are inadequate as it has to trace the location of the moving target in real time and consumes a large amount of battery power while communicating with GPS satellites and mobile phone base stations. In addition, the systems cannot infer the mental state of the targets or detect their alcohol consumption levels, which may be necessary for the prevention of a repeat crime. The purpose of this study is to connect the Ubiquitous System Network (USN), which consumes little electricity, and Android mobile platforms, which are commonly used for machine-to-machine communication. Thus, this system will legally facilitate the protection of minors by providing information only about the target’s approach to certain facilities. In addition, the system uses an Android platform to process data measured by the USN’s sensors, which can also detect alcohol intake and infer the mental state of the target, and then initiates the corresponding real-time context-awareness services.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2013-10-03
    Description: Intrusion detection is a challenging problem in wireless networks due to the broadcast nature of the wireless medium. Physical layer information is increasingly used to protect these vulnerable networks. Meanwhile, reconfigurable antennas are gradually finding their way into wireless devices due to their ability to improve data throughput. In this paper, the capabilities of reconfigurable antennas are used to devise an intrusion detection scheme that operates at the physical layer. The detection problem is posed as a GLRT problem that operates on the channels corresponding to the different modes of a reconfigurable antenna. The performance of the scheme is quantified through field measurements taken in an indoor environment at the 802.11 frequency band. Based on the measured data, we study the achievable performance and the effect of the different control parameters on the performance of the intrusion detection scheme. The effect of pattern correlation between the different modes on the scheme’s performance is also analyzed, based on which general guidelines on how to design the different antenna modes are provided. The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Publication Date: 2013-10-03
    Description: Network coding (NC) is significant for the spectral efficiency promotion of the multiple-source multiple-relay wireless sensor networks (WSNs). However, the existing scheme ignored further exploitation of the communications between relays. To address this issue, a relay ordering algorithm based on finite field NC (FFNC) is proposed in this paper. In the scheme, the relays who initially fail to decode from sources are kept listening and searching for the opportunity to decode the signals from other relays, so as to recover the failure links. The outage probability of the scheme and the corresponding lower bound are theoretically deduced under two-source two-relay assumption. Moreover, the scheme is proved to own the merit of diffusion effect, which makes the diversity improvement more efficient by simply increasing the relay number in the network. Simulation results correspond well with the analysis and demonstrate that the proposed scheme always outperforms FFNC in outage behavior and attains more opportunities to supply full diversity for the network. Moreover, it shows that the diffusion effect enables this scheme to be very suitable for the multiple-relay WSN.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Publication Date: 2013-10-04
    Description: In wireless sensor networks (WSN), sensor deployment is one of the main topics for enhancing the sensor’s coverage rate. In this paper, by modifying updating equation of onlooker bee and scout bee of original artificial bee colony (ABC) algorithm, a sensor deployment algorithm based on the modified ABC algorithm is proposed. Some new parameters such as forgetting and neighbor factor for accelerating the convergence speed and probability of mutant for maximizing the coverage rate are introduced. Simulation results showed that comparing with the deployment method based on original ABC and particle swarm optimization (PSO) algorithm, the proposed approach can achieve a better performance in coverage rate and convergence speed while needing a less total moving distance of sensors.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Publication Date: 2013-10-04
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Publication Date: 2013-10-04
    Description: In wireless sensor network, when these sensors are wrongly placed in an observation region, they can quickly run out of batteries or be disconnected. These incidents may result in huge losses in terms of sensing data from numerous sensors and their costs. For this reason, a number of simulators have been developed as tools for effective design and verification before the actual arrangement of sensors. While a number of simulators have been developed, simulation results can be fairly limited and the execution speed can be markedly slow depending on the function of each simulator. In this regard, to improve the performance of existing simulators, this research aimed to develop a parallel calculation simulator for independent sensor (PCSIS) that enables users to selectively use the GPU mode and, based on this mode, enables parallel and independent operations by matching GPU with many cores in order to resolve the slowdown of the execution speed when numerous sensor nodes are used for simulations. The PCSIS supports the GPU mode in an environment that allows the operation of compute unified device architecture (CUDA) and performs the parallel simulation calculation of multiple sensors using the mode within a short period of time.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Publication Date: 2013-09-12
    Description: Due to advances in microelectromechanical system (MEMS), many smart sensors have been developed. A large number of sensors build a wireless sensor network and can communicate with each other. Wireless sensor networks help monitor objects in our environment, and many researches about this technology are in progress. Condensation is a phenomenon that water vapor contained in the air condenses and makes water droplets. This is caused by the complex action of a variety of factors, including the temperature difference between indoor and outdoor and excessive indoor moisture, so it is never easy to identify the cause and establish measures for the actual building. In this paper, a system is presented to predict and alert condensation promptly and accurately, considering the causes and prevention of condensation. In this paper, a system will be developed to collect and monitor environmental information causing condensation, in real time using a wireless sensor network in order to build a system to prevent condensation. The users are expected to use this system to easily identify the cause of condensation and take actions based on the cause-specific alarm messages in order to alleviate aesthetics and hygiene problems due to condensation.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2013-09-13
    Description: We discuss the problem of maximizing the sensor field coverage for a specific number of sensors while minimizing the distance traveled by the sensor nodes. Thus, we define the movement task as an optimization problem that involves the adjustment of sensor node positions in a coverage optimization mission. We propose a coverage optimization algorithm based on sampling to enhance the coverage of 3D underwater sensor networks. The proposed coverage optimization algorithm is inspired by the simple random sampling in probability theory. The main objective of this study is to lessen computation complexity by dimension reduction, which is composed of two detailed steps. First, the coverage problem in 3D space is converted into a 2D plane for heterogeneous networks via sampling plane in the target 3D space. Second, the optimization in the 2D plane is converted into an optimization in a line segment by using the line sampling method in the sample plane. We establish a quadratic programming mathematical model to optimize the line segment coverage according to the intersection between sensing circles and line segments while minimizing the moving distance of the nodes. The intersection among sensors is decreased to increase the coverage rate, while the effective sensor positions are identified. Simulation results show the effectiveness of the proposed approach.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Publication Date: 2013-09-13
    Description: Wireless sensor networks (WSNs) are a fundamental building block of many pervasive applications. Nevertheless the use of such technology raises new challenges regarding the development of reliable and fault-tolerant systems. One of the most critical issues is the detection of corrupted readings amidst the huge amount of gathered sensory data. Indeed, such readings could significantly affect the quality of service (QoS) of the WSN, and thus it is highly desirable to automatically discard them. This issue is usually addressed through “fault detection” algorithms that classify readings by exploiting temporal and spatial correlations. Generally, these algorithms do not take into account QoS requirements other than the classification accuracy. This paper proposes a fully distributed algorithm for detecting data faults, taking into account the response time besides the classification accuracy. We adopt the Bayesian networks to perform classification of readings and the Pareto optimization to allow QoS requirements to be simultaneously satisfied. Our approach has been tested on a synthetic dataset in order to evaluate its behavior with respect to different values of QoS constraints. The experimental evaluation produced good results, showing that our algorithm is able to greatly reduce the response time at the cost of a small reduction in classification accuracy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Publication Date: 2013-09-17
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2013-09-19
    Description: We consider the problem of data aggregation for nonuniform and evolving wireless sensor networks. We introduce a new data aggregation algorithm that is able to run on uniform, non-uniform, and evolving networks while maintaining the data accuracy. In addition, the algorithm is able to handle sudden bursts in the underlying data by recording the data in the area of interest for the whole event duration. Experimental results on real and synthetic data show that the algorithm performs well in terms of extending the lifetime of the network, maintaining the original distribution of the sensors as long as possible, maintaining the accuracy of the sensed data, and being able to detect and handle sudden bursts of data.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2013-09-19
    Description: The congestion control algorithm based on the weighted directed graph is designed for the network congestion over the wireless sensor network. The congestion problem is modeled as a distributed dynamic system with time-varying delay, and it can be proven that the sent rate for all nodes converges to the available bandwidth of the sink by the proposed congestion control algorithm. Via Lyapunov function, the validity of the proposed algorithm is shown under the varying network topologies. Ns simulation results indicate that the proposed algorithm restrains the congestion over the wireless sensor network, maintains a high throughput and a low delay time, and also improves the quality of service for the whole network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-21
    Description: A set-valued descriptor state estimation algorithm is given for determining all those descriptor state values consistent with a given uncertain descriptor system model, sensor model and a general class of uncertainty model. An approach for detecting faults or attacks signals that are corrupting the uncertain descriptor system and/or the set of sensor readings is also provided.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-25
    Description: This letter proposes a new dynamic diffusion estimation method for a collaborative inference of a common model parameter using a distributed network of cooperating nodes. Unlike the existing single problem-oriented diffusion methods, it is formulated abstractly for the exponential family of models. The resulting advantage—its easy and straightforward application to the family members—is demonstrated on three selected cases: i) the diffusion autoregression, ii) the diffusion Poisson modelling and iii) the diffusion estimation of a Bernoulli process with unknown proportions. The first case is shown to coincide with the diffusion recursive least squares.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-25
    Description: The filtered-X least mean-square (FxLMS) algorithm is widely used for active noise control (ANC). A long tap-length is usually required for some FxLMS applications, and consequentially the convergence rate becomes very slow. In this letter, a new variable tap-length and step-size FxLMS algorithm is proposed, especially suited to a long tap-length filter. Taking into account the lowpass filter effect in the secondary path of ANC, the new algorithm is developed for the control filter with an unsymmetric and two-sided exponential decay envelop over its impulse response. Simulation results show that the new algorithm provides faster convergence and cancellation performance compared to previously proposed variable-step-size FxLMS algorithms.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-09-25
    Description: Based on a recently proposed linear nested array, we consider the problem of source number detection and direction of arrival estimation for wideband Gaussian sources. This array provides $O(N^{2})$ degrees of freedom with $O(N)$ sensors, enabling us to estimate $K$ sources with $N 〈 K$ sensors. To employ the nested array for the wideband case, we propose effective strategies to apply nested-array processing to each frequency component, and combine all the spectral information of various frequencies to conduct the detection and estimation. In particular, for source detection, we propose a novel approach employing the idea of ensemble, used in machine learning and statistics. Numerical simulations demonstrate the advantages of our strategies.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Publication Date: 2013-09-24
    Description: In order to achieve the equal usage of limited resources in the wireless sensor networks (WSNs), we must aggregate the sensor data before passing it to the base station. In WSNs, the aggregator nodes perform a data aggregation process. Careful selection of the aggregator nodes in the data aggregation process results in reducing large amounts of communication traffic in the WSNs. However, network conditions change frequently due to sharing of resources, computation load, and congestion on network nodes and links, which makes the selection of the aggregator nodes difficult. In this paper, we study an aggregator node selection method in the WSNs. We formulate the selection process as a top-k query problem, where we efficiently solve the problem by using a modified Sort-Filter-Skyline (SFS) algorithm. The main idea of our approach is to immediately perform a skyline query on the sensor nodes in the WSNs, which enables to extract a set of sensor nodes that are potential candidates to become an aggregator node. The experiments show that our method is several times faster compared to the existing approaches.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Publication Date: 2013-09-24
    Description: In wireless distributed sensor networks, one open problem is how to guarantee the reliable relay selection based on the quality of services diversity. To address this problem, we focus on the reliable adaptive relay selection approach and adaptive QoS supported algorithm, based on which we present a Markov chain model, in consideration of different packet states and error control algorithm assignment. The mathematical analyses and NS-2 simulation results show that the proposed relay selection approach could perform better in terms of saturation throughput, reliability, and energy efficiency, compared with the traditional approaches. More importantly, the quality of real-time multimedia streaming is improved significantly, in terms of decodable frame ratio and delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Publication Date: 2013-09-24
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Publication Date: 2013-09-24
    Description: Automatic recognition of personal comfort is critical in realizing autonomous control of building utilities. We can infer human comfort level based on indoor environmental conditions, such as temperature and humidity, collected through sensor networks. However, the majority of methods for optimally deploying sensor networks in indoor climate monitoring mainly focused on achieving accurate measurements such as temperature distribution map with the minimum cost. Indeed, for automatic recognition of comfort using machine learning, we need to collect datasets preserving as much of the discriminatory information for inferring personal comfort with the minimum cost. In this paper, we present a novel method of placing and minimizing sensor nodes for sensor networks in smart energy systems. We have developed ZigBee-based sensor nodes and collected temperature, humidity, and illumination dataset from 13 nodes for a week. Using the dataset, we group the sensor nodes into coherent clusters, and then select a representative node which has the maximum value of RSSI for each cluster and remove the other redundant sensors, reducing the number of sensor nodes deployed. To show the feasibility of the proposed method, we perform a classification analysis of building environment. The recognition accuracy decreased by 13 percent with 6 selected sensor nodes, compared to the result with all 13 sensor nodes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Publication Date: 2013-09-25
    Description: In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. However, most present schemes developed for WSNs don’t consider the Internet scenario while traditional mechanisms developed for the Internet are not suitable due to the resource constraint of sensor nodes. In this paper, we propose a scheme, which we refer to as Data Authentication and En-route Filtering (DAEF), for WSNs in the context of IoT. In DAEF, signature shares are generated and distributed based on verifiable secret sharing cryptography and an efficient ID-based signature algorithm. Our security analysis shows that DAEF can defend against node compromise attacks as well as denial of service (DoS) attacks in the form of report disruption and selective forwarding. We also analyze energy consumption to show the advantages of DAEF over some comparable schemes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Publication Date: 2013-09-25
    Description: This paper presents a dynamic adaptive machine-to-machine (M2M) service rate allocation scheme for optimum traffic distribution in heterogeneous wireless environments (HWEs). According to the M2M service characteristics, it proposes the utility function, which forms a convex optimization problem that maximizes the utility of M2M service and can be solved by the Lagrange multiplier. The simulation results show the proposed method convergence, and it can achieve load balance with maximized throughput and minimized cost.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Publication Date: 2013-09-25
    Description: In many surveillance application scenarios of wireless video sensor networks (WVSNs), a number of video sensors are deployed, and multidimension monitored the visual information in a region of interest, forming multiview videos. Since the power, computing capability, and bandwidth are very limited in WVSNs, the conventional multiview video coding method is no longer applicable. So multiview distributed video coding (MDVC) emerged and developed rapidly. In this paper, we propose a new multiview video coding and postprocessing framework for multiview videos. First, in coding scheme, motion intense regions (MIRs) and nonmotion intense regions (NMIRs) based on sum of absolute difference (SAD) criteria are distinguished. For the MIR, the side information (SI) is generated by fusion temporal SI and interview spatial SI at the pixel level. But for the NMIR, the temporal SI is directly use as the ultimate SI. Then, to further improve the quality of the decoded image, an image postprocessing scheme is designed by using deblocking and deringing artifact filters on decoded image. Finally, a set of experimental results show that the proposed fusion SI approach can bring improvements up to 0.2–0.5 dB when compares with only temporal SI used. The subsequent decoded videos postprocessing simulation proves that the proposed postprocessing scheme can provide an additional improvement of about 0.1 dB to the decoded video sequences.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2013-09-25
    Description: Duty-cycled operation has been introduced as an efficient way to preserve nodes energy and prolong network lifetime for wireless sensor networks. However, such networks are often logically disconnected since there is a limited number of active nodes within a period of time. Traditional routing algorithms, which have been designed for always-awake wireless networks, suffer excessive waiting time incurred by asynchronous schedule of nodes and cannot be applied to these time-dependent sensor networks. In this work, we study the optimization of delivery delay for low-duty-cycle sensor networks. Specially, we theoretically analyze the sleep latency in low-duty-cycle networks and present a new routing metric, which takes both lossy link and asynchronous schedule of nodes into consideration. Based on the metric, we propose delay-driven routing algorithms to find optimal forwarder in order to reduce delivery delay for source-to-sink communication. We compare our design against state-of-the-art routing algorithms derived in wireless networks through large-scale simulations and testbed experiments, which show that our algorithms can achieve a significant reduction in delivery delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Publication Date: 2013-09-25
    Description: It is very important to detect a collapse hole for coal mine workers. The possibility of detecting the collapse hole using WSN is presented because the tunnel in coal mine is narrow and has poor working condition. Comparing three types of the hole detection methods, it is seen that the connectivity-based methods are used to detect coal mine collapse better than other methods. By establishing a 2D model of the collapse hole in coal mine, a class of algorithms for detecting the collapse hole in coal mine is described. Based on log-normal shadowing channel model, the accuracy of detecting the collapse hole in coal mine using Fisher information is analyzed. Numerical calculation shows that connectivity-based localization schemes are better to detect collapse hole of coal mine.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Publication Date: 2013-09-27
    Description: Nowadays, the fractal is used widely everywhere. Then, its creating time becomes an important study area for complex iteration functions because the escape-time algorithm (ETA), which is the most used algorithm in fractal creating, performs not so well in this condition. In this paper, in order to solve this problem, we improve ETA into the parallel environment and reach well performance. At first, we provide a separation method of ETA to reform it into a SIMC-MC2 grid. Secondly, we prove its correctness and compute the complexity of this novel parallel algorithm. Meantime, we separate an improved ETA which we have presented into the same parallel environment and compute its complexity. Additionally, theoretical and experimental results show the characteristics of this novel algorithm. Finally, the computational result shows that a novel environment is needed to decrease large manual allocation strategies, which block the improved benefit.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2013-09-27
    Description: To improve the energy efficiency and the transmission performance of a sensor network MAC protocol under time varying traffic conditions, recent researches have adopted a variable duty cycle operation that makes each node dynamically adjust its own wakeup and sleep schedule according to a predefined trigger condition. However, most of the existing protocols still waste energy on a long preamble packet for waking up a receiver or long idle listening for checking potential communications. To address the energy waste problem, this paper introduces a hybrid MAC protocol called A+MAC that exploits a complementary cooperation between CSMA/CA and preamble sampling. In A+MAC CSMA/CA is used for carrying out communication processes, and preamble sampling is used for checking potential communications. Therefore, A+MAC minimizes both idle listening and the length of a preamble packet by exploiting a short preamble that makes nodes check only the event occurrence. A+MAC also optimizes control packet formats and eliminates both virtual carrier sensing and a separate clock synchronization period from conventional CSMA/CA based MAC protocols. We evaluated both the energy and the network performance of the protocol by using both NS-2 and MICA2 platforms. Our experimentation results show that A+MAC can achieve an order of magnitude energy savings while providing near optimal latency compared to the existing solutions.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Publication Date: 2013-09-30
    Description: In this paper, we introduce a novel design of high-performance smart card with HF/UHF dual-band RFID tag to overcome frequency interference problem. Firstly, we have designed and tested a UHF RFID tag using a simulation software system. In the smart card hardware design stage, we connect a HF antenna and a UHF antenna and place them in one inlay sheet. Using a spectrum analyzer, we systematically adjust the antenna pattern to detect the optimal patterns that fit the impedance of the RFID chip. We evaluate the performance of the resulting smart card with standard RFID testers. The experiments show that our proposed RFID tag outperforms other dual-band RFID tags and maintains itself in a reasonable size. Moreover, we increase IC chip's memory capacity to resolve security-related problems when RFID tags are used in a financial transaction. We firstly exploit an IC contact protruded from the card to add an additional memory, and we integrate functions of the RFID tag to use the equipped memory through the induced current of the contact. The implemented prototype of our proposal can accommodate an extended memory ranging from one gigabyte up to four gigabytes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Publication Date: 2013-09-30
    Description: This paper presents an integer linear programming model devoted to optimize the energy consumption efficiency in heterogeneous wireless sensor networks. This model is based upon a schedule of sensor allocation plans in multiple time intervals subject to coverage and connectivity constraints. By turning off specifics sets of redundant sensors in each time interval, it is possible to reduce the total energy consumption in the network and, at the same time, avoid partitioning the whole network by losing some strategic sensors too prematurely. Since the network is heterogeneous, sensors can sense different phenomena from different demand points, with different sample rates. By resorting to this model, it is possible to provide extra lifetime to heterogeneous wireless sensor networks, reducing their setup and maintenance costs. This is an important issue to be considered when deploying sensor devices in hostile and inaccessible environments.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Publication Date: 2013-09-30
    Description: Frame synchronization time of geostationary Earth orbit (GEO) satellites is faster than that of incline geosynchronous satellite orbit and medium Earth orbit satellites in Beidou navigation satellite system (BDS). So time to first fix can be reduced greatly with GEO satellites (GEOs) to provide emergency positioning service during the cold start process. Meanwhile, GEOs can also be utilized to provide radio determination satellite services. Therefore, it is meaningful to research the emergency positioning algorithm based on GEOs. However, due to the poor geometry of the GEOs, the availability and accuracy degrade distinctly. To solve this problem, a low-cost high resolution MS5534B barometric (baro-) module is applied to BDS. Firstly, the principle of emergency positioning based on a baro-altimeter sensor and its performance such as the accuracy are elaborated. Then the effects of baro-altimeter sensor measurement error on positioning are analyzed. Finally, after analyzing the limitation of the conventional algorithms, a new high-accuracy emergency positioning algorithm with baro-altimeter sensor aiding is proposed, which is not limited by the integration and user’s altitude. In comparison to the conventional algorithms, the stimulant and experimental results validate the effectiveness, robustness, and higher performance of the proposed algorithms incorporated with sensors.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Publication Date: 2013-10-01
    Description: In self-organized wireless sensor networks (WSNs), any two sensor nodes can connect if they are placed in each other's communication range. Therefore, the physical topology of WSNs is usually a strongly connected topology. Sensor nodes should frequently receive and process data from their large number of neighbors, which will consume great amounts of energy. Shocking wireless channel collision also causes low throughput and high loss packets ratio during data transmission. To improve the transmission performance and save scarce energy, a logical topology generating from the physical one is necessary for the self-organized WSNs. Based on the complex network theory, this paper proposed a novel betweenness addition edges expansion algorithm (BAEE). With betweenness calibration, BAEE algorithm expanded the minimum-cost edges to optimize the network topology. Two performance metrics-connectivity functions, robustness function and efficiency function , were utilized to evaluate the network capability of the robustness and invulnerability. is the parameter to measure the topology connectivity, and is the parameter to evaluate the network exchanging information capability. Based on the simulation under various random failures and intentional attack scenarios, BAEE can effectively optimize WSNs' topology and improve the network's robust connectivity and extremely efficient exchanging information capability.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Publication Date: 2013-10-01
    Description: In many sensor network applications, energy efficiency and latency are major design criteria because battery-operated sensor nodes limit network lifetime. In this paper, we propose a new contention-based duty-cycle MAC protocol using a synchronized approach for use in wireless sensor networks. In the proposed MFT-MAC protocol, we use a control frame that considers the number of DATA frames to be transmitted to the next node in order to improve the energy efficiency and reduce the end-to-end delay. During the SLEEP period, each node transmits multiple DATA frames to the next node through the use of the control frame. The performance of the proposed MAC protocol is confirmed through the use of NS-2 simulator.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-10-02
    Description: This letter presents the complexity study of multiple-input multiple-output (MIMO) detection in a multiple-user scenario. For variable-complexity MIMO detection in multiple-user systems, the complexity outage probability, defined as the probability of event that the complexity exceeds some complexity constraint, is proved to have a Chernoff-type upper bound that decays exponentially with an increasing number of users. The closed-form expression of such a Chernoff-type upper bound is also derived.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2013-10-02
    Description: PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In this paper, we analyze the security of PP-1 by using truncated differential cryptanalysis. As concrete examples, we consider four versions of PP-1, PP-1/64, PP-1/128, PP-1/192, and PP-1/256. Our attack is applicable to full-round versions of them, respectively. The proposed attacks can recover a secret key of PP-1 with the computational complexity which is faster than the exhaustive search. These are the first known cryptanalytic results on PP-1.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2013-10-04
    Description: To eliminate the location error of MS/AE (microseismic/acoustic emission) monitoring systems caused by the measurement deviations of the wave velocity, a MS/AE source location method using P-wave and S-wave arrivals for unknown velocity system (PSAFUVS) was developed. Arrival times of P-wave and S-wave were used to calculate and fit the MS/AE source location. The proposed method was validated by numerical experimentations. Results show that the proposed method without the need for a premeasured wave velocity has a reasonable and reliable precision. Effects of arrival errors on location accuracy were investigated, and it shows location errors enlarged rapidity with the increase of arrival errors. It is demonstrated the proposed method can not only locate the MS/AE source for unknown velocity system but also determine the real time PS waves velocities for each event in rockmass.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-10-05
    Description: Directional chamfer matching (DCM) has shown good results in many areas such as object recognition and pose estimation. Currently DCM has been applied only for two-dimensional (2-D) matching. In this letter, we present a DCM scheme that utilizes depth in addition to 2-D input, which we refer to as 2.5D DCM. We show that in situations such as 3-D model-based pose estimation, depth information can be exploited to achieve robust performance. We apply the proposed method for human motion capture (HMC), using the Human Eva I dataset. We compare our approach with alternative methods used for HMC. Our results show that using depth information makes traditional DCM robust. Furthermore, the proposed method outperforms the alternatives used for HMC in state of the art systems.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-10-05
    Description: In this letter, optimization properties of Minimization of Error Entropy (MEE) and Minimization of Error Entropy with Fiducial points (MEEF) are presented. It is proved that by varying the kernel parameter of the MEE and/or MEEF objective function, the resulting problem, in general leads to an invex problem. Furthermore, for certain values of the kernel parameter it is shown that the problems may transform to convex or pseudo-convex problems.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-10-05
    Description: Feature compensation is a low computational cost technique to achieve robust automatic speech recognition (ASR). Short-time Fourier Transform Uncertainty Propagation (STFT-UP) provides feature compensation in domains used for ASR as, e.g., Mel-Frequency Cepstra Coefficient (MFCC), while using STFT domain distortion models. However, STFT-UP is limited to Gaussian priors when modeling speech distortion, whereas super-Gaussian priors are known to provide improved performance. In this letter, an extension of STFT-UP is presented that uses approximate super-Gaussian priors. This is achieved by extending the conventional complex Gaussian priors to complex Gaussian mixture priors. The approach can be applied to any of the STFT-UP existing solutions, thus providing super-Gaussian uncertainty propagation. The method is exemplified by a Minimum Mean Square Error (MMSE) MFCC estimator with an approximate generalized Gamma speech prior. This estimator clearly outperforms the Gaussian-based MMSE-MFCC feature compensation on the AURORA4 corpus.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-10-05
    Description: Filter bank-based methods for pixel classification are attractive due to the potential of fast implementation with convolution operations. The design of optimal filter sets, however, is a challenging task given the nonlinear aspects of the problem. This letter extends the well known linear discriminant analysis method into a novel framework for local texture feature discrimination tasks. It proposes a mixture of linear models as a nonlinear classifier, where a number of filters are optimized locally by minimizing the prediction error. Through these filters, the ‘best separable’ features are selected. Experiments performed on two standard texture databases show that our method produces results which are comparable to state-of-the-art techniques while at the same time maintaining low computational complexity.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2013-06-07
    Description: Body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications in many fields, such as health monitoring. The services in BAN usually have a high requirement on security, especially for the medical diagnosis, which involves private information. With limitations of power and computation capabilities, one of the main challenges to ensure security in BAN is how to generate or distribute a shared key between nodes for lightweight symmetric cryptography. The current research almost exploits the randomness and distinctiveness (characteristics) of physiological signals to solve the key generation problem. However, it needs the help of additional hardware support and has the constraint on positions deployment, to acquire vital signals, which will bring the high cost and hardness to implementation of real system. To avoid the above problems, this paper presents a novel key generation scheme and a key distribution protocol, both of which are only based on wireless modules equipped on sensors. By exploiting the high correlation of received signal strength index (RSSI) between peer-to-peer communications, our scheme can provide a shared symmetric cryptographic key under the presence of an eavesdropper. We conduct experiments on the real Telosb nodes, and the results demonstrate that our proposed methods have a good performance on security.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2013-06-10
    Description: Message delivery in a mobile social network (MSN) is difficult due to the fact that the topology of such network is sparse and unstable. Various routing schemes for MSNs were proposed to make the message delivery robust and efficient. However, little research has been conducted to explore how much delay has to be tolerated for the message delivery from the source to the destination. Since the social relationships among nodes are stable during a certain period of time, it is expected that the delay of message delivery in MSNs could be modeled with a probability model. In this paper, we take the first step to address this issue. We firstly extract three routing models from the existing routing schemes for MSNs and then develop the probability models of the message transmission delay for each abstract routing model. The simulation results show that the theoretical models match very well the simulation trace statistics.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2013-06-13
    Description: Data aggregation techniques have been proposed for wireless sensor networks (WSNs) to address the problems presented by the limited resources of sensor nodes. The provision of efficient data aggregation to preserve data privacy is a challenging issue in WSNs. Some existing data aggregation methods for preserving data privacy are CPDA, SMART, the Twin-Key based method, and GP2S. These methods, however, have two limitations. First, the communication cost for network construction is considerably high. Second, they do not support data integrity. There are two methods for supporting data integrity, iCPDA and iPDA. But they have high communication cost due to additional integrity checking messages. To resolve this problem, we propose a novel Hilbert-curve based data aggregation scheme that enforces data privacy and data integrity for WSNs. To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. To support data integrity, we use an integrity checking algorithm based on the PIR technique by directly communicating between parent and child nodes. Finally, through a performance analysis, we show that our scheme outperforms the existing methods in terms of both energy efficiency and privacy preservation.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Publication Date: 2013-06-11
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Publication Date: 2013-06-07
    Description: Wireless sensor networks (WSNs) are subject to various attacks because of the vulnerable environment, limited recourse, and open communication channel. To protect WSNs, in this paper, we present a Secret sharing-based key management (SSKM). SSKM utilizes the advantages of hierarchical architecture and adopts two-level key management and authentication mechanism, which can efficiently protect the allover network communication security and survivability. Different from previous works, the SSKM distributes keys based on secret sharing mechanism by the clustered architecture, which not only localizes the key things but also keeps scalability. The SSKM provides various session keys, the network key for base station (BS) and cluster heads (CHs); the cluster key between the cluster head and member nodes. The SSKM dynamically generates different keys based on different polynomials from BS in different periods which can protect the network from the compromised nodes and reduce the high probability of the common keys. The security analysis shows that the SSKM can prevent several attacks effectively and reduce the energy consumption.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Publication Date: 2013-06-10
    Description: EPCglobal network is used to share product data between trading partners, which was proposed by EPCglobal. Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (PML) servers and the privacy of Electronic Product Codes (EPCs). Existing work considers either the IP address authentication or the EPC privacy. In addition, that work mainly relies on cryptographic tools, in which key distribution is not a trivial task and also causes a large amount of computation overhead. In this paper, we make the first attempt to solve those two security risks together without relying cryptography. We propose a scheme, namely, APP (authenticate ONS and protect EPC privacy), to guarantee the authenticity of IP addresses for PML servers as well as EPC privacy and to maintain ultralightweight computation cost. Moreover, we give formal definition of the authenticity and the privacy in ONS context. The security achievements are strictly analyzed and proved. The extensive analysis results justify the applicability of the proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2013-06-10
    Description: Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security. Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. Recently, Tsai et al. proposed an improved certificateless signature scheme without pairing and claimed that their new construction is secure against different kinds of attacks. In this paper, we present a security analysis of their scheme and our results show that scheme does not have resistance against malicious-KGC attack. In addition, we have found some security flaws in the certificateless signature scheme of Fan et al. and proved the scheme vulnerable to Strong Type I attack.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2013-04-10
    Description: This paper addresses the energy efficiency of cooperative communication in WSN. We first establish the energy model of single-hop WSN. It is found that the cooperative communication is more suitable for harsh transmission environment with long-haul distance. The energy consumption per bit is numerically minimized by finding the optimal broadcasting BER and the number of cooperative nodes. Then, we expand the conclusion to the multihop scenario where “energy hole” dominates the longevity of WSN. To mitigate the energy consumption in the hotspots, as well as to keep the promised reliability, we adjust the transmission BER of the clusters according to the hops between the sink and cluster. On one hand, the statistical reliability is met. On the other hand, the energy consumed is converted from the nearer cluster (from the sink) to the farther ones. The network lifetime is thus optimized.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2013-03-22
    Description: Body sensor networks (BSNs) carry heterogeneous traffic types having diverse QoS requirements, such as delay, reliability and throughput. In this paper, we design a priority-based traffic load adaptive medium access control (MAC) protocol for BSNs, namely, PLA-MAC, which addresses the aforementioned requirements and maintains efficiency in power consumption. In PLA-MAC, we classify sensed data packets according to their QoS requirements and accordingly calculate their priorities. The transmission schedules of the packets are determined based on their priorities. Also, the superframe structure of the proposed protocol varies depending on the amount of traffic load and thereby ensures minimal power consumption. Our performance evaluation shows that the PLA-MAC achieves significant improvements over the state-of-the-art protocols.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Publication Date: 2013-04-03
    Description: Wireless sensor network (WSN) experiment platforms are used for teaching, research, and development of WSN. However, existing WSN experiment platforms generally have the following disadvantages: tedious manual operations, invasive measurement method, poor sensor self-awareness, and low resource utilization rate. To address the above problems, this paper proposes OPCPP, an online Plug-Configure-Play experiment platform for WSN. It has four prominent strongpoints: in-application programming in batch, noninvasive measurement method, sensor self-awareness, and remote operation. OPCPP has been used in eight colleges in China for teaching course of “internet of things” till now. We also develop a sensor-aware ZigBee-based smart home system prototype based on OPCPP.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2013-04-03
    Description: Adaptive time delay estimation based on blind system identification (BSI) focuses on the impulse responses between a source and a microphone to estimate the time difference of arrival (TDOA) in reverberant environments. In this letter, we consider the adaptive eigenvalue decomposition (AED) BSI method based on the normalized multichannel frequency-domain least mean square (NMCFLMS) algorithm. We show that the use of filter length constraints (FLC) based on the maximum TDOA between microphones improves the performance of the NMCFLMS filter for the localization of different sound types in highly reverberant environments. The experimental results demonstrate the improvement of the proposed method for reverberation times $({rm RT}_{60})$ of up to 2 s. Applications for this method include teleconferencing systems, musical interfaces, videogames, and monitoring systems.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2013-04-10
    Description: We propose a middleware platform built on wireless USB (WUSB) over wireless body area networks (WBAN) hierarchical protocol for wearable health-monitoring systems (WHMS). The proposed middleware platform is composed of time-synchronization and localization solutions. It is executed on the basis of WUSB over WBAN protocol at each wearable sensor node comprising the WHMS. In the platform, firstly, the time-synchronization middleware is executed. After that, a WHMS host calculates the location of a receiving sensor node by using the difference between the times at which the sensor node received different WBAN beacon frames sent from the WHMS host. The WHMS host interprets the status and motion of the wearable body-sensor objects.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Publication Date: 2013-04-08
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Publication Date: 2013-04-09
    Description: An ultrasonic sensor-based personalized multichannel audio rendering method is proposed for multiview broadcasting services. Multiview broadcasting, a representative next-generation broadcasting technique, renders video image sequences captured by several stereoscopic cameras from different viewpoints. To achieve realistic multiview broadcasting, multichannel audio that is synchronized with a user’s viewpoint should be rendered in real time. For this reason, both a real-time person-tracking technique for estimating the user’s position and a multichannel audio rendering technique for virtual sound localization are necessary in order to provide realistic audio. Therefore, the proposed method is composed of two parts: a person-tracking method using ultrasonic sensors and a multichannel audio rendering method using MPEG Surround parameters. In order to evaluate the perceptual quality and localization performance of the proposed method, a MUSHRA listening test is conducted, and the directivity patterns are investigated. It is shown from these experiments that the proposed method provides better perceptual quality and localization performance than a conventional multichannel audio rendering method that also uses MPEG Surround parameters.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: The antenna subarray formation (ASF) is a promising technique for multiple-input multiple-output (MIMO) receiver. For MIMO cognitive radio systems, we propose a joint beamforming and ASF scheme in this letter which maximizes the cognitive achievable capacity subject to the peak transmit power constraint at the secondary transmitter, peak interference power constraint at the primary receiver, and the limited number of nonzero elements in the ASF matrix. To solve the joint optimization problem, we propose a relax-and-recover scheme. Simulation results have shown that the proposed scheme outperforms the conventional antenna selection scheme.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: In this letter, we address the problem of blindly reconstructing compressively sensed signals by exploiting the co-sparse analysis model. In the analysis model it is assumed that a signal multiplied by an analysis operator results in a sparse vector. We propose an algorithm that learns the operator adaptively during the reconstruction process. The arising optimization problem is tackled via a geometric conjugate gradient approach. Different types of sampling noise are handled by simply exchanging the data fidelity term. Numerical experiments are performed for measurements corrupted with Gaussian as well as impulsive noise to show the effectiveness of our method.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: This letter proposes a new method for multiband radar signal fusion by making use of all-phase fast Fourier transform (apFFT) algorithm and iterative adaptive approach (IAA). Central to the proposed method are, first, the mutual incoherence compensation between various subbands by apFFT algorithm, and second, the application of IAA to the mutually coherent subband measurements for signal fusion. Taking advantage of both algorithms, the proposed method effectively improves the range resolution with low sidelobes and performs robustly in the presence of noise. In particular, it requires no model information and therefore enables flexible implementation for practical application. The feasibility and effectiveness of the proposed algorithm are validated through both numerical simulations and raw data processing results.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: This letter presents a voice activity detection (VAD) approach using non-negative sparse coding to improve the detection performance in low signal-to-noise ratio (SNR) conditions. The basic idea is to use features extracted from a noise-reduced representation of original audio signals. We decompose the magnitude spectrum of an audio signal on a speech dictionary learned from clean speech and a noise dictionary learned from noise samples. Only coefficients corresponding to the speech dictionary are considered and used as the noise-reduced representation of the signal for feature extraction. A conditional random field (CRF) is used to model the correlation between feature sequences and voice activity labels along audio signals. Then, we assign the voice activity labels for a given audio by decoding the CRF. Experimental results demonstrate that our VAD approach has a good performance in low SNR conditions.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: In the last decade, $2q$ -MUSIC, an extension of MUSIC algorithm to an arbitrary even order $2q$ , has been proposed to process direction-finding problems. Despite of its better performance compared with MUSIC, it suffers from the high computational complexity, thus limiting its practical application. This letter proposes a method called Non-Redundant- $2q$ -MUSIC using $2q$ th order statistics for uniform linear arrays and uniform rectangular arrays. The proposed method lowers the computational complexity effectively by removing the redundancy of the virtual array and the $2q$ th-order cumulant matrix. And root-MUSIC can be applied to avoid calculating the pseudo-spectrum. It is illustrated in both theoretical proof and computer simulations that the proposed method performs properly and effectively.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: A blind target detector using the time reversal transmission is proposed in the presence of channel correlation. We calculate the exact moments of the test statistics involved. The derived moments are used to construct an accurate approximative Likelihood Ratio Test (LRT) based on multivariate Edgeworth expansion. Performance gain over an existing detector is observed in scenarios with channel correlation and relatively strong target signal.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: This letter proposes a novel coordinate rotation digital computer (CORDIC)-based fast radix-2 algorithm for computation of discrete cosine transformation (DCT). The proposed algorithm has some distinguish advantages, such as Cooley-Tukey fast Fourier transformation (FFT)-like regular data flow, uniform post-scaling factor, in-place computation and arithmetic-sequence rotation angles. Compared to existing DCT algorithms, this proposed algorithm has lower computational complexity. Furthermore, the proposed algorithm is highly scalable, modular, regular, and suitable for pipelined VLSI implementation. In addition, this letter also provides an easy way to implement the reconfigurable or unified architecture for DCTs and inverse DCTs.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: We propose new ergodic interference alignment techniques for $K$ -user interference channels with delayed feedback. Two delayed feedback scenarios are considered—delayed channel information at transmitter (CIT) and delayed output feedback. It is proved that the proposed techniques achieve total $2K/(K+2)$ DoF which is higher than that by the retrospective interference alignment for the delayed feedback scenarios.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: In this work, joint decompression and decoding is studied for the uplink of multi-antenna cloud radio access networks. In this system, a set of multi-antenna mobile stations (MSs) wish to communicate with a “cloud” decoder through a set of multi-antenna base stations (BSs), which are connected to the cloud decoder through digital backhaul links of limited capacity. The BSs compress the received signal and send it to the cloud decoder, which performs joint decoding of the signals from all MSs. While the conventional solution prescribes that the cloud decoder performs first decompression and then decoding, recent work has shown that potentially larger rates can be achieved with joint decompression and decoding (JDD) at the cloud decoder. The sum-rate maximization problem with JDD, under the assumption of Gaussian test channels, is shown here to be an instance of a class of non-convex problems known as Difference of Convex (DC) problems. Based on this observation, an iterative algorithm based on the Majorization Minimization (MM) approach is proposed that guarantees convergence to a stationary point of the sum-rate maximization problem. Numerical results demonstrate the advantage of the proposed algorithm compared to the conventional approach based on separate decompression and decoding.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    facet.materialart.
    Unknown
    Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2013-04-03
    Description: Low-power design has become a key technology for battery-power biomedical devices in Wireless Body Area Network. In order to meet the requirement of low-power dissipation for electrocardiogram related applications, a down-sampling QRS complex detection algorithm is proposed. Based on Wavelet Transform (WT), this letter characterizes the energy distribution of QRS complex corresponding to the frequency band of WT. Then this letter details for the first time the process of down-sampled filter design, and presents the time and frequency response of the filter. The algorithm is evaluated in fixed point on MIT-BIH and QT database. Compared with other existing results, our work reduces the power dissipation by 23%, 61%, and 72% for 1 $,times $ , 2 $,times $ , and 3 $,times $ down-sampling rate, respectively, while maintaining almost constant detection performance.
    Print ISSN: 1070-9908
    Electronic ISSN: 1558-2361
    Topics: Electrical Engineering, Measurement and Control Technology
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2013-04-01
    Description: Low data delivery efficiency and high energy consumption are the inherent problems in Underwater Wireless Sensor Networks (UWSNs) characterized by the acoustic channels. Existing energy-efficient routing algorithms have been shown to reduce energy consumption of UWSNs to some extent, but still neglect the correlation existing in the local data of sensor nodes. In this paper, we present a Multi-population Firefly Algorithm (MFA) for correlated data routing in UWSNs. We design three kinds of fireflies and their coordination rules in order to improve the adaptability of building, selecting, and optimization of routing path considering the data correlation and their sampling rate in various sensor nodes. Different groups of fireflies conduct their optimization in the evolution in order to improve the convergence speed and solution precision of the algorithm. Moreover, after the data packets are merged during the process of routing path finding, MFA can also eliminate redundant information before they are sent to the sink node, which in turn saves energy and bandwidth. Simulation results have shown that MFA achieves better performance than existing protocols in metrics of packet delivery ratio, energy consumption, and network throughput.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2013-04-01
    Description: In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propose a counterattack-detection scheme in transmission time-based wormhole detection methods. In this paper, we show that it is possible for an attacker to find an effective counterattack against wormhole detection methods, so we provide a counterattack-detection scheme. In the first phase, our proposed method uses the transmission time per hop extracted from a RREQ. If the attackers fabricate the RREQ’s starting time to evade our proposed method, we can detect this counterattack using the RREQ’s transmission time in the second phase, because the fabricated starting time makes the transmission time shorter than the original transmission time. The simulation shows that our proposed method has high reliability for detecting both wormhole attacks and the attacker’s counterattack.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2013-04-01
    Description: Target tracking is a typical and important application of wireless sensor networks (WSNs). In consideration of the network scalability and energy efficiency for target tracking in large-scale WSNs, it has been employed as an effective solution by organizing the WSNs into clusters. However, tracking a moving target in cluster-based WSNs suffers a boundary problem when the target moves across or along the boundaries of clusters, as the static cluster membership prevents sensors in different clusters from sharing information. In this paper, we propose a novel mobility management protocol, called hybrid cluster-based target tracking (HCTT), which integrates on-demand dynamic clustering into a cluster-based WSN for target tracking. By constructing on-demand dynamic clusters at boundary regions, nodes from different static clusters that detect the target can temporarily share information, and the tracking task can be handed over smoothly from one static cluster to another. As the target moves, static clusters and on-demand dynamic clusters alternately manage the target tracking task. Simulation results show that the proposed protocol performs better in tracking the moving target when compared with other typical target tracking protocols.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2013-04-01
    Description: Network based sensing has become an important field of research, and it is expected that new applications of remote sensing will be developed. A fuzzy collaborative sensor network is developed in this study to predict the cycle time of a job in a semiconductor manufacturing factory, which is an important task for the factory. In the fuzzy collaborative sensor network, each sensor detects the status of a particular job as well as various environmental conditions present in the factory and uses a fuzzy neural network to analyze the received information. Each sensor communicates its settings and forecasting results to other sensors with the aid of a central control unit. According to the experimental results, the aggregate forecasting performance was considerably improved through the sensors’ collaboration.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2013-04-01
    Description: Being one of the main technologies for Internet of Things (IoT), wireless sensor network is absolutely critical and plays an increasingly important role in the development of Internet of Things. Wireless sensor network is mobile network composed of sensor nodes with limited resources, like computation capability, energy, memory storage, and communication capability. Its characteristic results in that the security of wireless sensor network faces a great challenge. Hence, the security of wireless sensor network is an important issue for the development of IoT and shall be focused on. In this paper, a novel authentication scheme is proposed for wireless sensor networks based on theory of quadratic residues. It is making the use of master key to achieve simple symmetric cryptographic primitives and authentication operation and reach the aims of great resistance against the attacks and low energy consumption. Then the proposed scheme is compared with other network-wide key management schemes, obtaining better results in the aspects of security, efficiency, and scalability.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2013-04-01
    Description: Wireless sensor networks (WSNs) have limited energy and transmission capacity, so data compression techniques have extensive applications. A sensor node with multiple sensing units is called a multimodal or multivariate node. For multivariate stream on a sensor node, some data streams are elected as the base functions according to the correlation coefficient matrix, and the other streams from the same node can be expressed in relation to one of these base functions using linear regression. By designing an incremental algorithm for computing regression coefficients, a multivariate data compression scheme based on self-adaptive regression with infinite norm error bound for WSNs is proposed. According to error bounds and compression incomes, the self-adaption means that the proposed algorithms make decisions automatically to transmit raw data or regression coefficients, and to select the number of data involved in regression. The algorithms in the scheme can simultaneously explore the temporal and multivariate correlations among the sensory data. Theoretically and experimentally, it is concluded that the proposed algorithms can effectively exploit the correlations on the same sensor node and achieve significant reduction in data transmission. Furthermore, the algorithms perform consistently well even when multivariate stream data correlations are less obvious or non-stationary.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2013-04-01
    Description: In recent years, some approaches have been presented for the seamless integration of WSNs with the existing, widely deployed SOA technologies such as XML, Web services, and the Business Process Execution Language (BPEL) to build a wireless sensor networks service application. However, there a great challenge on fault tolerant in WSNs. In this paper, we present our framework and approach to enhance the reliability of service composition applications in WSNs through modeling and analyzing a wireless sensor networks service application based on BPEL with exception handler and compensation mechanism. At first, we analyze all possible states during the execution of BPEL instance in WSNs. Then, we present a state framework for modeling execution context in BPEL instance in WSNs. Based on this framework, we analyze state transition and operational semantics in the case of both correct execution and exceptional execution of BPEL instance in WSNs. Furthermore, we propose the state transition models for three types of activities in BPEL instance. In the end, we present a formal approach to model the execution context in BPEL for WSNs. Using this formal model, one can describe and analyze the control flow result from the exception handler and compensation mechanism in BPEL instance for WSNs.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2013-04-01
    Description: Energy efficiency is one of the most important issues for WSNs, because the battery of each wireless sensor node cannot be recharged or replaced. Therefore, all batteries have to be well managed, in order to provide a long network lifetime, as well as to reduce energy consumption for WSNs, particularly in clustering and routing. In this paper, we propose an energy-efficient self-organized clustering model with splitting and merging (EECSM), which performs clustering and then splits and merges clusters for energy-efficient cluster-based routing. EECSM uses information of the energy state of sensor nodes, in order to reduce energy consumption and maintain load balance. We show the validity of splitting and merging of clusters and then compare the performance of the proposed EECSM with that of a well-known cluster-based self-organization routing protocol for WSNs. The results of our experiment show good performance of EECSM, in terms of network lifetime, residual energies, scalability, and robustness.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2013-04-01
    Description: Depending upon the technological developments, the same fast evolution has occurred in the structures of sensor networks, their composing devices which are sensor nodes, and their application areas. Those tiny, energy-constrained, mostly non-real-time data transmitting sensor nodes have evolved to more energy-containing, camera-adapted, real-time multimedia-data-transmitting devices. Developments in the usage areas and the capabilities have revealed some other problems such as time limited data transmission. In this paper, we propose a multichannel cross-layer architecture for Quality of Service (QoS) constrained multimedia sensor networks. The proposed architecture considers both the time and energy efficiency concepts. Energy efficiency is succeeded by ensuring the fair load distribution among the nodes during a real-time multimedia packet stream transmission. Besides ensuring the fair load distribution, on-time packet transmission is also assured by constructing the paths with a hard reservation technique depending on the predetermined QoS constraints. Simulations show that the proposed architecture provides higher performance than the Greedy approach and the LEERA scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Publication Date: 2013-04-04
    Description: In vehicular networks, the multihop message delivery from information source to moving vehicles presents a challenging task due to many factors, including high mobility, frequent disconnection, and real-time requirement for applications. In this paper, we propose a moving target oriented opportunistic routing algorithm in vehicular networks for message delivery from information source to a moving target vehicle. In order to adapt the constantly changing topology of networks, the forwarding decisions are made locally by each intermediate vehicle based on the trajectory information of the target vehicle. The simulation and real trace experiment show that our design provides an efficient message delivery with a higher success ratio, shorter success time, and lower transmission overhead compared with other reference approaches.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2013-09-06
    Description: Due to the advances in memory and processing capacity of embedded systems, wireless communications, and size of the devices, many researchers are growing more and more interested in wireless sensor networks (WSN). WSN have a large number of nodes with a sensor board, and wireless communication board, and have been applied to many fields. Summer is the season when much personal and property damage arises from various natural disasters such as the heat being reminiscent of subtropical climate and flooding from heavy rain due to global warming. This unusual temperature affects our lives much besides causing natural disasters. Recently, many problems have occurred with respect to hygiene and beauty of view especially due to growing of various molds in the residential environment. In the heat of summer, the damages from molds become serious due to the effect of temperature and humidity according to seasonal characteristics. In this paper, we build a wireless sensor network with some sensors such as temperature and humidity. And then we design and implement the prevention system of molds growth which can predict and prevent molds production in indoor environment.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...