ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (1,234)
  • Hindawi  (1,234)
  • American Chemical Society
  • American Institute of Physics (AIP)
  • 2010-2014  (1,234)
  • 1995-1999
  • International Journal of Distributed Sensor Networks  (1,234)
  • 163708
  • 1
    Publication Date: 2014-12-17
    Description: Currently, electricity distributors make use of various types of equipment divided into levels of automation. This automation enables the integration of elements such as Intelligent Electronic Devices (IEDs) to the supervision of the distribution electrical system, but there is not an appropriate environment to increase the scale of these elements. In this context, the smart grid comes with specifications that allow adding new elements to the intelligence of the power grid operation. However, the cost of communication is still an impediment to the scalability of the integration of these elements into the current structure. In this paper, we propose a middleware that optimizes the communication of this integration using wireless sensor networks (WSN). The goal is to ensure a gradual integration of new elements taking advantage of the increase in the number of sensor nodes in the network due to the scalability of the system itself. The conversion solutions have been used to allow easy communication between the WSN and the smart grid system, and we also have used data aggregation and compression techniques to increase the lifetime of the wireless sensor network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2014-12-18
    Description: The sunlight intensity-based global positioning system (SGPS) is able to geolocate outdoor objects by means of the sunlight intensity detection. This paper presents the integration of SGPS into a sensor network in order to improve the overall accuracy using evolutionary algorithms. Another contribution of the paper is to theoretically solve both global and relative positioning of the sensors composing the network within the same framework without satellite-based GPS technology. Results show that this approach is promising and has potential to be improved further.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2014-12-18
    Description: Indoor localization based on existent WiFi signal strength is becoming more and more prevalent and ubiquitous. Unfortunately, the WiFi received signal strength (RSS) is susceptible by multipath, signal attenuation, and environmental changes, which is the major challenge for accurate indoor localization. To overcome these limitations, we propose the cluster -nearest neighbor (KNN) algorithm with 5 G WiFi signal to reduce the environmental interference and improve the localization performance without additional equipment. In this paper, we propose three approaches to improve the performance of localization algorithm. For one thing, we reduce the computation effort based on the coarse localization algorithm. For another, according to the detailed analysis of the 2.4 G and 5 G signal fluctuation, we expand the real-time measurement RSS before matching the fingerprint map. More importantly, we select the optimal nearest neighbor points based on the proposed cluster KNN algorithm. We have implemented the proposed algorithm and evaluated the performance with existent popular algorithms. Experimental results demonstrate that the proposed algorithm can effectively improve localization accuracy and exhibit superior performance in terms of localization stabilization and computation effort.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2014-11-05
    Description: Advancement in wireless sensor network (WSN) technology makes it more attractive technology to be adopted in real world applications including home and industrial automation and e-health or infrastructure monitoring. However the mobility consideration in these applications makes the security requirements an essential and challenging task. To make the communication secure and the network robust against attacks, a proper key management scheme should be used. This paper presents a secure online key establishment and authentication scheme for mobility supported heterogeneous sensor networks. The performance evaluation of the proposed scheme is done using OMNET++ simulator while AVISPA tool is used to validate the security of the proposed scheme. It is clear from the obtained results that the proposed scheme provides better network connectivity at a low cost of memory occupation and communication overhead during the authentication and key establishment phases while improving its network resilience against attacks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2014-12-09
    Description: This paper investigates a combination of fingerprinting (FP) and extended Kalman filter (EKF) based tracking aiming to tackle conventional problems related to implementation of either tracking or fingerprinting separately. One of the common drawbacks of FP belongs to large data size and consequent large search space. By taking advantage of latest position estimate got from EKF, a virtual surveillance area (VSA) is defined around the estimate. The dimension of this defined surveillance area is much smaller than the size of indoor environment. Consequently, there will be a possibility for FP to be applied in larger areas maintaining the possibility of adding necessary grid points in order to achieve a desired localization performance. Additionally, in order to improve accuracy of ranging, we investigate the impact of a priori knowledge related to the clusters impulse responses and other features; the applied so called soft ranging algorithm for time of arrival (TOA) estimation is modified in order to take advantage of this a priori information and to make its decision variables more accurate. Simulation results show a promising performance improvement via using the proposed hybrid tracking technique and applying a priori information to soft ranging. The tradeoff is along a reasonable increased implementation complexity.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2014-12-09
    Description: Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined and finite resources. They commonly operate in hostile environments such as battle fields and surveillance zones. Owing to their operating nature, MWSNs are often unattended and generally are not equipped with tamper-resistant tools. With little effort, an adversary may capture the nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Keeping in view of the above, this paper places an emphasis on this aforementioned attack, known as node replication attack in MWSNs. Specifically, the current state-of-the-art of node replication attack in MWSNs is discussed, where this paper provides a detailed description of various existing detection and prevention mechanisms in literature with an aim to provide better understanding of the factors that need to be considered when designing defence mechanism of node replication attack. A detailed categorization of various detection techniques is provided in the paper with critical discussion on each categorization with respect to its advantages, disadvantages, and various constraints. To conclude the paper, a number of parameters are selected for comparison and analysis of all the existing detection schemes in the literature.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2014-12-01
    Description: The railway is one of the most important facilities for freight logistics. This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. The proposed protocol, CSD Chain Network Protocol (CCNP), was designed for a chain-form network of CSDs, each of which is attached to a container. In CCNP, unauthorized access to freight is reliably reported to the reader deployed at the locomotive. CCNP also cares about the fairness in energy consumption. In a usual chain network, a tag closer to the reader consumes more energy since it ought to forward packets coming from rear tags as well. However, in CCNP, the tag energy consumption for packet forwarding is always the same regardless of the position in a chain owing to an efficient data fusion scheme. In our simulation using QualNet, CCNP reduces the number of disconnections between tags by 59.5% as compared to general chain networks. The energy consumption also decreases by 91.3% of other networks not using an aggregation method.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2014-01-15
    Description: Although a lot of researchers have painted a rosy picture of Internet of Things (IoT), there have been no widely accepted solution and related standards until now. To achieve the successful realization of IoT, the close collaboration of devices is the primary requisite. However, the heterogeneity of devices such as different hardware or network connectivity prohibits the realization of IoT. In order to overcome the heterogeneity issue, we suggested the agent service platform named iotSilo in which agents can communicate and cooperate on behalf of their devices. With this delegation approach, the iotSilo can support diverse devices without worrying about their differences. In designing an agent, several software design patterns are adopted to enable the agent to assemble behaviors for hiding the heterogeneity of devices. To investigate the effectiveness of the iotSilo, we developed eleven different types of the IoT devices to emulate real world things with Arduino, deployed the devices in both Korea and Japan, and then conducted three experiments.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2014-01-15
    Description: The Internet of Things (IoT) is regarded as the future generation Internet, which ranges from radio frequency identification (RFID) to the ubiquitous computing systems such as wireless sensor networks and mobile ad hoc networks. With the rapid development of IoT, designing an effective low-cost embedded terminal device for the IoT become very necessary. A new embedded device, Webit&NEU, and its reduced embedded real-time operating system used for IoT are implemented by our China Liaoning Province Embedded Technique Key Laboratory in this paper. Besides, related modules in terms of RFID technique, wireless communication, and network protocol are also provided in this paper. Compared with several current solutions of connecting devices and Internet, it has the advantages of good real-time performance, light weight, and low cost. Besides, this paper also puts forward a localization algorithm for the Webit&NEU, and experimental test results in terms of real-time system ability, network communication performance, and localization algorithm show that Webit&NEU can work well and meet the actual requirements of the IoT.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2014-01-15
    Description: Video sensor networking technologies have developed very rapidly in the last ten years. In this paper, a cross-based framework strategy for cost aggregation is presented for the depth map estimation based on video sensor networks. We formulate the process as a local regression problem consisting of two main steps with a pair of video sensors. The first step is to calculate estimates for a set of points within a shape-adaptive local support region. The second step is to aggregate the matching cost for the gradient-based weight of the support region at the outmost pixel. The proposed algorithm achieves strong results in an efficient manner using the two main steps. We have achieved improvement of up to 6.9%, 8.4%, and 8.3%, when compared with adaptive support weight (ASW) algorithm. Comparing to cross-based algorithm, the proposed algorithm gives 2.0%, 1.3%, and 1.0% in terms of nonocclusion, all, and discontinuities, respectively.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Publication Date: 2014-01-17
    Description: Energy-efficient wireless reprogramming is key issues for long-lived sensor network. Most of wireless reprogramming approaches focus on the energy efficiency of the data transmission phase. However, the program rebuilding phase on target node is possibly as another significant part of the total reprogramming energy consumption, due to the high energy overhead of reading or writing operation on the energy-hungry nonvolatile memory. In this paper, we propose an energy-efficient reprogramming system—EasiLIR. The core of EasiLIR is to avoid r/w operations on nonvolatile memory as much as possible in two fold. Firstly, we design an in situ modification which creates a modified program equivalent to new one without rebuilding program. However, at the cost of no rebuilding program, the redundant binary codes existing in the modified program may break the program time constraint. Therefore, we also design a lightweight segmented rebuilding to directly create the new image in memory. Experiment results show that EasiLIR reduces the r/w operations on nonvolatile memory by approximately 88% and 81% compared to Deluge and R2, and its average reprogramming overhead is about 64.7% of R2.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2014-01-17
    Description: Anonymity is an important concern in wireless communications. Most anonymous routing protocols in ad hoc networks usually assume that a shared secret exists between the sender and the receiver. These protocols hide either the sender and the receiver or the intermediate nodes from the ad hoc network. Different from previous anonymous secure routing protocols, this paper proposes an anonymous routing protocol, ARAKE, which not only makes the sender and the receiver anonymous but also hides the intermediate nodes from the network simultaneously. To make the protocol more practical in dynamic network, ARAKE uses the public key to substitute the shared secret. In ARAKE, the receiver can authenticate the sender and gets a shared secret without extra key establishment processes. ARAKE can prevent packet analysis attack as well as most active attacks that are based on route information. The denial-of-service attack to specific session also can be restrained. The simulative results have shown that ARAKE outperforms a representative protocol ARAN in terms of both communication and energy overheads.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2014-01-17
    Description: Wireless multimedia sensor networks with sensing and processing abilities of multimedia data have recently emerged as one of the most important technologies for high quality monitoring. The routing scheme for multimedia data is an important research issue addressed in wireless multimedia sensor networks. In this paper, we propose a disjointed multipath routing scheme for real-time data transmission in wireless multimedia sensor networks. The proposed scheme uses a hybrid routing protocol based on Bluetooth and Zigbee in order to overcome the limitation of low bandwidth in conventional sensor networks. The proposed scheme also performs disjointed multipath routing based on competition to alleviate the delay of routing path setup. To show the superiority of our proposed scheme, we compare it with the existing scheme through performance evaluation. Our experimental results show that our proposed scheme reduces the end-to-end delay by about 30% and the routing path setup costs by about 22% over the existing scheme. Our scheme also increases data reception rates by about 690% over the existing scheme on average.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Publication Date: 2014-01-21
    Description: Understanding the urban mobility patterns is essential for the planning and management of public infrastructure and transportation services. In this paper we focus on taxicab moving trajectory records and present a new approach to modeling and analyzing urban mobility dynamics. The proposed method comprises two phases. First, discrete space partition based on flexible grid is developed to divide urban environment into finite nonoverlapping subregions. By integrating mobility origin-destination points with covered region, the partitioned discrete subregions have better spatial semantics scalability. Then, we study mobility activity and its distribution randomness during given time periods among discrete subregions. Moreover, we also carry out the analysis of mobility linkage of mobility trips between different regions by O-D matrix. We present a case study with real dataset of taxicab mobility logs in Shenzhen, China, to demonstrate and evaluate the methodology. The experimental results show that the proposed method outperforms the clustering partition and regular partition methods.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Publication Date: 2014-01-21
    Description: Sensor networks aim at monitoring their surroundings for event detection and object tracking. But, due to failure or death of sensors, false signal can be transmitted. In this paper, we consider the problems of distributed fault detection in wireless sensor network (WSN). In particular, we consider how to take decision regarding fault detection in a noisy environment as a result of false detection or false response of event by some sensors, where the sensors are placed at the center of regular hexagons and the event can occur at only one hexagon. We propose fault detection schemes that explicitly introduce the error probabilities into the optimal event detection process. We introduce two types of detection probabilities, one for the center node, where the event occurs, and the other one for the adjacent nodes. This second type of detection probability is new in sensor network literature. We develop schemes under the model selection procedure and multiple model selection procedure and use the concept of Bayesian model averaging to identify a set of likely fault sensors and obtain an average predictive error.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Publication Date: 2014-01-21
    Description: We propose a set of distributed algorithms for improving the multicast throughput in wireless sensor networks. To this end, network coding is applied when exploiting path diversity with two disjoint paths to each multicast group receiver. We depart from the traditional wisdom that the multicast topology from source to receivers needs to be a tree and propose a novel and distributed algorithm to construct a 2-redundant multicast graph (a directed acyclic graph) as the multicast topology, on which network coding is applied. We conduct both analytical and simulation-based studies to evaluate the effectiveness and performance of our algorithm.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Publication Date: 2014-01-21
    Description: With the extensive application of Zigbee, some bodies of literature were devoted into finding the vulnerabilities of Zigbee by fuzzing. According to earlier test records, the majority of defects were exposed due to a series of testing cases. However, the context of malformed inputs is not taken account into the previous algorithms. In this paper, we propose a refined structure-based fuzzing algorithm for Zigbee based on FSM, FSM-fuzzing. Any malformed input in FSM-Fuzzing is injected to the tested sensor against a specific initial state. If the sensor transferred to the next state of FMS or crashed, there would be a defect of Zigbee in dealing with the input under the state. The final state of the sensor is verified by an UIO sequence. After a round of tests, the sensor is regressed to the specific state to prepars for receiving the next mutation. All of the states would be traversed in FSM-fuzzing. A fuzzing tool, ZFSM-fuzzer, is designed for evaluating the performance of FSM-fuzzing. Experiment results show that there is a vulnerability of Zigbee in dealing with the frames without destination addresses. Further, the quality of cases of FSM-fuzzing is higher than the previous algorithms. Therefore, FSM-fuzzing is powerful in finding the vulnerabilities of Zigbee.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Publication Date: 2014-01-13
    Description: With the pervasive use of mobile devices and increasingly computational ability, more concrete and deeper collaborations among mobile users are becoming possible and needed. However, most of the studies fail to consider load balancing requirement among mobile users. When tasks are unevenly distributed, the processing time as well as energy consumption will be extremely high on some devices, which will inevitably counterweight the benefits from incentive mechanism and task scheduling scheme. In this work, we propose eCOTS (Efficient and Cooperative Task Sharing for Large-scale Smart City Sensing Application). We leverage the “balls and bins” theory for task assignment, where mobile users in contact range are investigated, and select the least loaded one among the d users. It has been proved that such simple case can effectively reduce the largest queueing length from to . Simulation and real-trace driven studies have shown that, eCOTS can effectively improve the balancing effects in typical network scenarios, even the energy level and computational capability are diverse. In simulation study, eCOTS can reduce the gap between the maximum and minimum queueing lengths up to 5× and over 2× in real trace data evaluations.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2014-01-17
    Description: Data aggregation techniques have been widely used in wireless sensor networks (WSNs) to solve the energy constraint problems of sensor nodes. They can conserve the significant amount of energy by reducing data packet transmission costs. However, many data aggregation applications require privacy and integrity protection of the real data while transmitting data from the sensing nodes to a sink node. The existing schemes for supporting both privacy and integrity, that is, iCDPA, and iPDA, suffer from high communication cost, high computation cost, and data propagation delay. To resolve the problems, we propose a signature-based data security technique for protecting sensitive data aggregation in WSNs. To support privacy-preserving data aggregation and integrity checking, our technique makes use of the additive property of complex numbers. Out of two parts of a complex number, the real part is used to hide the sampled data of a sensor node from its neighboring nodes and adversaries, whereas the imaginary part is used for data integrity checking at both data aggregators and the sink node. Through a performance analysis, we prove that our privacy-preserving data aggregation scheme outperforms the existing schemes up to 50% in terms of communication and computation overheads as well as up to 3 times in terms of integrity checking and data propagation delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Publication Date: 2014-01-17
    Description: This paper describes a hardware architecture for real-time image component labeling and the computation of image component feature descriptors. These descriptors are object related properties used to describe each image component. Embedded machine vision systems demand a robust performance and power efficiency as well as minimum area utilization, depending on the deployed application. In the proposed architecture, the hardware modules for component labeling and feature calculation run in parallel. A CMOS image sensor (MT9V032), operating at a maximum clock frequency of 27 MHz, was used to capture the images. The architecture was synthesized and implemented on a Xilinx Spartan-6 FPGA. The developed architecture is capable of processing 390 video frames per second of size 640 × 480 pixels. Dynamic power consumption is 13 mW at 86 frames per second.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Publication Date: 2014-01-17
    Description: PRINTcipher-48/96 are 48/96-bit block ciphers proposed in CHES 2010 which support the 80/160-bit secret keys, respectively. In this paper, we propose related-key cryptanalysis of PRINTcipher. To recover the 80-bit secret key of PRINTcipher-48, our attack requires 247 related-key chosen plaintexts with a computational complexity of . In the case of PRINTcipher-96, we require 295 related-key chosen plaintexts with a computational complexity of 2107. These results are the first known related-key cryptanalytic results on them.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Publication Date: 2014-01-17
    Description: Location awareness plays an indispensable role in a wide variety of application domains such as environment monitoring and vehicle tracking. In this paper we focus on the localization of mobile users in sparse mobile networks which exist in many practical scenarios where users are distributed over a vast area. The unique characteristics of sparse mobile networks present several challenges for accurate localization, such as constant movement and little information from anchors. By analyzing five large datasets of real users traces with entropy analysis from five sites, we make an important observation that there are strong patterns with user mobility. Motivated by this observation, we propose a localization approach called EMP by exploiting mobility patterns of users for localization in sparse mobile networks. EMP implements a range-free distributed algorithm, with which each user collaboratively estimates its current location by fusing two localization sources, that is, network connectivity with other nodes and mobility patterns. With trace driven simulations, we demonstrate that EMP significantly improves the localization accuracy, comparing with other existing localization approaches.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Publication Date: 2014-01-20
    Description: This paper presents a security visiting guiding system SVG composed of RFID, smart phone, and Wi-Fi signal widely available. The SVG system can provide visitors with the map of a given building, so that the visitor can easily find the target under its guide. It can also protect user’s privacy location information by cryptographic two-dimension code and RFID. The two-dimension code can be easily obtained by a mobile phone and it authorizes a visitor to obtain the navigation service of SVG. The visitor receives the permission from his host and makes a date through SVG. Then, SVG will navigate both the persons to meet at any place in the building. Furthermore, this paper demonstrates and evaluates the SVG security scheme. We conduct an attacker model and test the ability of the scheme in protecting user’s location security.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Publication Date: 2014-01-24
    Description: This paper proposes a module based distributed wireless face recognition system by integrating multiple kernel discriminant analysis with face recognition in wireless sensor networks. By maximizing the margin maximization criterion (MMC), we separately perform an iterative scheme for kernel parameter optimization for each module. The simulation on the FERET and CMU PIE face databases shows that our multiple kernel framework and the optimization procedure achieve high recognition performance, compared with single-kernel-based KDDA.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Publication Date: 2014-01-21
    Description: Mobile traces, collected by vehicular sensor networks (VSNs), facilitate various business applications and services. However, the traces can be used to trace and identify drivers or passengers, which raise significant privacy concerns. Existing privacy protecting techniques may not be suitable, due to their inadequate considerations for the data accuracy requirements of different applications and the adversary’s knowledge and strategies. In this paper, we analyze data privacy issues in VSNs with a game theoretic model, where a defender uses the privacy protecting techniques against the attack strategies implemented by an adversary. We study both the passive and active attack scenarios, and in each scenario we consider the effect of different data accuracy requirements on the performance of defense measures. Through the analysis results on real-world traffic data, we show that more inserted bogus traces or deleted recorded samples show a better performance when the cost of defense measures is small, whereas doing nothing becomes the best strategy when the cost of defense measures is very large. In addition, we present the optimal defense strategy that provides the defender with the maximum utility when the adversary implements the optimal attack strategy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Publication Date: 2014-01-21
    Description: The nonexistence of an end-to-end path poses great challenges in directly adapting the traditional routing algorithms for ad hoc or mobile ad hoc networks (MANETs) to delay tolerant networks (DTNs). In this paper, an adaptive routing protocol that makes use of both self-aware and destination-aware utility metrics to evaluate the potential throughput between every pair of nodes is proposed. We theoretically analyze the nodes’ spraying process and discover the relationship between the initial number of copies and the latency of the message distribution process, by which we can further control the expected latency under a certain level. Compared with Epidemic, Spray And Wait Spray, And Focus and Encounter-based routing, our proposed algorithm is the only one that achieves comparable performance under both Helsinki City Scenario and Cambridge-iMote Scenario.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2014-01-24
    Description: The function privacy notion was proposed by Boneh, Raghunathan, and Segev in August 2013. It guarantees that the secret key reveals nothing to malicious adversary, beyond the unavoidable minimal information such as the length of ciphertext. They constructed a function private identity-based encryption that contains equality functionality. In this work we construct a new function private attribute-based encryption which supports more complex functionality. And we transform it to a searchable encryption. In searchable encryption, the trapdoor of searching keywords can be seen as the secret key. Hence, using this system can efficiently resist keyword guessing attack.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2014-03-13
    Description: Many applications in wireless sensor networks require some sensors to form a ring or multiring-based shape in the target area, such as intrusion detection, border surveillance, routing overlay formation, and network full coverage. In this paper, we study the problem of sensor redistribution to build a ring-based shape for mobile sensor networks. We first give the theoretical analysis on what is optimal sensor movement with the given random deployment. Then, we propose a fully distributed movement control algorithm to achieve ring-based shape for mobile sensor networks. We formally prove that our algorithm can achieve a ring-based distribution within finite time. We also present the procedures of applying our algorithm to form multiring-based distribution. Finally, we present extensive simulations to verify that our approach outperforms other schemes in terms of both the moving distance and convergence time.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Publication Date: 2014-03-13
    Description: Data collection is an important procedure of ocean monitoring systems. Due to limited bandwidth and extreme high cost of satellite communication, the majority of data is unable to transmit via satellites. For the moment, there are no efficient data collection methods provided for data collection in underwater sensor networks. After collecting and analyzing GPS data of 40 ships for two months, we find the mobility pattern of ships. On the basis of the mobility pattern, we propose a new data collection strategy for underwater sensor networks through delay tolerant routing. Through simulations and real data analysis, we provide quantitative analysis of the proposed strategy, such as data collection ratio, complexity of the algorithm and energy consumption. Especially, the data collection ratio on real data analysis could reach 95%–100% in acceptable time, which is 30% more than the radio of the strategy that data stored as they come.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Publication Date: 2014-03-13
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Publication Date: 2014-03-13
    Description: IT systems are used to help organizations to manage and automate their processes. However, most of today’s systems are not reusable because of mixing the society’s knowledge with the process’s knowledge. Since the societies’ knowledge is different to each other, the applications are not reusable. Hence, this paper address the dependency of the applications on the societies by separately defining process’s ontology, the agent’s knowledge, the society’s ontology, and the society’s knowledge. This research introduces an ontology-based, process-oriented, and society-independent agent system which allows all the organizations to utilize it by defining and importing their societies’ ontology and some process patterns, which can be instantiated from the process’s ontology, into the system. The proposed system can be applied to cloud computing platform. The proposed system has been evaluated from two perspectives, the quality by using the cohesion and the coupling measures for measuring the degree to which the system focuses on solving a particular problem and the applicability by evaluating the manageability and the automatability of the seven processes from three different societies. We believe that our proposed system will improve when we apply some methods to find the best process patterns and perform parallel processes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Publication Date: 2014-03-13
    Description: We propose a novel overlay multicast protocol over wireless sensor network, CLOM (cluster and location based overlay multicast) which use both cluster based approach and location based approach. A cluster based approach is used to manage multicast group consisting of relatively large number of nodes while a location based approach is used to construct a multicast tree with rapidity and low control overhead by using geometric information taken from GPS device. Additionally, the information of damping area and the scheme for reducing the CH node discovery time and control overhead have been introduced into CLOM to improve the performance of the tree. The simulation results showed that CLOM works properly with low data distribution delay and low control overhead where the number of multicast group members is relatively high.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Publication Date: 2014-03-14
    Description: Femtocell is a promising technique not only in operator networks but also in having potential applications for industrial wireless sensor networks. In this paper, we investigate energy efficient uplink power control and subchannel allocation in two-tier femtocell networks. Taking transmit power and circuit power into account, we model the power control and subchannel allocation problem as a supermodular game to maximize energy efficiency of femtocell users. To reduce the cochannel interference from femtousers to neighboring femtocells and macrocells, we introduce a convex pricing scheme to curb their selfish behavior. We decompose the resource allocation problem into two subproblems, that is, a distributed subchannel allocation scheme and a distributed power control scheme to reduce costs and complexity. Simulation results show that the proposed algorithm can improve user utilities significantly, compared with existing power control and subchannel allocation algorithms.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2014-03-14
    Description: This paper is concerned with a reliable solution to the distributed estimation and control issues over hybrid two-tier industrial wireless sensor and actuator networks (IWSANs). It aims at applying wireless technology to industrial automation control domains in hash industrial environment. A main challenge in these application domains is that wireless communication channels must satisfy strict requirements of real time and reliability. Therefore, first, we propose a new interacting dual model (IDM) adaptive estimation algorithm to identify the unreliable wireless communication channels, and, second, to further enhance the accuracy and fault tolerance of state estimation for controlled plant, a federated multisensor estimation fusion approach is presented. Furthermore, considering that the IWSANs need commonly to be deployed over a vast geographical area, a distributed collaborative control strategy is adopted. Finally, an example of temperature control illustrates the effectiveness of the proposed method.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Publication Date: 2014-03-14
    Description: Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network. Fault analysis is a type of side channel attack and cube attack is an algebraic attack finding sufficiently low-degree polynomials in a cipher. In this paper, we show a fault analysis on the Piccolo by using cube attack. We find 16 linear equations corresponding to a round function F by cube attack, which are used to fault analysis. Our attack has the complexity of 28.49 and 29.21 encryptions with fault injections of target bit positions into Piccolo-80 and Piccolo-128, respectively. And our attack needs 220.86 and 221.60 encryptions with random 4-bit fault injections for Piccolo-80 and Piccolo-128, respectively.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Publication Date: 2014-03-14
    Description: Wireless Sensor Networks (WSNs) and Cloud computing are two emerging technologies, respectively, in the networking and computing fields. Sensor Cloud integrates WSNs and Clouds into an extended form of cloud infrastructure that manages sensors scattered throughout WSNs. Networking plays a crucial role in Cloud computing and becomes a particularly challenging issue in sensor Clouds due to resource limitation of WSNs as the underlying network of the Cloud infrastructure. Therefore, data transmission from sensors to servers in sensor Clouds must be carefully controlled to avoid network congestion. In this paper, we study Random Early Detection-Based (RED-based) congestion control for data transmission in sensor Clouds. Specifically we propose an improved RED (IRED) algorithm that meets sensor Cloud networking requirements better and develop a queueing model coupled with analysis technique to evaluate the performance of the proposed congestion control scheme. We also conduct extensive simulations to evaluate performance of IRED compared with the regular RED algorithm. Our analysis and simulation results demonstrate that the proposed IRED congestion control achieves comparable delay performance and preferable throughput performance in comparison with the standard RED for data transmission in sensor Clouds. The easily implemented control mechanism and low complexity of our proposed algorithm make it more suitable for sensor Clouds.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2014-05-06
    Description: We proposed the automatic sound scene control system using the image sensor network for preserving the constant sound scene without respect to the users’ movement. In the proposed system, the image sensor network detects the human location in the multichannel playback environment and the SSC (sound scene control) module automatically controls the sound scene of the multichannel audio signals according to the estimated human location which is the angle information. To estimate the direction of the human face, we used the normalized RGB (red, green, and blue) and the HSV (hue, saturation, and value) calculated from the images obtained by the image sensor network. The direction of the human face can be easily decided as the image sensor to capture the image with the highest number of pixels to satisfy the thresholds of the normalized RGB and the HSV. The estimated direction of the human face is directly fed to the SSC module, and the controlled sound scene can be simply generated. Experimental results show that the image sensor network successfully detected the human location with the accuracy of about 98% and the controlled sound scene by the SSC according to the detected human location was perceived as the original sound scene with the accuracy of 95%.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2014-05-07
    Description: In a wireless sensor network (WSN), the energy of nodes closer to the sink node is usually exhausted sooner than others. This is known as the energy hole problem, which heavily affects the lifetime of the network. In this work, we study the lifetime maximization problem of a three-dimensional corona-based WSN with uniformly distributed sensor nodes and data transmission workload. We first derive the optimal configuration of the first layer of the corona to maximize the lifetime of the network. Then, we propose two strategies to configure nodes outside the first layer: the equal energy strategy (EES) which minimizes the number of hops to transmit data from sensor nodes to the sink and the local optimal energy (LOE) which stands for the fact that under this strategy each individual layer reaches its minimal energy consumption. Furthermore, the optimal equal distance strategy (OEDS) which is a simple deployment strategy was proposed to prolong the lifetime of the network by optimizing layer number .
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Publication Date: 2014-05-07
    Description: In 2010, IEEE and ISO announced the exchange protocol standard (ISO/IEEE 11073-20601), optimized to secure mutual compatibility between all sorts of PHDs and the gateways for collecting bioinformation from the devices and activating related services. This international standard is the first official document that has dealt with communication related to the healthcare device. This paper is about implementing communication protocols between a weight sensor, a kind of personal health devices (PHDs) used in homes, and a gateway collecting a variety of biometric information from multiple sensors, applying international standard ISO/IEEE 11073-20601 for interoperability between medical devices. Moreover, security is enhanced by applying the international symmetric key encryption standard, advanced encryption standard (AES), for secure data transmission from the weight sensor to gateway. When the cipher algorithm was applied, we confirmed that the implementation took about 0.008 second on average than the previous.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Publication Date: 2014-05-07
    Description: Social networking has been used widely by millions of people over the world. It has become the most popular way for people who want to connect and interact online with their friends. Currently, there are many social networking sites, for instance, Facebook, My Space, and Twitter, with a huge number of active users. Therefore, they are also good places for spammers or cheaters who want to steal the personal information of users or advertise their products. Recently, many proposed methods are applied to detect spam comments on social networks with different techniques. In this paper, we propose a similarity-based method that combines fingerprinting technique with trie-tree data structure and meet-in-the-middle approach in order to achieve a higher accuracy in spam comments detection. Using our proposed approach, we are able to detect around 98% spam comments in our dataset.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Publication Date: 2014-05-07
    Description: People worldwide are getting older and this fact has pushed the need for designing new, more pervasive, and possibly cost effective healthcare systems. In this field, distributed and networked embedded systems, such as wireless sensor networks (WSNs), are the most appealing technology to achieve continuous monitoring of aged people for their own safety, without affecting their daily activities. This paper proposes recent advancements in this field by introducing WSN4QoL, a Marie Curie project which involves academic and industrial partners from three EU countries. The project aims to propose new WSN-based technologies to meet the specific requirements of pervasive healthcare applications. In particular, in this paper, the system architecture is presented to cope with the challenges imposed by the specific application scenario. This includes a network coding (NC) mechanism and a distributed localization solution that have been implemented on WSN testbeds to achieve efficiency in the communications and to enable indoor people tracking. Preliminary results in a real environment show good system performance that meet our expectations.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Publication Date: 2014-05-06
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Publication Date: 2014-05-05
    Description: With continuous queries that are used widely in location based mobile social networking services, how to protect the location privacy effectively for continuous query has been a hot topic for researchers. In this paper, we analyze the existing location privacy protection systems and algorithms for location based services; considering their disadvantages of slow responding time and high anonymization costs, we propose a new enhanced greedy cloaking algorithm which predicts a cloaking area at the initial query to be the cloaking region in the whole query lifetime by the comprehensive computation of privacy monitor, quality monitor, and dynamic adjuster. Privacy monitor and quality monitor charge the privacy protection level and service quality degree respectively; dynamic adjuster can adjust the cycle center point dynamically. We employ cycle as cloaking region form which can effectively alleviate the computation overhead. And we compare it with the earlier algorithm on three aspects. The experimental result shows that the enhanced greedy cloaking algorithm is better than the original greedy algorithm on average responding time or anonymization cost.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Publication Date: 2014-05-06
    Description: This paper proposes an improved Hopfield neural network (I-HNN) algorithm to optimize the slot assignment scheme in wireless sensor networks. The key advantage of the proposed algorithm is to increase the convergence probability under different traffic loads. To achieve this, nodes can adjust their slot demands according to the traffic load, slots number, and demand history. Various aspects of the network performances with the proposed I-HNN algorithm are evaluated via simulation. The results indicate that I-HNN is suitable for wireless sensor networks with dynamically varying traffic. In particular, it can increase the convergence probability and slot utilization under the heavy traffic load.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Publication Date: 2014-05-06
    Description: This study primarily focuses on the use of radio frequency identification (RFID) as a form of traffic flow detection, which transmits collected information related to traffic flow directly to a control system through an RS232 interface. At the same time, the sensor analyzes and judges the information using an extension algorithm designed to achieve the objective of controlling the flow of traffic. In addition, the traffic flow situation is also transmitted to a remote monitoring control system through ZigBee wireless network communication technology. The traffic flow control system developed in this study can perform remote transmission and reduce traffic accidents. And it can also effectively control traffic flow while reducing traffic delay time and maintaining the smooth flow of traffic.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Publication Date: 2014-05-06
    Description: Transportation is a huge problem that curbs development of societies and economy in many countries nowadays. Participatory sensing technologies encourage people to be involved in environment monitoring through smart devices. Vehicle sensor networks (VSNs) are a novel solution for road event detection with advantages. In this paper, we consider runtime road event detection using VSNs to satisfy the application-specific requirements through collaboration among vehicles. A group road detection scheme (GRD) by using dynamic clustering in VSNs is presented to improve detection performance with low time complexity and message complexity. The simulations with testbed of 5 remote controllable vehicles show that GRD scheme provides effectiveness under different road scenarios.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Publication Date: 2014-05-06
    Description: This paper investigates the traffic pattern prediction based on seasonal deviation and spectrum reallocation with multiple channel width in cognitive cellular networks. Compared to the existing approaches based on time series or classical statistic method, the binary exponential deviation offset prediction proposed in this paper focuses on the increment or decrement on every sampling point during an exponential offset period. Then the deviations will be revised at different levels in the next prediction process. The proposed approach is validated with some real end-user data from a WiFi network and simulation experiments. Based on such a precise prediction, we allocate the channels with different bandwidth to end-users according to diverse quality-of-service (QoS), which increases both the system’s profits and actual spectrum utilization. The multidimensional bounded knapsack problem is introduced to divide channels, to which the proposed balance between value density and request probability strategy gets the approximate solution. The simulation experiment results show its good performance in not only utility but also spectrum utilization of the base-stations, especially when the resources are deficient.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Publication Date: 2014-05-06
    Description: The abnormal activity detection in smart environments has experienced increasing attention over years, due to its usefulness in pervasive applications. In order to meet the real-time needs and overcome the high costs and privacy issues, this paper proposes distributed abnormal activity detection approach (DetectingAct), which employs the computing and storage resources of simple and ubiquitous sensor nodes, to detect abnormal activity in smart environments equipped with wireless sensor networks (WSN). In DetectingAct, activity is defined as the combination of trajectory and duration, and abnormal activity is defined as the activity which deviates greater enough from those normal activities. DetectingAct works as follows. Firstly, DetectingAct finds the normal activity patterns through duration-dependent frequent pattern mining algorithm (DFPMA), which adopts unsupervised learning instead of supervised learning. Secondly, the distributed knowledge storage mechanism (DKSM) is introduced to store the mined patterns in each node. Then, the current triggered sensor adopts distributed abnormal activity detection algorithm (DAADA), in which the clustering analysis plays a critical role, to compare the present activity with normal activity patterns, by calculating the similarity between them. The feasibility, real-time property, and accuracy of the DetectingAct algorithm are evaluated using both simulation and real experiments case studies.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Publication Date: 2014-05-06
    Description: Although human activity recognition (HAR) has been studied extensively in the past decade, HAR on smartphones is a relatively new area. Smartphones are equipped with a variety of sensors. Fusing the data of these sensors could enable applications to recognize a large number of activities. Realizing this goal is challenging, however. Firstly, these devices are low on resources, which limits the number of sensors that can be utilized. Secondly, to achieve optimum performance efficient feature extraction, feature selection and classification methods are required. This work implements a smartphone-based HAR scheme in accordance with these requirements. Time domain features are extracted from only three smartphone sensors, and a nonlinear discriminatory approach is employed to recognize 15 activities with a high accuracy. This approach not only selects the most relevant features from each sensor for each activity but it also takes into account the differences resulting from carrying a phone at different positions. Evaluations are performed in both offline and online settings. Our comparison results show that the proposed system outperforms some previous mobile phone-based HAR systems.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2014-03-20
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Publication Date: 2014-03-20
    Description: Traditional mobile networks will become dual-layer wireless networks due to small cells’ deployment. The advantages of dual-layer networks are improving network capacity and overcoming the problem of unbalanced traffic distribution in time-space domain. In this paper, performance of small cells deployment is evaluated in simulations. It is shown that users’ traffic is offloaded by small cells obviously. At the same time, performances of signal to interference plus noise ratio (SINR) and throughput are also improved. However, low SINR ( dB) users are also increased because of interferences between macro cells and small cells. Furthermore, a new cooperation scheme is proposed for energy saving in dual-layer networks. This scheme is implemented through a functional modular, named by Area Control Center (ACC). Finally, simulations are given to verify the efficiency of this energy saving scheme. The numerical results show that energy consumption could be reduced by 20%.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Publication Date: 2014-03-20
    Description: Wireless sensor network is drawing intensive research attention and being applied in various practical scenarios. The integration of WSN in industrial manufacturing process provides low cost industrial automation systems. The benefits of WSN include rapid deployment, self-organization, and being maintenance free. However, wireless sensor nodes are battery powered; replacing or recharging battery is usually impossible after deployment, which makes energy a scarce resource for WSN. Furthermore, in industrial applications, environment information is gathered and delivered in a timely manner, which makes traditional energy saving methods such as listen-sleeping duty approach less efficient. In this work, a novel dynamic address encoding scheme based on packet arrival rate is proposed; the scheme can reduce the protocol overhead by reducing MAC and network address size and thus saves energy needed for data transmission. The implementation of the scheme is fully distributed and needs little modification of the existing applications. Simulation results show the proposed scheme is efficient and robust on both the MAC layer and the network layer.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2014-04-30
    Description: This paper presents a sensor random deployment scheme to monitor 2-dimensional areas for constraining applications while providing a mathematical control of the coverage quality it allows. In addition, useful techniques to detect and repair sensor failures are also added to provide system robustness based on this scheme. In particular, mathematical formulas are developed to express the probability of complete coverage when the environment characteristics are varying, taking into account the deployment parameters. Moreover, a methodology is presented to adapt this scheme to the need of various WSN-based monitoring applications. A simulation is also performed to show the efficiency of the developed strategy, highlight some of its features, and assess its impact on the lifetime of the monitoring system it serves.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Publication Date: 2014-04-30
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Publication Date: 2014-04-30
    Description: Due to the nonexistence of end-to-end path between the sender and the receiver in delay tolerant networks and mobile social networks, consequently successful message transmission faces great challenges. In this paper, an adaptive routing algorithm taking full use of gregariousness characteristics of moving nodes is proposed. We first abstract all social relationships and uniformly represent them using friendship. Then by dynamically dividing nodes into different social groups, we finish flooding message among the target social group where destination node resides. In addition, we propose a social group based flooding model and a message redundancy control model to select fewer but better relay nodes and further reduce message redundancy. Extensive simulations have been conducted based on the synthetic traces generated by working day movement model and the results show that the proposed routing algorithm can get a higher message delivery ratio and a lower overhead ratio compared to Bubble Rap, Epidemic, and ProPHET, thus proving a better routing performance.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Publication Date: 2014-05-01
    Description: We present a localization of sound sources algorithm for underground parking lots and a compensation algorithm for enhancing localization of sound sources based on the least-squares method (LSM). The proposed localization of sound sources system is designed for the underground parking lots in apartments. The sound location algorithm is referred to as , and the localization algorithm enhanced with the compensation algorithm is referred to as . We also present the performance comparison of the proposed algorithms under directions 135°, 180°, 270°, and 337.5°. The proposed compensation algorithm reduces the error of sound sources by 72.4% on average. The algorithm can be applied to the localization of sound sources system for underground parking lots as well as to various sound sources based applications due to its low cost.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Publication Date: 2014-05-01
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Publication Date: 2014-05-01
    Description: In wireless sensor networks, the existing range-free localization techniques are based on either centralized approach or distributed approach. The centralized approach causes overhead, latency, and so forth, while the distributed approach is more complex. In order to overcome these issues, in this paper, we propose a cluster based architecture for range-free localization in wireless sensor network. Initially cluster-heads are selected based on the parameters such as link quality, residual energy, and coverage. An event based localization technique is applied to each cluster that involves straight line scanning of the clusters with deployed multiple sinks. The scanning process helps in estimating the location of target nodes with reference to the anchor nodes position. In case if any target node in the cluster is not localized, a distance based localization technique is executed that localizes the target node. By simulation results, we show that the proposed technique reduces the overhead and latency and increases the localization accuracy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Publication Date: 2014-03-20
    Description: The random movement of nodes makes the dynamic topology structure be one of the most important characteristics in wireless multihop communication network, which makes the description and quantization of the dynamic property the very foundation of the design, simulation, and measurement for this kind of network. The distributions of the link duration and the topology duration will be derived and verified by simulations. Then, the topology flapping sensing method has been put forward based on TTL. Finally, the probability model of the topology stability in the measurement time has been established and calculated based on network tomography for wireless mobile multihop communication network in this paper. Simulating results verify the correctness and efficiency of the approach, which will provide the technique basis of research on the dynamic property and end-to-end measurement for wireless mobile multihop communication network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2014-03-03
    Description: Since hash functions are cryptography’s most widely used primitives, efficient hardware implementation of hash functions is of critical importance. The proposed high performance hardware implementation of the hash functions used sponge construction which generates desired length digest, considering two key design metrics: throughput and power consumption. Firstly, this paper introduces unfolding transformation which increases the throughput of hash function and pipelining and parallelism design techniques which reduce the delay. Secondly, we propose a frequency trade-off technique which can give us a scope of frequency value for making a trade-off between low dynamic power consumption and high throughput. Finally, we use load-enable based clock gating scheme to eliminate wasted toggle rate of signals in the idle mode of hash encryption system. We demonstrated the proposed design techniques by using 45 nm CMOS technology at 10 MHz. The results show that we can achieve up to 47.97 times higher throughput, 6.31% delay reduction, and 13.65% dynamic power reduction.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2014-03-05
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Publication Date: 2014-03-05
    Description: In this paper, we introduce a mobility aware and energy efficient congestion control protocol “time sharing energy efficient congestion control (TSEEC) for mobile wireless sensor network.” TSEEC is based on hybrid scheme of time division multiple access protocol (TDMA) and statistical time division multiple access (STDMA) protocol that inform the sensor nodes when to wake up and to go to listening state so as to save energy. This management helps in minimizing congestion and improving network energy conservation through its load based allocation (LBA) and time allocation leister (TAL) techniques. LBA is typically based on STDMA that uses sensor node information for assignment of dynamic timeslots to the sensor, nodes, whereas TAL targets the mobility management of sensor nodes that further comprises three main strategies of cluster member node that is, joining cluster, leaving cluster, and absence of data/redundant data with extricated time allocation (ETA), shift back time allocation (SBTA), and eScaped Time Allocation (STA) subtechniques. In addition, TSEEC protocol introduces the mobility pattern to control the mobile sensor node (MSN) movement to enable the protocol to effectively adapt itself to change the traffic environments and mobility. Mathematical analysis and NS2 simulation show that TSEEC outperforms SMAC in terms of energy consumption and packet deliver ratio. Furthermore, a comparative analysis of TSEEC with various well-known related MAC protocols is also given.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Publication Date: 2014-04-29
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Publication Date: 2014-04-29
    Description: Various errors and failures occur every day in the plant field. However these errors have been managed manually by field inspector. In this paper, we present a design and implementation of a field inspection management system based on wireless sensor networks. This system works on a portable embedded device. To develop the field inspection management system, we analyzed work tasks and process in the plant field. In addition, we propose security measures for preventing information stealing and alteration in the embedded system. Through this system, we can manage effectively error information collected in the field.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Publication Date: 2014-04-29
    Description: The paper proposes the algorithm of survival topology evolution model. The model applies the survival analysis to the research on the topology of networks. On one hand, it takes the survivability of every node into account. Since the state of a node is affected by the node itself, the environment and so on, it’s necessary to study the survivability of nodes. In addition, the survival analysis on the nodes can indicate whether the nodes work well in real time. On the other hand, it also takes the deletion of links and nodes determined by the survivability of the nodes into account. Then it reaches the conclusion by mean field method. The result shows that the degree distributions of WSNs are approximately power law as B-A model and that the survivability of the nodes is proportional to the degree distribution of the network consisting of the previous nodes. These are further confirmed by simulation example.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2014-04-29
    Description: The introduction of semantic web and Linked Data helps facilitate sharing of data on the Internet more easily. Subsequently, the resource description framework (RDF) is the standard in publishing structured data resources on the Internet and is used in interconnecting with other data resources. To remedy the data integration issues of the traditional web mashups, the semantic web technology uses the Linked Data based on RDF data model as the unified data model for combining, aggregating, and transforming data from heterogeneous data resources to build Linked Data mashups. There have been tremendous amounts of efforts of semantic web community to enable Linked Data mashups but there is still lack of a systematic survey on concepts, technologies, applications, and challenges. Therefore, in this paper, we investigate in detail semantic mashups research and application approaches in the information integration. This paper also presents a Linked Data mashup application as an illustration of the proposed approaches.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2014-04-29
    Description: Data are generated and updated tremendously fast by users through any devices in anytime and anywhere in big data. Coping with these multiform data in real time is a heavy challenge. Hadoop distributed file system (HDFS) is designed to deal with data for building a distributed data center. HDFS uses the data duplicates to increase data reliability. However, data duplicates need a lot of extra storage space and funding in infrastructure. Using the deduplication technique can improve utilization of the storage space effectively. In this paper, we propose a dynamic deduplication decision to improve the storage utilization of a data center which uses HDFS as its file system. Our proposed system can formulate a proper deduplication strategy to sufficiently utilize the storage space under the limited storage devices. Our deduplication strategy deletes useless duplicates to increase the storage space. The experimental results show that our method can efficiently improve the storage utilization of a data center using the HDFS system.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2014-04-28
    Description: In order to improve the quality of applications, such as recommendation or retrieval in knowledge-based service system, it is very helpful to uncover research topics of academic communities in scientific collaboration network (SCN). Previous research mainly focuses on network characteristics measurement and community evolution, but it remains largely understudied on how to uncover research topics of each community. This paper proposes a nonjoint approach, consisting of three simple steps: (1) to detect overlapping academic communities in SCN with the clique percolation method, (2) to discover underlying topics and research interests of each researcher with author-topic (AT) model, and (3) to label research topics of each community with top most frequent collaborative topics between members belonging to the community. Extensive experimental results on NIPS (neural information processing systems) dataset show that our simple procedure is feasible and efficient.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Publication Date: 2014-04-29
    Description: A social network service (SNS) is a platform to build social networks or social relations among people. Many users enjoy SNS with their smart devices, which are mostly equipped with sensory devices. The sensitive information produced by these sensory devices is uploaded to SNS, which may raise many potential risks. In order to share one's sensitive data with random people without security and privacy concerns, this paper proposes a shared interest discovery model for coauthor relationship in SNS, named as coauthor topic (coAT) model, to identify the users with similar interests from social networks, and collapsed Gibbs sampling method is utilized for inferring model parameters. Thus, one can reduce the possibility that recommended users are not friends but attackers. Finally, extensive experimental results on NIPS dataset indicate that our coAT model is feasible and efficient.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Publication Date: 2014-04-29
    Description: In the study of three-dimensional underwater sensor networks, the nodes would produce changes in perception range under the influence of environmental factors and their own hardware. Requesting all nodes completely isomorphic is unrealistic. Ignoring boundary effects usually causes the coverage effect of the actual deployment of networks to not reach the anticipated result. This paper firstly presents an underwater sensing model with normal distributed node sensing radius. Secondly, it gives the relationship between expected deployment quality and the number of nodes in the premise of considering boundary effects. Then, it deduces nodes’ redundancy formula based on the sensing model with normal distributed node sensing radius, making node could determine whether itself is a redundant node only based on the number of its neighbour nodes. Furthermore, this paper proposes a redundancy model and boundary effects based coverage-enhancing algorithm for three-dimensional underwater sensor networks (RBCT). Simulation results show that RBCT, compared to similar algorithms, has certain advantages in saving energy and enhancing coverage rate.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Publication Date: 2014-04-29
    Description: An error control method is investigated and obtained by combination of the modulation and linear block code in sensor networks. The constructed coding scheme is multistage decoded using a new low-complexity soft-decision decoding method in sensor networks. Computer simulations of the proposed method are presented and compared with the reunion junction technique. The proposed method shows a better performance than the reunion junction technique. The low complexity of the method allows the use of long linear block codes. It is possible to construct an efficient bandwidth multilevel code on signal set partitioning. A wide range of design tradeoffs are possible with multilevel codes. Composite codes are possible using component codes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2014-04-28
    Description: The authors first review the recently proposed Das’s biometric-based remote user authentication scheme, and then show that Das’s scheme is still insecure against some attacks and has some problems in password change phase. In order to overcome the design flaws in Das’s scheme, an improvement of the scheme is further proposed. Cryptanalysis shows that our scheme is more efficient and secure against most of attacks; moreover, our scheme can provide strong mutual authentication by using verifying biometric, password as well as random nonces generated by the user and server.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2014-04-28
    Description: Modern health care system is one of the most popular Wireless Body Area Sensor Network (WBASN) applications and a hot area of research subject to present work. In this paper, we present Reliability Enhanced-Adaptive Threshold based Thermal-unaware Energy-efficient Multi-hop ProTocol (RE-ATTEMPT) for WBASNs. The proposed routing protocol uses fixed deployment of wireless sensors (nodes) such that these are placed according to energy levels. Moreover, we use direct communication for the delivery of emergency data and multihop communication for the delivery of normal data. RE-ATTEMPT selects route with minimum hop count to deliver data which downplays the delay factor. Furthermore, we conduct a comprehensive analysis supported by MATLAB simulations to provide an estimation of path loss, and problem formulation with its solution via linear programming model for network lifetime maximization is also provided. In simulations, we analyze our protocol in terms of network lifetime, packet drops, and throughput. Results show better performance for the proposed protocol as compared to the existing one.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2014-04-28
    Description: This paper explores the possibility of enhancing consensus achievement of decentralized sensors by establishing cooperative behavior between sensor agents. To these ends, a novel particle swarm optimization framework to achieve robust consensus of decentralized sensors is devised to distribute sensing information via local fusing with neighbors rather than through centralized control; the new framework showed a 16.5 percent improvement in consensus achievement as compared to the classic majority rule method. Noteworthy enhancements in consensus achievement are also pertinent to the comparable situation of decentralized sensor systems.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Publication Date: 2014-04-28
    Description: Cyber-physical system (CPS) is an integration of physical processes with computation and communication. It has the ability to add more intelligence to social life. Wireless sensor networks (WSN) can be a vital part of CPS as strong sensing capability is one of the major driving factors for CPS applications. CPS is still considered to be a nascent technology, and there are many challenges yet to be addressed. A few CPS applications in healthcare have been proposed to date, and they lack the flexibility of technology integration, such as integration of computing resources with sensor networks. This paper presents a survey of CPS in healthcare applications that have been proposed to date by academia as well as industry. A comprehensive taxonomy is also provided that characterizes and classifies different components and methods that are required for the application of CPS in healthcare. The taxonomy not only highlights the similarities and differences of the state-of-the-art technologies utilized in CPS for healthcare from the perspective of WSN and Cloud Computing but also identifies the areas that require further research. It is expected that this taxonomy and its mapping to relevant systems will be highly useful for further development of CPS for healthcare.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2014-04-28
    Description: Wireless multimedia sensor networks (WMSNs) are more and more wildly used for a variety of applications nowadays. The quality-of-service (QoS), as a measure of system performance, is very important and attracts many researchers. The limited bandwidth should be adjusted for the packets with different priorities precisely. Even more, when the WMSNs are used for environment monitoring, besides the real-time video playing, the monitoring systems also need to record and playback the video after some time. So the necessary and proper retransmission should be added to the real-time video transmission, without affecting the normal data streams. To emphasize the problem, the paper provides a flexible and reliable traffic control protocol. According to the packet priorities, sensor nodes in one collision area can adjust their sending states adaptively. Variable retransmission tactics are provided for the packets with different priorities. The simulations show that the bandwidth adjustment can protect the packets with high priority effectively, and the performance of the retransmission is well positioned to meet the requirement of the multimedia applications.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2014-04-28
    Description: Healthcare service sector is one of the major applications of Wireless Sensor Networks (WSNs) acknowledged as Wireless Medical Sensor Network (WMSNs). It deploys tiny medical sensor-nodes (MS-nodes) on the body of the patient to sense crucial physiological signs which can be accessed and analyzed by registered medical professionals. Recently, Khan et al. analyzed Kumar et al.’s scheme proposed for healthcare applications using WMSNs and observed that the scheme is susceptible to many security weaknesses if an adversary extracts the information from the lost smart card of some user. The adversary can access patient’s physiological data without knowing actual password, can deceive medical professionals by sending fake information about patients, can guess the password of a user from the corresponding smart card, and so forth. Besides, the scheme fails to resist insider attack, lacks user anonymity and the session key shared between the user and the MS-node is insecure. To overcome these problems, we propose an improved user authentication scheme for healthcare applications using WMSNs. We show that the scheme is free from the identified weaknesses and excels in performance and efficiency scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Publication Date: 2014-03-03
    Description: Clustering in vehicular ad hoc networks is an effective approach to make dynamic wireless vehicular sensor networks more manageable and stable. To make vehicle clustering applicable everywhere regardless of the provided infrastructure, vehicles must rely only on themselves and must not take any supporting services, such as location or external communication services, for granted. In this paper, we propose a new clustering metric and a clustering algorithm with multihoming support. It relies only on the vehicle’s ability to send and receive wireless packets which identify the vehicle relationship. Clusters are created with redundant connections between nodes to increase the communication reliability in case of topological changes and the cluster creation process is also inverted compared to other algorithms. The presented solution is verified and compared to MOBIC with the use of ns-3 and SUMO simulation tools. Simulation results have confirmed the expected behavior and show that our algorithm achieves better node connectivity and cluster stability than the former.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Publication Date: 2014-03-03
    Description: Advances in healthcare applications benefit the scenario of medical service provision for both care staff and medical institution than ever. Following such success, a healthcare system, named RCTC (Resident Classification by Types of Care), which grades individuals in terms of the severity of five functional status assessment aspects: mental, movement, eating, toilet (urination and defecation functions), and medical treatment, was developed in this study. This system is designed based on a conceptual model that follows the assessment/classification/placement sequence for long-term care institutions. It is implemented to deliver appropriate services according to individual needs based on its preprocessing of classification and further reduces the costs of manpower and loading of care staff through the analysis of assessment logs. With this systematic appraisal, this system can not only help care staff determine the needs of residents but also produce personalized health plans (i.e., weekly schedule towards comprehensive assessment and personalized care services). Results of implemented (and in use as well) system have demonstrated the feasibility that it can enhance the quality of care services to residents, working load of care staff, and efficiency of care-related information management for medical institution.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Publication Date: 2014-04-29
    Description: This research first focused on processing enormous number of sensor events from a variety of city-wide sensor networks. As a solution, the well-known big data handling scheme, Hadoop cluster framework, drew, unquestionably, our attention. The acquired sensor events are to be used to immediately detect a certain abnormal situation within the framework. Accordingly, we integrated our existing context-aware collaboration framework with Hadoop cluster framework by interfacing data collection and context-aware reasoning parts of the existing framework with the Hadoop cluster framework. This approach enabled us to effectively process massive sensor events and semantically analyze the big data within the cluster environment. The proposed smart city sensor cloud framework provides ontology-enabled semantic reasoning scheme with the XOntology in combination with the Context-Aware Inference (CAI) model. By applying the ontology technology, the proposed framework enhances the availability and interoperability of the contextual information across many cooperating parties according to semantic reasoning results. Further, this framework is flexible enough to integrate any heterogeneous platforms including many existing IT solutions as well as mobile platforms. In addition, this approach presents the direction of progressive migration of many existing sensor network solutions into big data handling sensor cloud framework.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Publication Date: 2014-04-29
    Description: A relay transmission is a promising technology to improve network performance in dynamic infrastructure. In this paper, we propose a distributed relay-assisted retransmission (DRR) scheme in multirate wireless home networks. The idea is to exploit overhearing nodes to retransmit on behalf of sender node after receiving the block acknowledgement (B-ACK) from destination node. For the first transmission, a basic relay (BR) node is used by considering the high data rate between source node and BR node. And then, for the retransmission, a retransmission relay (RR) node is used by considering the high data rate between RR node and destination node. The DRR scheme extends a distributed reservation protocol in WiMedia home networks and inquires the candidate relay node as BR nodes and RR nodes during beacon period. In addition, the DRR scheme can minimize control overhead for relay transmission because all nodes should send and listen to the beacon frames of neighbor nodes during beacon period. We also present the relay decision scheme and channel allocation procedure for maximizing the efficiency in the DRR scheme. Extensive simulation results demonstrate that the DRR scheme can improve the overall throughput by 40% and reduce the energy consumption by 47% compared with nonrelay transmission schemes when the number of nodes increases.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Publication Date: 2014-04-29
    Description: Given its importance, the problem of secure data aggregation in wireless multimedia sensor networks has attracted great attention in the literature. Wireless multimedia sensor networks present some challenges that are common to wireless sensor networks, such as the existence of limited resources, like sensors memory, energy consumption, and CPU performance. Many methods have been proposed to attempt to solve the problem. However, the existing data aggregations do not take into account the redundancy of the multimedia data. In order to improve the energy efficiency for multimedia data, we propose a similarity model and power model. The proposal scheme divides multimedia data into multiple different pieces, and transmits the effective pieces to the selected sensor nodes. Through theoretical justifications and empirical studies, we demonstrate that the proposed scheme achieves substantially superior performances over conventional methods in terms of energy efficiency and data transmission under the resource-constrained wireless multimedia sensor networks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Publication Date: 2014-01-31
    Description: We created a robust and secure forensic marking algorithm through the process of hiding information in a two-dimensional (2D) barcode and embedding it into the discrete wavelet transformation-discrete fractional random transformation (DWT-DFRNT) domain using the quantization technique. We hid information in the 2D barcode, encoded it with the block code that we developed, and then converted it through scrambling. The security of the algorithm was greatly improved by increasing the calculation complexity through hiding the embedded information. Forensic marks were embedded into the DWT-DFRNT dual domain. The 2D-DWT used for this was applied to the frequency division and the DFRNT was applied to increase the algorithm security by randomly mixing the pieces of information so that they could be embedded in unpredictable locations in a certain frequency space. The bit error generated in the extraction process was corrected by the self-error-correction function of the block code and 2D barcode. The experimental result showed that the information contained in the 2D barcode was accurately extracted from the forensic marks within the error correction range.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Publication Date: 2014-02-25
    Description: A new distance-aware broadcasting algorithm was proposed to enhance the propagation distance in the latency time of safety-related message broadcasting. The IEEE 802.11p standard states that if the medium is detected as idle, a station would defer its transmission within a backoff time to avoid collisions with other stations. The backoff times follow uniform distribution over [0, CW]. In this way, fairness among all the stations can be guaranteed. However, propagation distance was ignored and in safety-related message broadcasting fairness is not the most important issue. In the proposed algorithm, the lengths of backoff times are generated from a nonuniform distribution. They are related with the distances between the source station and its forwarding stations. The farthest forwarding station has the highest probability to forward messages. Performance of the proposed algorithm is analyzed by using a 2D Markov chain. Analytical and simulation results demonstrate that the proposed algorithm can enhance the performance of safety-related message broadcasting in terms of propagation distance, which is reflected by the successful transmission probability. The proposed algorithm does not need additional waiting time, RTS/CTS, and ACK, therefore having better compatibility with the IEEE 802.11p standard than earlier distance-aware algorithms.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Publication Date: 2014-02-12
    Description: Context-aware applications are required to be aware of user context and ambient intelligent to support nonintrusive human-computer interaction. However, the uncertain real-world environments make it difficult for a system to perceive enough environmental contexts and achieve user’s goal. Therefore, this study proposes a framework for developing an NFC-enabled intelligent agent, which combines the NFC technique with context-acquisition, ontology-knowledgebase, and semantic-adaptation modules to be aware of location, time, device, and activity contexts with respect to personal and social profiles. To cope with the uncertain environment, a credit-based incentive scheme is also proposed to encourage social cooperation and thereby enlarge the value of personal perceptions. By developing a complete ontology knowledgebase, the proposed framework can incorporate with social-cooperation schemes to recommend relevant services for supporting reactive action, proactive achievement, and social cooperation. The resultant social-advertising system shows that this framework can support a wide-range of different functionalities and is indispensable to an NFC-based intelligent agent for social Internet of things.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Publication Date: 2014-02-14
    Description: Wireless sensor networks (WSNs) are composed of sensor nodes with limited energy which is difficult to replenish. In-network data aggregation is the main solution to minimize energy consumption and maximize network lifetime by reducing communication overhead. However, performing data aggregation while preserving data confidentiality and integrity is challenging, because adversaries can eavesdrop and modify the aggregation results easily by compromised aggregation nodes. In this paper, we propose an efficient confidentiality and integrity preserving aggregation protocol (ECIPAP) based on homomorphic encryption and result-checking mechanism. We also implement ECIPAP on SimpleWSN nodes running TinyOS. Security and performance analysis show that our protocol is quite efficient while persevering both aggregation confidentiality and integrity.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Publication Date: 2014-02-14
    Description: Self-localization is critical for many unmanned aerial vehicles (UAVs) tasks such as formation flight, path planning, and activity coordination. Traditionally, UAV can locate itself using GPS combined with some inertial sensors. However, due to the complex flight environment or failure of the GPS receiver, the UAV may lose its GPS signal and fail to locate itself, resulting in devastating consequence. In this paper, we will consider the problem of cooperative localization among multiple UAVs, in which the UAVs with failure of GPS receiver can help each other to locate themselves through mutual information exchanged based on the relative distance measurements. Specifically, we propose a dynamic Nonparametric Belief Propagation (dNBP) algorithm to calculate the posterior distribution of UAV’s position conditioned on all observations made in the whole UAVs group. The dNBP is a natural combination of NBP with particle filtering, suitable for treating with the nonlinear model and highly non-Gaussian distributions arising in our application. Furthermore, dNBP provides the basis for distributed algorithm in which messages are exchanges between neighboring UAVs. Thus, the computational burden is distributed across UAVs. Simulations in Matlab environment show the effectiveness of our method.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Publication Date: 2014-02-14
    Description: Due to the importance of power dissipation in the wireless sensor networks and embedded systems, real-time scheduling has been studied in terms of various optimization problems. Real-time tasks that synchronize to enforce mutually exclusive access to the shared resources could be blocked by lower priority tasks. While dynamic voltage scaling (DVS) is known to reduce dynamic power consumption, it causes increased blocking time due to lower priority tasks that prolong the interval over which a computation is carried out. Additionally, processor slowdown to increase execution time implies greater leakage energy consumption. In this paper, a leakage-controlled method is proposed, which decreases both priority inversion and power consumption. Based on priority ceiling protocol (PCP) and a graph reduction technique, this method can decrease more energy consumption and avoid priority inversion for real-time tasks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2014-02-14
    Description: The area of three-dimensional (3D) underwater wireless sensor networks (UWSNs) has attracted significant attention recently due to its applications in detecting and observing phenomena that cannot be adequately observed by means of two-dimensional UWSNs. However, designing routing protocols for 3D UWSNs is a challenging task due to stringent constraints imposed by acoustic communications and high energy consumption in acoustic modems. In this paper, we present an ultrasonic frog calling algorithm (UFCA) that aims to achieve energy-efficient routing under harsh underwater conditions of UWSNs. In UFCA, the process of selecting relay nodes to forward the data packet is similar to that of calling behavior of ultrasonic frog for mating. We define the gravity function to represent the attractiveness from one sensor node to another. In order to save energy, different sensor nodes adopt different transmission radius and the values can be tuned dynamically according to their residual energy. Moreover, the sensor nodes that own less energy or locate in worse places choose to enter sleep mode for the purpose of saving energy. Simulation results show the performance improvement in metrics of packet delivery ratio, energy consumption, throughput, and end-to-end delay as compared to existing state-of-the-art routing protocols.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2014-02-14
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2014-02-14
    Description: Cognitive Radio (CR) is a dynamic spectrum access approach, in which unlicensed users (or secondary users, SUs) exploit the underutilized channels (or white spaces) owned by the licensed users (or primary users, PUs). Traditionally, SUs are oblivious to PUs, and therefore the acquisition of white spaces is not guaranteed. Hence, a SU must vacate its channel whenever a PU reappears on it in an unpredictable manner, which may affect the SUs’ network performance. Spectrum leasing has been proposed to tackle the aforementioned problem through negotiation between the PU and SU networks, which allows the SUs to acquire white spaces for a guaranteed period of time. Through spectrum leasing, the PUs and SUs enhance their network performances, and additionally PUs maximize their respective monetary gains. Numerous research efforts have been made to investigate the CR, whereas the research into spectrum leasing remains at its infancy. In this paper, we present a comprehensive review on spectrum leasing schemes in CR networks by highlighting some pioneering approaches and discuss the gains, functionalities, characteristics, and challenges of spectrum leasing schemes along with the performance enhancement in CR networks. Additionally, we discuss various open issues in order to spark new interests in this research area.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2014-02-14
    Description: This paper presents a new design approach based on EtherCAT protocol aiming at a special networked motion control system. To evaluate this system, the testing platform of the networked motion control system for ocean wave maker is designed. The paper gives the detailed design for the testing platform including software and hardware. With message access delay and jitter, a set of experiments are done to evaluate the crucial performance for the implemented networked motion control system. By analyzing the experimental results, the systemic performance is verified. And the design approach can be widely extended to other automation application scenarios.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2014-02-14
    Description: VoIP, which is used to transmit voice data on the Internet, is being welcomed as a replacement for the PSTN. In VoIP, voice data are converted to IP data and transmitted in an ordinary IP network. As a result, it is less expensive than the ordinary telephone network and has excellent scalability. With the increasing demand for VoIP services, problems are also occurring, namely, security vulnerabilities and degraded service quality. To address these issues, in this paper an AA (Attribute Authority) server is added to VoIP to design an authentication system with bolstered security and differentiated user access.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2014-02-27
    Description: We aim to cover a grid fully by deploying the necessary wireless sensors while maintaining connectivity between the deployed sensors and a base station (the sink). The problem is NP-Complete as it can be reduced to a 2-dimensional critical coverage problem, which is an NP-Complete problem. We develop a branch and bound (B&B) algorithm to solve the problem optimally. We verify by computational experiments that the proposed B&B algorithm is more efficient, in terms of computation time, than the integer linear programming model developed by Rebai et al. (2013), for the same problem.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2014-02-28
    Description: In emerging mobile aggregation applications (e.g., large-scale mobile survey), individual privacy is a crucial factor to determine the effectiveness, for which the noise-addition method (i.e., a random noise value is added to the true value) is a simple yet powerful approach. However, improper additive noise could result in bias for the aggregate result. It demands an optimal noise distribution to reduce the deviation. In this paper, we develop a mathematical framework to derive the optimal noise distribution that provides privacy protection under the constraint of a limited value deviation. Specifically, we first derive a generic system dynamic function that the optimal noise distribution must satisfy and further investigate two special cases for the distribution of the original value (i.e., Gaussian and truncated Gaussian distribution). Our theoretical and numerical analysis suggests that the Gaussian distribution is the optimal solution for the Gaussian input and the asymptotically optimal solution for the truncated Gaussian input.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2014-02-28
    Description: Optimizing the design of tracking system under energy and bandwidth constraints in wireless sensor networks (WSN) is of paramount importance. In this paper, the problem of collaborative target tracking in WSNs is considered in a framework of quantized measurement fusion. First, the measurement in each local sensor is quantized by probabilistic quantization scheme and transmitted to a fusion center (FC). Then, the quantized messages are fused and sequential importance resampling (SIR) particle filtering is employed to estimate the target state. In the FC, quantized measurement fusion via both augmented approach and weighted approach is investigated. For both approaches, the closed-form solution to the optimization problem of bandwidth scheduling is given, where the total energy consumption is minimized subject to a constraint on the fusion performance. Finally, posterior Cramer-Rao lower bounds (CRLBs) on the tracking accuracy using quantized measurement fusion are derived. Simulation results reveal that both approaches perform very closely to the posterior CRLB while obtaining average communication energy saving up to 72.8% and 45.1%, respectively.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2014-02-28
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2014-03-24
    Description: In emerging tracking systems using mobile wireless sensor networks, sensor mobility management is essential for balancing the tracking performance and costs under limited network resources and sensor movements. This paper considers the sensor mobility control problem for multitarget tracking (MTT), in which multiple mobile sensors are dynamically grouped and moved to track multiple targets and collaborate within each sensor group via track data fusion. A novel sensor mobility control framework for the mobile sensor network-based MTT is proposed. It is formulated as a constrained optimization problem that aims to maximize the overall tracking performance for all targets while conserving network energy and providing tracking coverage guarantee. The optimization problem is relaxed as a convex programming problem for computational tractability and its solution is implemented in a distributed manner. The newly proposed sensor mobility control scheme, implemented on the basis of iterative subgradient search, is shown via computer simulation to have better performance over the static sensor network-based MTT.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Publication Date: 2014-03-24
    Description: This paper proposes a multirate network coding scheme to improve the energy efficiency of wireless sensor networks (WSNs). Firstly, a five-layer network model is introduced, in which a perfect solution can always be achieved. Then, a network topology which belongs to the five-layer network model will be established from the given sensor networks so that the receivers can receive data at a higher rate without introducing excessive additional transmissions, which improves the energy efficiency as a result. The performance of the proposed scheme is evaluated in a simulated instance, and the result shows that 9% of transmission overhead can be saved compared with traditional scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2014-03-24
    Description: Energy efficiency is one of the most important issues for operations of wireless sensor networks. To increase network lifetime and to reduce energy consumption of sensor nodes, many clustering and routing protocols have been studied. In this paper, we propose an energy-efficient cooperative communication method which forms clusters and establishes intercluster routes directly or via relay nodes. Relay nodes selected by the cooperation of adjacent cluster heads along with their cluster members can prevent long-haul transmissions of cluster heads. This can reduce the energy consumption of cluster heads. We show the validity of using relay nodes and then compare the performance of the proposed method with that of a well-known clustering and routing protocol for wireless sensor networks. Our computational experiments demonstrate that network lifetime, energy consumption, and scalability of the proposed method are better than those of the compared method.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...