ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (1,191)
  • 2020-2022
  • 2010-2014  (1,191)
  • 1980-1984
  • 1975-1979
  • 1950-1954
  • 2013  (1,191)
  • International Journal of Distributed Sensor Networks  (598)
  • 163708
  • Electrical Engineering, Measurement and Control Technology  (1,191)
  • Process Engineering, Biotechnology, Nutrition Technology
  • 1
    Publication Date: 2013-09-10
    Description: This work provides a distributed fault-tolerant event region detection algorithm for wireless sensor networks. The proposed algorithm can identify faulty and fault-free sensors and ignore the abnormal readings to avoid false alarm. Moreover, every event region can also be detected and identified. Simulation results show that fault detection accuracy (FDA) is greater than 92%, false alarm rate (FAR) is near 0%, and event detection accuracy (EDA) is greater than 99% under uniform distribution. FDA is greater than 92%, FAR is less than 1.2%, and EDA is greater than 88% under random distribution when sensor fault probability is less than 0.3.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2013-09-13
    Description: The components and claddings of low-rise buildings are usually destroyed first during typhoon disasters in coastal areas. Roof accessory structures can change the flow pattern on the roof, thus effectively reducing the wind load on the roof surface and the damage to the low-rise buildings. Three types of aerodynamic mitigation plates, that is, (1) 0.3 m high full-length roof-edge plate, (2) 0.3 m high and 0.5 m + 0.5 m long roof-corner plate, and (3) discrete roof-edge plates with different spaces (which can be used as advertisement boards), are studied on the basis of the field measurement results under roof pitches of 10° and 18.4°. By comparing the results of the roof with and without constructed plates, it is implied that the three types of plates can affect the formation of conical vortexes and can significantly reduce the mean and fluctuating pressure coefficients in the windward corner. Compared with the constructed plate, the roof ridge has a larger influence on the wind loads on leeward roof.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2013-09-15
    Description: Cooperative communications that take advantage of the broadcasting nature of wireless environments can help to increase system throughput in wireless ad hoc networks. However, the promised throughput might be lost in presence of the error transmission and the interference caused by relay transmission in cooperative communication. In this paper, we introduced the relay selection schemes that can control the interference at the relay to prevent the relay that may harm other pairs. Then, we proposed the throughput-optimal scheduling that takes into account error probability in decision and maximizes throughput, that is, the amount of packets transmitted without error in network. In addition, we derive a simple and lightweight framework to implement the proposed policy in distributed manner. The simulation results show that the proposed scheduling policy outperforms the noncooperative policy and multihop relay policy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2013-09-19
    Description: A novel preference ranking organization method by similarity to ideal solution (PROMSIS) vertical handoff algorithm is proposed for heterogeneous wireless networks, and its essential idea includes the preference structure of the PROMETHEE and the concept of Euclid distance of the TOPSIS. Four 3GPP defined traffic classes are considered in performance evaluation. An attribute matrix is constructed considering some major attributes. Handoff decision meeting multiattribute QoS requirement is made according to the traffic features. The weight relation of decision elements is determined with the least square (LS) approach. The final decision is made using the proposed PROMSIS algorithm based on the attribute matrix and weight vector. The simulation results have manifested that the proposed PROMSIS algorithm can provide satisfactory vertical handoff performance, and the LS-PROMSIS algorithm can be fit to the characteristics of the traffic.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2013-09-22
    Description: With the growing interest in ubiquitous technologies recently, many studies have been conducted in order to manage wireless sensor network, which is the central component in ubiquitous environment. To manage a certain wireless sensor network, a variety of techniques can be applied and thereby the network can be managed. However, it is very complicated and time-consuming to incorporate and manage more than a heterogeneous wireless sensor network since each network has different data, meanings, and terms. Instead of conducting verification through examining the detailed technology or simulation in order to manage a variety of wireless sensor networks, we suggest a methodology which manages data coming from the various sensors mentioned above, a technique by which those data from various sensor networks are managed in each different network, and a methodology which manages sensor networks where management languages exist. This paper defined the network-related terminology using Protégé for the tools and definitions necessary for ontology-based methodology, thereby defined OWL and the related rules, and suggested a methodology for incorporated management. In addition, this study showed that the methodology presented in this study has expandability and it can incorporate and manage a variety of wireless sensor networks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2013-09-26
    Description: Wireless sensor networks (WSNs) are becoming bigger, and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solutions were already proposed for mobile ad hoc networks but they either (i) do not scale well for WSN; (ii) have no energy constraints; (iii) have no security considerations; (iv) or have no mechanisms to handle fusion of network partitions. We proposed an address self-assignment protocol which uses negative acknowledgements and an improved version of a flood control mechanism to minimize the energy spent; uses a technique named whispering to achieve robustness against malicious nodes; is able to detect dynamic network re-joint and dynamic node addition without exchanging specific messages; and handles both dynamic events without compromising routing tables.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2013-09-27
    Description: Seismic sensors are invaluable for intruder detection and perimeter security. In a typical wireless sensor network application of seismic sensors, the units are battery powered and low power consumption becomes critical while fulfilling system requirements. Although many systems utilize 24-bit ADC for seismic signal processing, we employed 12-bit ADC for low power consumption. Because of this relatively low resolution ADC, preamplifier and filters require careful hardware design. We employ bidirectional T-type filtering, noise reduction, and distributed filtering between gain stages before the signal is input to ADC. The proposed design was verified with measurements. Seismic data signals due to footsteps at varying distances were successfully measured.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2013-09-27
    Description: In ad hoc and sensor networks, reputation-based trust management schemes have been widely used to identify the malicious nodes. These schemes leverage each node’s behaviors for malicious node detection and thus require a certain amount of time to observe the behaviors of nodes. In mobile sensor networks, however, malicious nodes frequently move to different locations, and thus it is likely difficult to collect enough evidence for them. Moreover, when reputation-based schemes are employed, it is not easy to revoke the malicious nodes due to the risk of false positives. To mitigate these limitations of reputation-based schemes, we propose mobile malicious node detection schemes based on software attestation technique, which virtually fulfills zero false positives. In particular, we propose a probabilistic detection scheme in which each node attests its neighboring node with a certain probability. In order to reduce the attestation overhead of the probabilistic detection scheme, we also propose the SPRT (Sequential Probability Ratio Test) based detection scheme that uses the SPRT to determine when to perform the attestations. Through analysis and simulation, we show that our proposed schemes detect mobile malicious nodes through software attestations in robust and efficient manner.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2013-10-01
    Description: The wireless sensor networks are usually deployed in various application-specific contexts, which can be treated as distributed databases with big data. The event-involved query responses can be obtained by issuing query requests to this kind of database. However, the constraints of the energy and delay have had a great impact on the operation of wireless sensor networks. How to design the query-involved network model and the corresponding query processing algorithms is extremely challenging. This work investigates query processing problem in resource-constrained wireless sensor networks with the two-tier architecture and multiple query agents, where the multiple nodes of query agents are configured in the networks and the corresponding source cluster-heads send collected events to only one optimum query agent. To reduce the energy consumption and shorten the delivery delay, an efficient query processing algorithm inspired by the swarm intelligence of ants is proposed, which takes advantage of the beneficial clustering and routing emerging in a hybrid self-organized way from the positive interaction of ants. The experimental results demonstrated that the proposed algorithm can deliver collected events to the optimum query agents efficiently. Not only is the energy cost reduced but also the delivery delay is shortened significantly when transmitting the named events to the appropriate query agents.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2013-10-01
    Description: This paper presents a nonuniform node configuration of wireless sensor networks (WSNs) for long-span bridge health monitoring. The methodology and strategy of two-phase node arrangement for nonuniform WSN configuration are firstly presented, and then numerical examples are carried out by a long-span suspension bridge. Three cases, which are four sensor nodes distributed on one side of the girder, ten sensor nodes distributed on one side of the girder, and eight sensor nodes distributed averagely on two sides of the girder, are employed. In case I and case II, three schemes that are the nonuniform node configuration arranged by the two-phase node arrangement method, the uniform nodes configuration, and the independent sensor nodes configuration are used for comparison. And in case III, two schemes that are nonuniform nodes configuration and the independent sensor nodes configuration are adopted. The results indicate that the nonuniform node configuration can balance energy consumption, eliminate “energy hole,” and maximize network performance effectively, which shows the most outstanding performance when compared with other conventional node configurations. So, the efficiency of the two-phase node arrangement method is validated.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Publication Date: 2013-10-02
    Description: This paper proposes a noncoherent spectrum sensing scheme for the cognitive coexistent heterogeneous networks with the assistance of geolocation information of primary and secondary nodes. Different from the conventional networks with single secondary network, the spectrum sensing scheme in the coexistence scenario should not only detect the primary signal but also detect the secondary signals to avoid the interference with both the primary network and the operating coexistent secondary networks. Therefore, the sensing scheme in this case should be able to differentiate the primary signal from each kind of the secondary signals. However, in the coexistent heterogeneous scenarios, the secondary signals may exploit different PHY modes (some of them may be the same as the primary PHY mode), which imposes difficulties in the coherent signal detection schemes. Aiming to tackle this problem, the parallel detection of both primary signal and each kind of secondary signals is implemented through a proposed noncoherent power decomposition scheme. In this scheme, the power decomposition is formulated into a problem of solving a nonhomogeneous linear equation matrix. During the signal detection, the characteristics of both primary and secondary signals are not required. Both the analysis and the simulation results show the feasibility and efficiency of the proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2013-10-02
    Description: The existing electronic tagging system traces the location of a sex offender using triangulation by communicating with Global Positioning System (GPS) satellites and mobile phone base stations. The acquired location information is used to prevent the offenders from perpetrating repeat crimes. However, the battery resources of such a system are inadequate as it has to trace the location of the moving target in real time and consumes a large amount of battery power while communicating with GPS satellites and mobile phone base stations. In addition, the systems cannot infer the mental state of the targets or detect their alcohol consumption levels, which may be necessary for the prevention of a repeat crime. The purpose of this study is to connect the Ubiquitous System Network (USN), which consumes little electricity, and Android mobile platforms, which are commonly used for machine-to-machine communication. Thus, this system will legally facilitate the protection of minors by providing information only about the target’s approach to certain facilities. In addition, the system uses an Android platform to process data measured by the USN’s sensors, which can also detect alcohol intake and infer the mental state of the target, and then initiates the corresponding real-time context-awareness services.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2013-10-03
    Description: Intrusion detection is a challenging problem in wireless networks due to the broadcast nature of the wireless medium. Physical layer information is increasingly used to protect these vulnerable networks. Meanwhile, reconfigurable antennas are gradually finding their way into wireless devices due to their ability to improve data throughput. In this paper, the capabilities of reconfigurable antennas are used to devise an intrusion detection scheme that operates at the physical layer. The detection problem is posed as a GLRT problem that operates on the channels corresponding to the different modes of a reconfigurable antenna. The performance of the scheme is quantified through field measurements taken in an indoor environment at the 802.11 frequency band. Based on the measured data, we study the achievable performance and the effect of the different control parameters on the performance of the intrusion detection scheme. The effect of pattern correlation between the different modes on the scheme’s performance is also analyzed, based on which general guidelines on how to design the different antenna modes are provided. The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Publication Date: 2013-10-03
    Description: Network coding (NC) is significant for the spectral efficiency promotion of the multiple-source multiple-relay wireless sensor networks (WSNs). However, the existing scheme ignored further exploitation of the communications between relays. To address this issue, a relay ordering algorithm based on finite field NC (FFNC) is proposed in this paper. In the scheme, the relays who initially fail to decode from sources are kept listening and searching for the opportunity to decode the signals from other relays, so as to recover the failure links. The outage probability of the scheme and the corresponding lower bound are theoretically deduced under two-source two-relay assumption. Moreover, the scheme is proved to own the merit of diffusion effect, which makes the diversity improvement more efficient by simply increasing the relay number in the network. Simulation results correspond well with the analysis and demonstrate that the proposed scheme always outperforms FFNC in outage behavior and attains more opportunities to supply full diversity for the network. Moreover, it shows that the diffusion effect enables this scheme to be very suitable for the multiple-relay WSN.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Publication Date: 2013-10-04
    Description: In wireless sensor networks (WSN), sensor deployment is one of the main topics for enhancing the sensor’s coverage rate. In this paper, by modifying updating equation of onlooker bee and scout bee of original artificial bee colony (ABC) algorithm, a sensor deployment algorithm based on the modified ABC algorithm is proposed. Some new parameters such as forgetting and neighbor factor for accelerating the convergence speed and probability of mutant for maximizing the coverage rate are introduced. Simulation results showed that comparing with the deployment method based on original ABC and particle swarm optimization (PSO) algorithm, the proposed approach can achieve a better performance in coverage rate and convergence speed while needing a less total moving distance of sensors.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Publication Date: 2013-10-04
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Publication Date: 2013-10-04
    Description: In wireless sensor network, when these sensors are wrongly placed in an observation region, they can quickly run out of batteries or be disconnected. These incidents may result in huge losses in terms of sensing data from numerous sensors and their costs. For this reason, a number of simulators have been developed as tools for effective design and verification before the actual arrangement of sensors. While a number of simulators have been developed, simulation results can be fairly limited and the execution speed can be markedly slow depending on the function of each simulator. In this regard, to improve the performance of existing simulators, this research aimed to develop a parallel calculation simulator for independent sensor (PCSIS) that enables users to selectively use the GPU mode and, based on this mode, enables parallel and independent operations by matching GPU with many cores in order to resolve the slowdown of the execution speed when numerous sensor nodes are used for simulations. The PCSIS supports the GPU mode in an environment that allows the operation of compute unified device architecture (CUDA) and performs the parallel simulation calculation of multiple sensors using the mode within a short period of time.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Publication Date: 2013-09-12
    Description: Due to advances in microelectromechanical system (MEMS), many smart sensors have been developed. A large number of sensors build a wireless sensor network and can communicate with each other. Wireless sensor networks help monitor objects in our environment, and many researches about this technology are in progress. Condensation is a phenomenon that water vapor contained in the air condenses and makes water droplets. This is caused by the complex action of a variety of factors, including the temperature difference between indoor and outdoor and excessive indoor moisture, so it is never easy to identify the cause and establish measures for the actual building. In this paper, a system is presented to predict and alert condensation promptly and accurately, considering the causes and prevention of condensation. In this paper, a system will be developed to collect and monitor environmental information causing condensation, in real time using a wireless sensor network in order to build a system to prevent condensation. The users are expected to use this system to easily identify the cause of condensation and take actions based on the cause-specific alarm messages in order to alleviate aesthetics and hygiene problems due to condensation.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2013-09-13
    Description: We discuss the problem of maximizing the sensor field coverage for a specific number of sensors while minimizing the distance traveled by the sensor nodes. Thus, we define the movement task as an optimization problem that involves the adjustment of sensor node positions in a coverage optimization mission. We propose a coverage optimization algorithm based on sampling to enhance the coverage of 3D underwater sensor networks. The proposed coverage optimization algorithm is inspired by the simple random sampling in probability theory. The main objective of this study is to lessen computation complexity by dimension reduction, which is composed of two detailed steps. First, the coverage problem in 3D space is converted into a 2D plane for heterogeneous networks via sampling plane in the target 3D space. Second, the optimization in the 2D plane is converted into an optimization in a line segment by using the line sampling method in the sample plane. We establish a quadratic programming mathematical model to optimize the line segment coverage according to the intersection between sensing circles and line segments while minimizing the moving distance of the nodes. The intersection among sensors is decreased to increase the coverage rate, while the effective sensor positions are identified. Simulation results show the effectiveness of the proposed approach.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Publication Date: 2013-09-13
    Description: Wireless sensor networks (WSNs) are a fundamental building block of many pervasive applications. Nevertheless the use of such technology raises new challenges regarding the development of reliable and fault-tolerant systems. One of the most critical issues is the detection of corrupted readings amidst the huge amount of gathered sensory data. Indeed, such readings could significantly affect the quality of service (QoS) of the WSN, and thus it is highly desirable to automatically discard them. This issue is usually addressed through “fault detection” algorithms that classify readings by exploiting temporal and spatial correlations. Generally, these algorithms do not take into account QoS requirements other than the classification accuracy. This paper proposes a fully distributed algorithm for detecting data faults, taking into account the response time besides the classification accuracy. We adopt the Bayesian networks to perform classification of readings and the Pareto optimization to allow QoS requirements to be simultaneously satisfied. Our approach has been tested on a synthetic dataset in order to evaluate its behavior with respect to different values of QoS constraints. The experimental evaluation produced good results, showing that our algorithm is able to greatly reduce the response time at the cost of a small reduction in classification accuracy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Publication Date: 2013-09-17
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Publication Date: 2013-09-19
    Description: We consider the problem of data aggregation for nonuniform and evolving wireless sensor networks. We introduce a new data aggregation algorithm that is able to run on uniform, non-uniform, and evolving networks while maintaining the data accuracy. In addition, the algorithm is able to handle sudden bursts in the underlying data by recording the data in the area of interest for the whole event duration. Experimental results on real and synthetic data show that the algorithm performs well in terms of extending the lifetime of the network, maintaining the original distribution of the sensors as long as possible, maintaining the accuracy of the sensed data, and being able to detect and handle sudden bursts of data.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Publication Date: 2013-09-19
    Description: The congestion control algorithm based on the weighted directed graph is designed for the network congestion over the wireless sensor network. The congestion problem is modeled as a distributed dynamic system with time-varying delay, and it can be proven that the sent rate for all nodes converges to the available bandwidth of the sink by the proposed congestion control algorithm. Via Lyapunov function, the validity of the proposed algorithm is shown under the varying network topologies. Ns simulation results indicate that the proposed algorithm restrains the congestion over the wireless sensor network, maintains a high throughput and a low delay time, and also improves the quality of service for the whole network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Publication Date: 2013-09-24
    Description: In order to achieve the equal usage of limited resources in the wireless sensor networks (WSNs), we must aggregate the sensor data before passing it to the base station. In WSNs, the aggregator nodes perform a data aggregation process. Careful selection of the aggregator nodes in the data aggregation process results in reducing large amounts of communication traffic in the WSNs. However, network conditions change frequently due to sharing of resources, computation load, and congestion on network nodes and links, which makes the selection of the aggregator nodes difficult. In this paper, we study an aggregator node selection method in the WSNs. We formulate the selection process as a top-k query problem, where we efficiently solve the problem by using a modified Sort-Filter-Skyline (SFS) algorithm. The main idea of our approach is to immediately perform a skyline query on the sensor nodes in the WSNs, which enables to extract a set of sensor nodes that are potential candidates to become an aggregator node. The experiments show that our method is several times faster compared to the existing approaches.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Publication Date: 2013-09-24
    Description: In wireless distributed sensor networks, one open problem is how to guarantee the reliable relay selection based on the quality of services diversity. To address this problem, we focus on the reliable adaptive relay selection approach and adaptive QoS supported algorithm, based on which we present a Markov chain model, in consideration of different packet states and error control algorithm assignment. The mathematical analyses and NS-2 simulation results show that the proposed relay selection approach could perform better in terms of saturation throughput, reliability, and energy efficiency, compared with the traditional approaches. More importantly, the quality of real-time multimedia streaming is improved significantly, in terms of decodable frame ratio and delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Publication Date: 2013-09-24
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2013-09-24
    Description: Automatic recognition of personal comfort is critical in realizing autonomous control of building utilities. We can infer human comfort level based on indoor environmental conditions, such as temperature and humidity, collected through sensor networks. However, the majority of methods for optimally deploying sensor networks in indoor climate monitoring mainly focused on achieving accurate measurements such as temperature distribution map with the minimum cost. Indeed, for automatic recognition of comfort using machine learning, we need to collect datasets preserving as much of the discriminatory information for inferring personal comfort with the minimum cost. In this paper, we present a novel method of placing and minimizing sensor nodes for sensor networks in smart energy systems. We have developed ZigBee-based sensor nodes and collected temperature, humidity, and illumination dataset from 13 nodes for a week. Using the dataset, we group the sensor nodes into coherent clusters, and then select a representative node which has the maximum value of RSSI for each cluster and remove the other redundant sensors, reducing the number of sensor nodes deployed. To show the feasibility of the proposed method, we perform a classification analysis of building environment. The recognition accuracy decreased by 13 percent with 6 selected sensor nodes, compared to the result with all 13 sensor nodes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2013-09-25
    Description: In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. However, most present schemes developed for WSNs don’t consider the Internet scenario while traditional mechanisms developed for the Internet are not suitable due to the resource constraint of sensor nodes. In this paper, we propose a scheme, which we refer to as Data Authentication and En-route Filtering (DAEF), for WSNs in the context of IoT. In DAEF, signature shares are generated and distributed based on verifiable secret sharing cryptography and an efficient ID-based signature algorithm. Our security analysis shows that DAEF can defend against node compromise attacks as well as denial of service (DoS) attacks in the form of report disruption and selective forwarding. We also analyze energy consumption to show the advantages of DAEF over some comparable schemes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Publication Date: 2013-09-25
    Description: This paper presents a dynamic adaptive machine-to-machine (M2M) service rate allocation scheme for optimum traffic distribution in heterogeneous wireless environments (HWEs). According to the M2M service characteristics, it proposes the utility function, which forms a convex optimization problem that maximizes the utility of M2M service and can be solved by the Lagrange multiplier. The simulation results show the proposed method convergence, and it can achieve load balance with maximized throughput and minimized cost.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Publication Date: 2013-09-25
    Description: In many surveillance application scenarios of wireless video sensor networks (WVSNs), a number of video sensors are deployed, and multidimension monitored the visual information in a region of interest, forming multiview videos. Since the power, computing capability, and bandwidth are very limited in WVSNs, the conventional multiview video coding method is no longer applicable. So multiview distributed video coding (MDVC) emerged and developed rapidly. In this paper, we propose a new multiview video coding and postprocessing framework for multiview videos. First, in coding scheme, motion intense regions (MIRs) and nonmotion intense regions (NMIRs) based on sum of absolute difference (SAD) criteria are distinguished. For the MIR, the side information (SI) is generated by fusion temporal SI and interview spatial SI at the pixel level. But for the NMIR, the temporal SI is directly use as the ultimate SI. Then, to further improve the quality of the decoded image, an image postprocessing scheme is designed by using deblocking and deringing artifact filters on decoded image. Finally, a set of experimental results show that the proposed fusion SI approach can bring improvements up to 0.2–0.5 dB when compares with only temporal SI used. The subsequent decoded videos postprocessing simulation proves that the proposed postprocessing scheme can provide an additional improvement of about 0.1 dB to the decoded video sequences.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Publication Date: 2013-09-25
    Description: Duty-cycled operation has been introduced as an efficient way to preserve nodes energy and prolong network lifetime for wireless sensor networks. However, such networks are often logically disconnected since there is a limited number of active nodes within a period of time. Traditional routing algorithms, which have been designed for always-awake wireless networks, suffer excessive waiting time incurred by asynchronous schedule of nodes and cannot be applied to these time-dependent sensor networks. In this work, we study the optimization of delivery delay for low-duty-cycle sensor networks. Specially, we theoretically analyze the sleep latency in low-duty-cycle networks and present a new routing metric, which takes both lossy link and asynchronous schedule of nodes into consideration. Based on the metric, we propose delay-driven routing algorithms to find optimal forwarder in order to reduce delivery delay for source-to-sink communication. We compare our design against state-of-the-art routing algorithms derived in wireless networks through large-scale simulations and testbed experiments, which show that our algorithms can achieve a significant reduction in delivery delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Publication Date: 2013-09-25
    Description: It is very important to detect a collapse hole for coal mine workers. The possibility of detecting the collapse hole using WSN is presented because the tunnel in coal mine is narrow and has poor working condition. Comparing three types of the hole detection methods, it is seen that the connectivity-based methods are used to detect coal mine collapse better than other methods. By establishing a 2D model of the collapse hole in coal mine, a class of algorithms for detecting the collapse hole in coal mine is described. Based on log-normal shadowing channel model, the accuracy of detecting the collapse hole in coal mine using Fisher information is analyzed. Numerical calculation shows that connectivity-based localization schemes are better to detect collapse hole of coal mine.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Publication Date: 2013-09-27
    Description: Nowadays, the fractal is used widely everywhere. Then, its creating time becomes an important study area for complex iteration functions because the escape-time algorithm (ETA), which is the most used algorithm in fractal creating, performs not so well in this condition. In this paper, in order to solve this problem, we improve ETA into the parallel environment and reach well performance. At first, we provide a separation method of ETA to reform it into a SIMC-MC2 grid. Secondly, we prove its correctness and compute the complexity of this novel parallel algorithm. Meantime, we separate an improved ETA which we have presented into the same parallel environment and compute its complexity. Additionally, theoretical and experimental results show the characteristics of this novel algorithm. Finally, the computational result shows that a novel environment is needed to decrease large manual allocation strategies, which block the improved benefit.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2013-09-27
    Description: To improve the energy efficiency and the transmission performance of a sensor network MAC protocol under time varying traffic conditions, recent researches have adopted a variable duty cycle operation that makes each node dynamically adjust its own wakeup and sleep schedule according to a predefined trigger condition. However, most of the existing protocols still waste energy on a long preamble packet for waking up a receiver or long idle listening for checking potential communications. To address the energy waste problem, this paper introduces a hybrid MAC protocol called A+MAC that exploits a complementary cooperation between CSMA/CA and preamble sampling. In A+MAC CSMA/CA is used for carrying out communication processes, and preamble sampling is used for checking potential communications. Therefore, A+MAC minimizes both idle listening and the length of a preamble packet by exploiting a short preamble that makes nodes check only the event occurrence. A+MAC also optimizes control packet formats and eliminates both virtual carrier sensing and a separate clock synchronization period from conventional CSMA/CA based MAC protocols. We evaluated both the energy and the network performance of the protocol by using both NS-2 and MICA2 platforms. Our experimentation results show that A+MAC can achieve an order of magnitude energy savings while providing near optimal latency compared to the existing solutions.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Publication Date: 2013-09-30
    Description: In this paper, we introduce a novel design of high-performance smart card with HF/UHF dual-band RFID tag to overcome frequency interference problem. Firstly, we have designed and tested a UHF RFID tag using a simulation software system. In the smart card hardware design stage, we connect a HF antenna and a UHF antenna and place them in one inlay sheet. Using a spectrum analyzer, we systematically adjust the antenna pattern to detect the optimal patterns that fit the impedance of the RFID chip. We evaluate the performance of the resulting smart card with standard RFID testers. The experiments show that our proposed RFID tag outperforms other dual-band RFID tags and maintains itself in a reasonable size. Moreover, we increase IC chip's memory capacity to resolve security-related problems when RFID tags are used in a financial transaction. We firstly exploit an IC contact protruded from the card to add an additional memory, and we integrate functions of the RFID tag to use the equipped memory through the induced current of the contact. The implemented prototype of our proposal can accommodate an extended memory ranging from one gigabyte up to four gigabytes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Publication Date: 2013-09-30
    Description: This paper presents an integer linear programming model devoted to optimize the energy consumption efficiency in heterogeneous wireless sensor networks. This model is based upon a schedule of sensor allocation plans in multiple time intervals subject to coverage and connectivity constraints. By turning off specifics sets of redundant sensors in each time interval, it is possible to reduce the total energy consumption in the network and, at the same time, avoid partitioning the whole network by losing some strategic sensors too prematurely. Since the network is heterogeneous, sensors can sense different phenomena from different demand points, with different sample rates. By resorting to this model, it is possible to provide extra lifetime to heterogeneous wireless sensor networks, reducing their setup and maintenance costs. This is an important issue to be considered when deploying sensor devices in hostile and inaccessible environments.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2013-09-30
    Description: Frame synchronization time of geostationary Earth orbit (GEO) satellites is faster than that of incline geosynchronous satellite orbit and medium Earth orbit satellites in Beidou navigation satellite system (BDS). So time to first fix can be reduced greatly with GEO satellites (GEOs) to provide emergency positioning service during the cold start process. Meanwhile, GEOs can also be utilized to provide radio determination satellite services. Therefore, it is meaningful to research the emergency positioning algorithm based on GEOs. However, due to the poor geometry of the GEOs, the availability and accuracy degrade distinctly. To solve this problem, a low-cost high resolution MS5534B barometric (baro-) module is applied to BDS. Firstly, the principle of emergency positioning based on a baro-altimeter sensor and its performance such as the accuracy are elaborated. Then the effects of baro-altimeter sensor measurement error on positioning are analyzed. Finally, after analyzing the limitation of the conventional algorithms, a new high-accuracy emergency positioning algorithm with baro-altimeter sensor aiding is proposed, which is not limited by the integration and user’s altitude. In comparison to the conventional algorithms, the stimulant and experimental results validate the effectiveness, robustness, and higher performance of the proposed algorithms incorporated with sensors.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2013-10-01
    Description: In self-organized wireless sensor networks (WSNs), any two sensor nodes can connect if they are placed in each other's communication range. Therefore, the physical topology of WSNs is usually a strongly connected topology. Sensor nodes should frequently receive and process data from their large number of neighbors, which will consume great amounts of energy. Shocking wireless channel collision also causes low throughput and high loss packets ratio during data transmission. To improve the transmission performance and save scarce energy, a logical topology generating from the physical one is necessary for the self-organized WSNs. Based on the complex network theory, this paper proposed a novel betweenness addition edges expansion algorithm (BAEE). With betweenness calibration, BAEE algorithm expanded the minimum-cost edges to optimize the network topology. Two performance metrics-connectivity functions, robustness function and efficiency function , were utilized to evaluate the network capability of the robustness and invulnerability. is the parameter to measure the topology connectivity, and is the parameter to evaluate the network exchanging information capability. Based on the simulation under various random failures and intentional attack scenarios, BAEE can effectively optimize WSNs' topology and improve the network's robust connectivity and extremely efficient exchanging information capability.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Publication Date: 2013-10-01
    Description: In many sensor network applications, energy efficiency and latency are major design criteria because battery-operated sensor nodes limit network lifetime. In this paper, we propose a new contention-based duty-cycle MAC protocol using a synchronized approach for use in wireless sensor networks. In the proposed MFT-MAC protocol, we use a control frame that considers the number of DATA frames to be transmitted to the next node in order to improve the energy efficiency and reduce the end-to-end delay. During the SLEEP period, each node transmits multiple DATA frames to the next node through the use of the control frame. The performance of the proposed MAC protocol is confirmed through the use of NS-2 simulator.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Publication Date: 2013-10-02
    Description: PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In this paper, we analyze the security of PP-1 by using truncated differential cryptanalysis. As concrete examples, we consider four versions of PP-1, PP-1/64, PP-1/128, PP-1/192, and PP-1/256. Our attack is applicable to full-round versions of them, respectively. The proposed attacks can recover a secret key of PP-1 with the computational complexity which is faster than the exhaustive search. These are the first known cryptanalytic results on PP-1.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Publication Date: 2013-10-04
    Description: To eliminate the location error of MS/AE (microseismic/acoustic emission) monitoring systems caused by the measurement deviations of the wave velocity, a MS/AE source location method using P-wave and S-wave arrivals for unknown velocity system (PSAFUVS) was developed. Arrival times of P-wave and S-wave were used to calculate and fit the MS/AE source location. The proposed method was validated by numerical experimentations. Results show that the proposed method without the need for a premeasured wave velocity has a reasonable and reliable precision. Effects of arrival errors on location accuracy were investigated, and it shows location errors enlarged rapidity with the increase of arrival errors. It is demonstrated the proposed method can not only locate the MS/AE source for unknown velocity system but also determine the real time PS waves velocities for each event in rockmass.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Publication Date: 2013-06-07
    Description: Body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications in many fields, such as health monitoring. The services in BAN usually have a high requirement on security, especially for the medical diagnosis, which involves private information. With limitations of power and computation capabilities, one of the main challenges to ensure security in BAN is how to generate or distribute a shared key between nodes for lightweight symmetric cryptography. The current research almost exploits the randomness and distinctiveness (characteristics) of physiological signals to solve the key generation problem. However, it needs the help of additional hardware support and has the constraint on positions deployment, to acquire vital signals, which will bring the high cost and hardness to implementation of real system. To avoid the above problems, this paper presents a novel key generation scheme and a key distribution protocol, both of which are only based on wireless modules equipped on sensors. By exploiting the high correlation of received signal strength index (RSSI) between peer-to-peer communications, our scheme can provide a shared symmetric cryptographic key under the presence of an eavesdropper. We conduct experiments on the real Telosb nodes, and the results demonstrate that our proposed methods have a good performance on security.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Publication Date: 2013-06-10
    Description: Message delivery in a mobile social network (MSN) is difficult due to the fact that the topology of such network is sparse and unstable. Various routing schemes for MSNs were proposed to make the message delivery robust and efficient. However, little research has been conducted to explore how much delay has to be tolerated for the message delivery from the source to the destination. Since the social relationships among nodes are stable during a certain period of time, it is expected that the delay of message delivery in MSNs could be modeled with a probability model. In this paper, we take the first step to address this issue. We firstly extract three routing models from the existing routing schemes for MSNs and then develop the probability models of the message transmission delay for each abstract routing model. The simulation results show that the theoretical models match very well the simulation trace statistics.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Publication Date: 2013-06-13
    Description: Data aggregation techniques have been proposed for wireless sensor networks (WSNs) to address the problems presented by the limited resources of sensor nodes. The provision of efficient data aggregation to preserve data privacy is a challenging issue in WSNs. Some existing data aggregation methods for preserving data privacy are CPDA, SMART, the Twin-Key based method, and GP2S. These methods, however, have two limitations. First, the communication cost for network construction is considerably high. Second, they do not support data integrity. There are two methods for supporting data integrity, iCPDA and iPDA. But they have high communication cost due to additional integrity checking messages. To resolve this problem, we propose a novel Hilbert-curve based data aggregation scheme that enforces data privacy and data integrity for WSNs. To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. To support data integrity, we use an integrity checking algorithm based on the PIR technique by directly communicating between parent and child nodes. Finally, through a performance analysis, we show that our scheme outperforms the existing methods in terms of both energy efficiency and privacy preservation.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Publication Date: 2013-06-11
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Publication Date: 2013-06-07
    Description: Wireless sensor networks (WSNs) are subject to various attacks because of the vulnerable environment, limited recourse, and open communication channel. To protect WSNs, in this paper, we present a Secret sharing-based key management (SSKM). SSKM utilizes the advantages of hierarchical architecture and adopts two-level key management and authentication mechanism, which can efficiently protect the allover network communication security and survivability. Different from previous works, the SSKM distributes keys based on secret sharing mechanism by the clustered architecture, which not only localizes the key things but also keeps scalability. The SSKM provides various session keys, the network key for base station (BS) and cluster heads (CHs); the cluster key between the cluster head and member nodes. The SSKM dynamically generates different keys based on different polynomials from BS in different periods which can protect the network from the compromised nodes and reduce the high probability of the common keys. The security analysis shows that the SSKM can prevent several attacks effectively and reduce the energy consumption.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Publication Date: 2013-06-10
    Description: EPCglobal network is used to share product data between trading partners, which was proposed by EPCglobal. Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (PML) servers and the privacy of Electronic Product Codes (EPCs). Existing work considers either the IP address authentication or the EPC privacy. In addition, that work mainly relies on cryptographic tools, in which key distribution is not a trivial task and also causes a large amount of computation overhead. In this paper, we make the first attempt to solve those two security risks together without relying cryptography. We propose a scheme, namely, APP (authenticate ONS and protect EPC privacy), to guarantee the authenticity of IP addresses for PML servers as well as EPC privacy and to maintain ultralightweight computation cost. Moreover, we give formal definition of the authenticity and the privacy in ONS context. The security achievements are strictly analyzed and proved. The extensive analysis results justify the applicability of the proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Publication Date: 2013-06-10
    Description: Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security. Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. Recently, Tsai et al. proposed an improved certificateless signature scheme without pairing and claimed that their new construction is secure against different kinds of attacks. In this paper, we present a security analysis of their scheme and our results show that scheme does not have resistance against malicious-KGC attack. In addition, we have found some security flaws in the certificateless signature scheme of Fan et al. and proved the scheme vulnerable to Strong Type I attack.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Publication Date: 2013-04-10
    Description: This paper addresses the energy efficiency of cooperative communication in WSN. We first establish the energy model of single-hop WSN. It is found that the cooperative communication is more suitable for harsh transmission environment with long-haul distance. The energy consumption per bit is numerically minimized by finding the optimal broadcasting BER and the number of cooperative nodes. Then, we expand the conclusion to the multihop scenario where “energy hole” dominates the longevity of WSN. To mitigate the energy consumption in the hotspots, as well as to keep the promised reliability, we adjust the transmission BER of the clusters according to the hops between the sink and cluster. On one hand, the statistical reliability is met. On the other hand, the energy consumed is converted from the nearer cluster (from the sink) to the farther ones. The network lifetime is thus optimized.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2013-03-22
    Description: Body sensor networks (BSNs) carry heterogeneous traffic types having diverse QoS requirements, such as delay, reliability and throughput. In this paper, we design a priority-based traffic load adaptive medium access control (MAC) protocol for BSNs, namely, PLA-MAC, which addresses the aforementioned requirements and maintains efficiency in power consumption. In PLA-MAC, we classify sensed data packets according to their QoS requirements and accordingly calculate their priorities. The transmission schedules of the packets are determined based on their priorities. Also, the superframe structure of the proposed protocol varies depending on the amount of traffic load and thereby ensures minimal power consumption. Our performance evaluation shows that the PLA-MAC achieves significant improvements over the state-of-the-art protocols.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Publication Date: 2013-04-03
    Description: Wireless sensor network (WSN) experiment platforms are used for teaching, research, and development of WSN. However, existing WSN experiment platforms generally have the following disadvantages: tedious manual operations, invasive measurement method, poor sensor self-awareness, and low resource utilization rate. To address the above problems, this paper proposes OPCPP, an online Plug-Configure-Play experiment platform for WSN. It has four prominent strongpoints: in-application programming in batch, noninvasive measurement method, sensor self-awareness, and remote operation. OPCPP has been used in eight colleges in China for teaching course of “internet of things” till now. We also develop a sensor-aware ZigBee-based smart home system prototype based on OPCPP.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Publication Date: 2013-04-10
    Description: We propose a middleware platform built on wireless USB (WUSB) over wireless body area networks (WBAN) hierarchical protocol for wearable health-monitoring systems (WHMS). The proposed middleware platform is composed of time-synchronization and localization solutions. It is executed on the basis of WUSB over WBAN protocol at each wearable sensor node comprising the WHMS. In the platform, firstly, the time-synchronization middleware is executed. After that, a WHMS host calculates the location of a receiving sensor node by using the difference between the times at which the sensor node received different WBAN beacon frames sent from the WHMS host. The WHMS host interprets the status and motion of the wearable body-sensor objects.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2013-04-08
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Publication Date: 2013-04-09
    Description: An ultrasonic sensor-based personalized multichannel audio rendering method is proposed for multiview broadcasting services. Multiview broadcasting, a representative next-generation broadcasting technique, renders video image sequences captured by several stereoscopic cameras from different viewpoints. To achieve realistic multiview broadcasting, multichannel audio that is synchronized with a user’s viewpoint should be rendered in real time. For this reason, both a real-time person-tracking technique for estimating the user’s position and a multichannel audio rendering technique for virtual sound localization are necessary in order to provide realistic audio. Therefore, the proposed method is composed of two parts: a person-tracking method using ultrasonic sensors and a multichannel audio rendering method using MPEG Surround parameters. In order to evaluate the perceptual quality and localization performance of the proposed method, a MUSHRA listening test is conducted, and the directivity patterns are investigated. It is shown from these experiments that the proposed method provides better perceptual quality and localization performance than a conventional multichannel audio rendering method that also uses MPEG Surround parameters.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Publication Date: 2013-04-01
    Description: Low data delivery efficiency and high energy consumption are the inherent problems in Underwater Wireless Sensor Networks (UWSNs) characterized by the acoustic channels. Existing energy-efficient routing algorithms have been shown to reduce energy consumption of UWSNs to some extent, but still neglect the correlation existing in the local data of sensor nodes. In this paper, we present a Multi-population Firefly Algorithm (MFA) for correlated data routing in UWSNs. We design three kinds of fireflies and their coordination rules in order to improve the adaptability of building, selecting, and optimization of routing path considering the data correlation and their sampling rate in various sensor nodes. Different groups of fireflies conduct their optimization in the evolution in order to improve the convergence speed and solution precision of the algorithm. Moreover, after the data packets are merged during the process of routing path finding, MFA can also eliminate redundant information before they are sent to the sink node, which in turn saves energy and bandwidth. Simulation results have shown that MFA achieves better performance than existing protocols in metrics of packet delivery ratio, energy consumption, and network throughput.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Publication Date: 2013-04-01
    Description: In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propose a counterattack-detection scheme in transmission time-based wormhole detection methods. In this paper, we show that it is possible for an attacker to find an effective counterattack against wormhole detection methods, so we provide a counterattack-detection scheme. In the first phase, our proposed method uses the transmission time per hop extracted from a RREQ. If the attackers fabricate the RREQ’s starting time to evade our proposed method, we can detect this counterattack using the RREQ’s transmission time in the second phase, because the fabricated starting time makes the transmission time shorter than the original transmission time. The simulation shows that our proposed method has high reliability for detecting both wormhole attacks and the attacker’s counterattack.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Publication Date: 2013-04-01
    Description: Target tracking is a typical and important application of wireless sensor networks (WSNs). In consideration of the network scalability and energy efficiency for target tracking in large-scale WSNs, it has been employed as an effective solution by organizing the WSNs into clusters. However, tracking a moving target in cluster-based WSNs suffers a boundary problem when the target moves across or along the boundaries of clusters, as the static cluster membership prevents sensors in different clusters from sharing information. In this paper, we propose a novel mobility management protocol, called hybrid cluster-based target tracking (HCTT), which integrates on-demand dynamic clustering into a cluster-based WSN for target tracking. By constructing on-demand dynamic clusters at boundary regions, nodes from different static clusters that detect the target can temporarily share information, and the tracking task can be handed over smoothly from one static cluster to another. As the target moves, static clusters and on-demand dynamic clusters alternately manage the target tracking task. Simulation results show that the proposed protocol performs better in tracking the moving target when compared with other typical target tracking protocols.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Publication Date: 2013-04-01
    Description: Network based sensing has become an important field of research, and it is expected that new applications of remote sensing will be developed. A fuzzy collaborative sensor network is developed in this study to predict the cycle time of a job in a semiconductor manufacturing factory, which is an important task for the factory. In the fuzzy collaborative sensor network, each sensor detects the status of a particular job as well as various environmental conditions present in the factory and uses a fuzzy neural network to analyze the received information. Each sensor communicates its settings and forecasting results to other sensors with the aid of a central control unit. According to the experimental results, the aggregate forecasting performance was considerably improved through the sensors’ collaboration.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Publication Date: 2013-04-01
    Description: Being one of the main technologies for Internet of Things (IoT), wireless sensor network is absolutely critical and plays an increasingly important role in the development of Internet of Things. Wireless sensor network is mobile network composed of sensor nodes with limited resources, like computation capability, energy, memory storage, and communication capability. Its characteristic results in that the security of wireless sensor network faces a great challenge. Hence, the security of wireless sensor network is an important issue for the development of IoT and shall be focused on. In this paper, a novel authentication scheme is proposed for wireless sensor networks based on theory of quadratic residues. It is making the use of master key to achieve simple symmetric cryptographic primitives and authentication operation and reach the aims of great resistance against the attacks and low energy consumption. Then the proposed scheme is compared with other network-wide key management schemes, obtaining better results in the aspects of security, efficiency, and scalability.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2013-04-01
    Description: Wireless sensor networks (WSNs) have limited energy and transmission capacity, so data compression techniques have extensive applications. A sensor node with multiple sensing units is called a multimodal or multivariate node. For multivariate stream on a sensor node, some data streams are elected as the base functions according to the correlation coefficient matrix, and the other streams from the same node can be expressed in relation to one of these base functions using linear regression. By designing an incremental algorithm for computing regression coefficients, a multivariate data compression scheme based on self-adaptive regression with infinite norm error bound for WSNs is proposed. According to error bounds and compression incomes, the self-adaption means that the proposed algorithms make decisions automatically to transmit raw data or regression coefficients, and to select the number of data involved in regression. The algorithms in the scheme can simultaneously explore the temporal and multivariate correlations among the sensory data. Theoretically and experimentally, it is concluded that the proposed algorithms can effectively exploit the correlations on the same sensor node and achieve significant reduction in data transmission. Furthermore, the algorithms perform consistently well even when multivariate stream data correlations are less obvious or non-stationary.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2013-04-01
    Description: In recent years, some approaches have been presented for the seamless integration of WSNs with the existing, widely deployed SOA technologies such as XML, Web services, and the Business Process Execution Language (BPEL) to build a wireless sensor networks service application. However, there a great challenge on fault tolerant in WSNs. In this paper, we present our framework and approach to enhance the reliability of service composition applications in WSNs through modeling and analyzing a wireless sensor networks service application based on BPEL with exception handler and compensation mechanism. At first, we analyze all possible states during the execution of BPEL instance in WSNs. Then, we present a state framework for modeling execution context in BPEL instance in WSNs. Based on this framework, we analyze state transition and operational semantics in the case of both correct execution and exceptional execution of BPEL instance in WSNs. Furthermore, we propose the state transition models for three types of activities in BPEL instance. In the end, we present a formal approach to model the execution context in BPEL for WSNs. Using this formal model, one can describe and analyze the control flow result from the exception handler and compensation mechanism in BPEL instance for WSNs.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Publication Date: 2013-04-01
    Description: Energy efficiency is one of the most important issues for WSNs, because the battery of each wireless sensor node cannot be recharged or replaced. Therefore, all batteries have to be well managed, in order to provide a long network lifetime, as well as to reduce energy consumption for WSNs, particularly in clustering and routing. In this paper, we propose an energy-efficient self-organized clustering model with splitting and merging (EECSM), which performs clustering and then splits and merges clusters for energy-efficient cluster-based routing. EECSM uses information of the energy state of sensor nodes, in order to reduce energy consumption and maintain load balance. We show the validity of splitting and merging of clusters and then compare the performance of the proposed EECSM with that of a well-known cluster-based self-organization routing protocol for WSNs. The results of our experiment show good performance of EECSM, in terms of network lifetime, residual energies, scalability, and robustness.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Publication Date: 2013-04-01
    Description: Depending upon the technological developments, the same fast evolution has occurred in the structures of sensor networks, their composing devices which are sensor nodes, and their application areas. Those tiny, energy-constrained, mostly non-real-time data transmitting sensor nodes have evolved to more energy-containing, camera-adapted, real-time multimedia-data-transmitting devices. Developments in the usage areas and the capabilities have revealed some other problems such as time limited data transmission. In this paper, we propose a multichannel cross-layer architecture for Quality of Service (QoS) constrained multimedia sensor networks. The proposed architecture considers both the time and energy efficiency concepts. Energy efficiency is succeeded by ensuring the fair load distribution among the nodes during a real-time multimedia packet stream transmission. Besides ensuring the fair load distribution, on-time packet transmission is also assured by constructing the paths with a hard reservation technique depending on the predetermined QoS constraints. Simulations show that the proposed architecture provides higher performance than the Greedy approach and the LEERA scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Publication Date: 2013-04-04
    Description: In vehicular networks, the multihop message delivery from information source to moving vehicles presents a challenging task due to many factors, including high mobility, frequent disconnection, and real-time requirement for applications. In this paper, we propose a moving target oriented opportunistic routing algorithm in vehicular networks for message delivery from information source to a moving target vehicle. In order to adapt the constantly changing topology of networks, the forwarding decisions are made locally by each intermediate vehicle based on the trajectory information of the target vehicle. The simulation and real trace experiment show that our design provides an efficient message delivery with a higher success ratio, shorter success time, and lower transmission overhead compared with other reference approaches.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Publication Date: 2013-09-06
    Description: Due to the advances in memory and processing capacity of embedded systems, wireless communications, and size of the devices, many researchers are growing more and more interested in wireless sensor networks (WSN). WSN have a large number of nodes with a sensor board, and wireless communication board, and have been applied to many fields. Summer is the season when much personal and property damage arises from various natural disasters such as the heat being reminiscent of subtropical climate and flooding from heavy rain due to global warming. This unusual temperature affects our lives much besides causing natural disasters. Recently, many problems have occurred with respect to hygiene and beauty of view especially due to growing of various molds in the residential environment. In the heat of summer, the damages from molds become serious due to the effect of temperature and humidity according to seasonal characteristics. In this paper, we build a wireless sensor network with some sensors such as temperature and humidity. And then we design and implement the prevention system of molds growth which can predict and prevent molds production in indoor environment.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2013-09-09
    Description: Wireless sensor networks offer a distributed processing environment. Many sensor nodes are deployed in fields that have limited resources such as computing power, network bandwidth, and electric power. The sensor nodes construct their own networks automatically, and the collected data are sent to the sink node. In these traditional wireless sensor networks, network congestion due to packet flooding through the networks shortens the network life time. Clustering or in-network technologies help reduce packet flooding in the networks. Many studies have focused on saving energy in the sensor nodes because the limited available power leads to an important problem of extending the operation of sensor networks as long as possible. However, we focus on the execution time because clustering and local distributed processing already contribute to saving energy by local decision making. In this paper, we present a cooperative processing model based on the processing timeline. Our processing model includes validation of the processing, prediction of the total execution time, and determination of the optimal number of processing nodes for distributed processing in wireless sensor networks. The experiments demonstrate the accuracy of the proposed model, and a case study shows that our model can be used for the distributed application.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2013-09-10
    Description: This paper presents a QoS-aware routing protocol suitable for distribution of smart electricity grids based on heterogeneous machine to machine communications. The distribution Smart Grid needs high performance communication networks capable of handling QoS, an issue that is addressed by the present paper. The proposed algorithm is a merger between a genetic algorithm (GA) and Ticket-Based Routing (TBR), which is an on-demand routing protocol for ad hoc networks that provide quality of service. A suitable parameterization of the GA parameters is needed in order to use this protocol in the coming Smart Grid networks. The resulting routing protocol, named genetic algorithm with TBR algorithm for Smart Grids (GATAS), is an adapted intelligent evolution of the TBR. The performance of TBR has been improved by reducing the overhead of routing packets in the network and by minimizing the communication latency due to its on-demand behavior. Experimental evidence indicates that the likelihood of finding the optimum route using multiobjective dynamic metrics increases when the genetic algorithm is applied. In this paper, the main simulation results on the parameterization carried out are discussed, and the proposed attributes of the GA are described.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2013-09-13
    Description: For long-span bridges located in wind-prone regions, it is a trend to install in situ Wind and Structural Health Monitoring System (WASHMS) for long-term real-time performance assessment. One of the functions of the WASHMS is to provide information for the assessment of wind-induced fatigue damage. Considering the randomness of wind, it is more reasonable to describe wind-induced fatigue damage of bridge in a probabilistic way. This paper aims to establish a probabilistic fatigue model of fatigue damage based on Bayesian learning, and it is applied to a wind-excited long-span bridge installed with a WASHMS. Wind information recorded by the WASHMS is utilized to come up with the joint probability density function of wind speed and direction. A stochastic wind field and subsequently wind-induced forces are introduced into the health monitoring oriented finite element model (FEM) of the bridge to predict the statistics of stress responses in local bridge components. Bayesian learning approach is then applied to determine the probabilistic fatigue damage model. The Tsing Ma suspension bridge in Hong Kong and its WASHMS are finally utilized as a case study. It shows that the proposed approach is applicable for the probabilistic fatigue assessment of long-span bridges under random wind loadings.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Publication Date: 2013-09-15
    Description: Wireless sensor networks (WSNs) consist of thousands of nodes that need to communicate with each other. However, it is possible that some nodes are isolated from other nodes due to limited communication range. This paper focuses on the influence of communication range on the probability that all nodes are connected under two conditions, respectively: (1) all nodes have the same communication range, and (2) communication range of each node is a random variable. In the former case, this work proves that, for , if the probability of the network being connected is , by means of increasing communication range by constant , the probability of network being connected is at least . Explicit function is given. It turns out that, once the network is connected, it also makes the WSNs resilient against nodes failure. In the latter case, this paper proposes that the network connection probability is modeled as Cox process. The change of network connection probability with respect to distribution parameters and resilience performance is presented. Finally, a method to decide the distribution parameters of node communication range in order to satisfy a given network connection probability is developed.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Publication Date: 2013-09-17
    Description: We consider a distributed power control scheme for wireless sensor networks. To derive decentralized solutions that do not require complete information and any cooperation among the users, we formulate this problem as a supermodular game, which each user maximizes its utility function provided transmission rate constraints. Through analyzing the supermodular property of the game, the existence and uniqueness of the Nash equilibrium (NE) are established. Furthermore, we propose a distributed price and power update algorithm (DPPA) to compute the solution of the game which is based on myopic best response. Performance evaluations via numerical simulations verify the existence of theNE and the convergence property of the DPPA algorithm.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Publication Date: 2013-09-19
    Description: Putting forward an efficient routing algorithm in DTN (delay tolerant network) has become a focus of attention due to the existing phenomena that the connections between nodes in the network change dramatically over time and the communications suffer from frequent disruptions. In this paper, the meeting time span between nodes is predicted using the Markov model, and the relay node holding the shortest meeting time span with the destination node is determined as the most efficient node. In the two phases, spray phase and wait phase, the message is routed according to the utility value. Thus, the routing algorithm based on Markov meeting time span prediction model is provided. Simulation results suggest that this algorithm efficiently improves the delivery rate and reduces the average delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2013-09-19
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2013-09-23
    Description: Node location is of great significance as a supporting technology of wireless sensor network (WSN). The information without position would be greatly devalued. So this paper is about location algorithm for nodes of ship-borne WSN based on research on structure of ship and work environment of ship-borne WSN. The whole location process consists of two steps: one is location algorithm among cabins (LAAC), and the other one is location algorithm in the cabin (LAIC). LAAC refers to location with the topology of ship-borne WSN. We can learn which cabin the node lies in. LAIC refers to location based on received signal strength indication (RSSI), we can get distance relationship between nodes by RSSI, and then obtain the specific location by solving this distance relationship. In the last part, this paper verifies the designed location algorithm by experimenting on “A” ship. Experiments show that the location algorithm designed by this paper is feasible.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2013-09-23
    Description: A new wireless sensing network paradigm is presented for face recognition applications. In addition to the flexibility the face recognition system gains by integrating into a wireless sensor network, we take it further by introducing mobility into the network to improve the sensing coverage area and cost efficiency. To implement these goals, a multilayered network structure and Gauss-Markov mobility model are proposed. Furthermore, analysis of the sensing coverage area is given. Besides, some of the potential application scenarios based on the proposed paradigm are also presented. According to the simulation, the whole system achieves high recognition rate and energy efficiency compared to stationary network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Publication Date: 2013-09-25
    Description: The volume array coil in the magnetic resonance imaging (MRI) system is a typical application of the distributed sensor network in the biomedical area. Each coil provides a large coverage of the imaged object, and the signals are largely overlapped during the data acquisition. The intercoil image similarities can be explored for the distributed compressed sensing (CS) based image reconstruction. In this work, a singular value decomposition (SVD) based sparsity basis was developed for the CS-MRI with a volume array coil configuration. In this novel imaging method, the spatial correlation both of intracoil and intercoil exploited. The experimental results showed that is with eightfold undersampled -space data acquisition, the target images could still be faithfully reconstructed using the proposed method, which offered a better imaging performance compared to conventional CS schemes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2013-09-27
    Description: There is a wide variation in the energy consumption between different educational institutions due to the adoption of different management strategies and different levels of occupants’ environmental understanding. The presence of large amounts of information and communication technology (ICT) equipment and heating, ventilation, and air conditioning (HVAC) system causes a major consumption of energy in higher education institution (HEI) buildings. The main objective of this research is to investigate the use of ICT to optimize the energy consumption in HEI buildings and reduce carbon dioxide (CO2) emission. The first phase of the system has been implemented at King Saud University to measure energy consumption through sensors that read energy consumption of electrical appliances and devices every 10 seconds. The analysis of collected data allows us to develop and employ energy saving strategies that lead to a reduction in total energy consumption. Our preliminary results show that up to 17% of energy consumption can be reduced by simply dealing with standby energy loss of labs’ computers. The novelty of this research comes from the use of a functional database approach to deal with high volume of data and query performance and the incorporation of a timetabling system in energy management system.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2013-09-27
    Description: In large-scale networks, the structure of the underlying network changes frequently, and thus the power iteration method for Personalized PageRank computation cannot deal with this kind of dynamic network efficiently. In this paper, we design a Monte Carlo-based incremental method for Personalized PageRank computation. In a dynamic network, first, we do a random walk starting from each node and save the performed walks into a fingerprint database; second, we update the fingerprint database in a fixed time interval with our proposed update algorithm; finally, when a query is issued by a user, we estimate the Personalized PageRank vector by our proposed approximation algorithm. Experiments on real-world networks show that our method can handle multichanges of the underlying network at a time and is more efficient than related work, so it can be used in real incremental Personalized PageRank-based applications.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Publication Date: 2013-01-01
    Description: Due to such requirements as low power consumption and low cost, sensor nodes commonly do not include advanced H/W features. The absence of the features such as the memory management unit enforces several tasks to share a memory address domain on a small data memory space (1~16 KB). It exposes each task to the stack overflow causing the corruption of other memory areas. In this paper, we propose a robust and efficient stack memory management method (RESM) that dynamically assigns and releases a preestimated amount of stack memory to each function call at runtime. RESM maintains the stack memory usage with the similar amount of the stack usage that the system actually requires, and the stack memory area of each task is individually protected from corruption by the stack overflow. RESM can also anticipate a saturated condition in data memory at runtime. When the memory state is unsafe from the saturated condition, it conditionally allows function calls to operate tasks without any memory fault by using the proposed function call deferring algorithm. From the analytical and experiment results, it is proven that the performance of RESM outperforms the other mechanisms and RESM can provide more robust stack operation environment.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Publication Date: 2013-02-21
    Description: Fault-tolerant systems are expected to operate in a variety of devices ranging from standard PCs to embedded devices. In addition, the emergence of new software technologies has required these applications to meet the needs of heterogeneous software platforms. However, the existing approaches to build fault-tolerant systems are often targeted at a particular platform and software technology. The objective of this paper is to discuss the use of —a generic component-based framework for the construction of adaptive fault-tolerant systems that can integrate and reuse technologies and deploy them across heterogeneous devices. Furthermore, provides a standardized and interoperable interface for sensor observations by relying upon the “Sensor Web” paradigm established by the Open Geospatial Consortium (OGC). We have implemented a Java prototype of our framework and evaluated the potential benefits by carrying out case studies and performance measurements. By implementing and deploying these case studies in standard PCs as well as in sensor nodes, we show that can cope with the problem of a wide degree of heterogeneity with minimal resource overheads.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Publication Date: 2013-02-21
    Description: Saving energy while preserving accuracy is of paramount importance to target tracking in wireless sensor networks. This paper presents an energy-efficient selection of cooperative nodes. In the proposed method, the target detection probability is estimated by single-node processing based on particle filter. Then, an objective function for collaborative target tracking in wireless sensor networks is constructed according to the information utility and the remaining energy of sensor nodes. With this understanding, a dynamic node selection scheme based on genetic algorithms is proposed, which can optimize the tradeoff between the accuracy of tracking and the energy cost of nodes. Simulations demonstrate its superior performance in estimating the target location and saving sensor nodes energy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Publication Date: 2013-02-22
    Description: Recent advances in embedded systems and wireless sensor networks (WSNs) made it possible to realize low-cost monitoring and automation systems for smart grids. This paper presents opportunities and design challenges of WSNs for smart grid applications. WSN-based smart grid applications have been introduced, and some WSN standards and communication protocols have been discussed for smart grid applications. Importantly, node lifetime and link reliability in wireless sensor networking for smart grid applications have been evaluated through case studies based on field tests in electric power system environments.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Publication Date: 2013-03-07
    Description: Maritime search and rescue (MSR), as the last defense line for the life at sea, plays a great role in shipping industry and ocean environment protection. MSR is attracting more and more attention from technical and scientific aspects which are expected to help locate the victim goals quickly, precisely, and efficiently. So far, there have been some new techniques applied to MSR, such as computer vision. However, these techniques have a common drawback that they are too dependent on the effort of the search and rescue party, so that the victim goals can only passively wait for their search. To change this kind of passive status, wireless sensor network (WSN) is the deficiencies of the current maritime search and rescue. To make WSN localization suitable for the MSR, an improved microelectromechanical systems MEMS aided algorithm on the basis of triangle and centroid algorithm is proposed to locate and track the search targets in real time and more precisely. Finally, the simulation results show that the proposed method and algorithm are feasible and efficient.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Publication Date: 2013-03-07
    Description: Currently, maritime search and rescue (MSR) is mainly depending on the search party, while the searching objects are waiting passively. Therefore, a new method of MSR which is based on the wireless sensor network (WSN) techniques is proposed in this paper. WSN could be self-organized into network and transmit nodes information, such as position information, for search party to accomplish the search and rescue work. However, the application encounters the problems of dynamic adaptability and life cycle limitation at sea. An energy dynamic distribution and optimization algorithm (EDDO), which is based on genetic algorithm (GA), is presented to handle with these problems. The algorithm satisfies the connectivity and energy saving of the network, and the GA with elitism-based immigrants approach is put forward to optimize the poor individuals when the positions of some nodes have changed. Simulation results show that the algorithm can quickly adapt to a dynamic network and reduce energy consumption at the same time.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Publication Date: 2013-03-07
    Description: The Internet of Things (IoT) is growing at a fast pace with new devices getting connected all the time. A new emerging group of these devices is the wearable devices, and the wireless sensor networks are a good way to integrate them in the IoT concept and bring new experiences to the daily life activities. In this paper, we present an everyday life application involving a WSN as the base of a novel context-awareness sports scenario, where physiological parameters are measured and sent to the WSN by wearable devices. Applications with several hardware components introduce the problem of heterogeneity in the network. In order to integrate different hardware platforms and to introduce a service-oriented semantic middleware solution into a single application, we propose the use of an enterprise service bus (ESB) as a bridge for guaranteeing interoperability and integration of the different environments, thus introducing a semantic added value needed in the world of IoT-based systems. This approach places all the data acquired (e.g., via internet data access) at application developers disposal, opening the system to new user applications. The user can then access the data through a wide variety of devices (smartphones, tablets, and computers) and operating systems (Android, iOS, Windows, Linux, etc.).
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Publication Date: 2013-03-07
    Description: In vehicular networks, sparse roadside vehicular communication (RVC) systems on highways are difficult to provide full coverage of existing roadways because the distance between the roadside units (RSUs) is farther than the RSU’s transmission range. In sparse RVC, collision-free communication is required because the time available for communication is very short. In addition, the collision-free communication has an energy-efficient feature. Therefore, we propose an energy-efficient broadcast MAC protocol in order to expand the service coverage in RVC systems and collision-free communication. The proposed protocol performs a hybrid vehicular communication (HVC). It has a rebroadcast mechanism using a vehicle’s velocity, distance, and angle from nearby vehicle for collision-free communication. Then, we show our protocol’s performance evaluation using ns-2.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Publication Date: 2013-03-07
    Description: The paper studies the cooperative spectrum sharing among multiple secondary users (SUs) in a clustering cognitive ad hoc network. The problem is formulated as a repeated game with the aim of maximizing the total transmission rate of SUs. Firstly, a clustering formation procedure is proposed to reduce the overhead and delay of game process in cognitive radio network (CRN). Then the repeated game-inspired model for SUs is introduced. With the model, the convergence condition of the proposed spectrum-sharing algorithm is conducted, and the convergence performance is investigated by considering the effects of three key factors: transmission power, discount factor, and convergence coefficient. Furthermore, the fairness of spectrum sharing is analyzed, and numerical results show a significant performance improvement of the proposed strategy when compared to other similar spectrum-sharing algorithms.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Publication Date: 2013-03-07
    Description: A novel circle fitting algorithm is proposed in this paper. The key points of this paper are given as follows: (i) it formulates the circle fitting problem into the special source localization one in wireless sensor networks (WSN); (ii) the multidimensional scaling (MDS) analysis is applied to the data points, and thus the propagator-like method is proposed to represent the circle center parameters as the functions of the circle radius; (iii) the virtual source localization model can be rerepresented as special nonlinear equations of a unique variable (the circle radius) rather than the original three ones (the circle center and radius), and thus the classical fixed-point iteration algorithm is applied to determine the radius and the circle center parameters. The effectiveness of the proposed circle fitting approach is demonstrated using the simulation and experimental results.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Publication Date: 2013-03-07
    Description: In designing wireless sensor networks, it is important to reduce energy dissipation and prolong network lifetime. This paper presents research on the existing clustering algorithm applied in heterogeneous sensor networks and then puts forward an energy-efficient prediction clustering algorithm, which is adaptive to sensor networks with energy and objects heterogeneous. This algorithm enables the nodes to select the cluster head according to factors such as energy and communication cost, thus the nodes with higher residual energy have higher probability to become a cluster head than those with lower residual energy, so that the network energy can be dissipated uniformly. In order to reduce energy consumption when broadcasting in clustering phase and prolong network lifetime, an energy consumption prediction model is established for regular data acquisition nodes. Simulation results show that compared with current clustering algorithms, this algorithm can achieve longer sensor network lifetime, higher energy efficiency, and superior network monitoring quality.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2013-02-19
    Description: Fault-tolerant systems are expected to operate in a variety of devices ranging from standard PCs to embedded devices. In addition, the emergence of new software technologies has required these applications to meet the needs of heterogeneous software platforms. However, the existing approaches to build fault-tolerant systems are often targeted at a particular platform and software technology. The objective of this paper is to discuss the use of —a generic component-based framework for the construction of adaptive fault-tolerant systems that can integrate and reuse technologies and deploy them across heterogeneous devices. Furthermore, provides a standardized and interoperable interface for sensor observations by relying upon the “Sensor Web” paradigm established by the Open Geospatial Consortium (OGC). We have implemented a Java prototype of our framework and evaluated the potential benefits by carrying out case studies and performance measurements. By implementing and deploying these case studies in standard PCs as well as in sensor nodes, we show that can cope with the problem of a wide degree of heterogeneity with minimal resource overheads.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2013-12-03
    Description: With the distributed sensors that are deployed to monitor the urban environment in smart cities, the sensed data are overwhelming and beyond the scope of the wireless sensor networks (WSNs) capability. Due to the communication range limits of the sensors, most of these data will be outsourced and stored on some untrusted servers. Thus, how to maintain the data confidentiality and integrity, as well as source authentication and data query privacy of the outsourced data, is a challenging problem. In this paper, we propose a secure searchable encryption scheme, named SSE, for urban sensing and querying to address the problem. Specifically, our SSE constructs a secure hidden vector encryption-(HVE-) based rang query predicate. The sensed data can be stored on an untrusted server in encrypted form. A requester can obtain the correct ciphertexts when his authorized range query matches the HVE-based encryption predicate. With the help of the base station, the ciphertexts can be decrypted and data integrity can be verified; then, the requester can obtain the correct original data. Security analysis demonstrates that; in the SSE, only the authorized requesters can obtain the query results, while the data confidentiality and integrity and source authentication are also preserved.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2013-12-03
    Description: With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. WSNs have many fields of applications that are playing an essential role in increasing productivity and reducing cost. The restricted and constrained nature of sensors along with potentially dynamic behavior of WSNs demands the proper implementation of framework for secure communication in order to prevent attacker from illegally accessing or altering the transmission. We proposed a framework for secure wireless communication in WSNs which consists of four modules, that is, redundancy checker, message prioritization mechanism, malicious node verification, and malicious data verification. Detailed results of security and performance analysis have been realized for comparison and evaluation with complete implementation using NS2 network simulator. The proposed framework presents numerous interesting features which proofs acceptable performance for malicious node and data detection in WSNs.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2013-12-06
    Description: Directional sensor networks composed of a large number of directional sensors equipped with a limited battery and with a limited angle of sensing have recently attracted attention. Maximizing network lifetime is a challenge in developing energy-efficient directional sensor networks, while covering all of the targets in a given area. However, the existing schemes have considered target coverage problem as only the maximization of network lifetime. In real sensor networks, the quality of target coverage will be varied according to the detection probability of the sensors covering targets. In this paper, we address the directional cover-sets with coverage reliability (DCCR) problem of organizing directional sensors into a group of nondisjoint subsets to extend network lifetime maximally while maintaining networks' satisfied coverage reliability. For the DCCR problem, we first present a coverage reliability model that mainly takes into account the detection probability of each sensor in cover-sets and eventually supports coverage reliability for target coverage. We also develop a heuristic algorithm called directional coverage and reliability (DCR) greedy algorithm to solve the DCCR problem. To verify and evaluate the algorithm, we conduct simulations and show that it extends network lifetime to a reasonable degree while guaranteeing the minimum coverage reliability.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2013-12-06
    Description: A vehicular ad hoc network (VANET) is a wireless network that provides communications between nearby vehicles. Among the different types of information that can be made available to vehicles through VANETs, road traffic information is the most important one. This work is part of an experimental development of a wireless communication platform oriented to applications that allow improving road efficiency and safety, managing and monitoring road traffic, encouraging cooperative driving, and offering pedestrian services and other added-value uses. The proposed system consists of smartphones, sensors, and Wi-Fi hotspots 2.0, as well as complementary functionalities including access to network infrastructure via 3G, GPRS, and 4G. The developed wireless network prototype allows taking advantage of the potential benefits of VANETs. At the same time, the use of smartphones does not require large money investments either in public or restricted areas. The first implementations with smartphones have been useful to test the behaviour of the proposal in a real environment. We have also implemented a large-scale simulation by using NS-2 simulator. From the obtained data, we have estimated the minimum requirements necessary for the correct working of a VANET and the problems that can happen in case of possible attacks or communication overhead.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2013-12-06
    Description: A reliable transport protocol with prediction mechanism for urgent information (PMUI) in WSNs is proposed. With PMUI, which is based on RTP-UI, the congestion control mechanism is improved, and the priority control and prediction mechanisms are adopted by taking the current queue length with change rate and expected queue length with remaining length together into consideration. The congestion status of current queue is analyzed and the changing trend of the next cycle of the queue is predicted as well. In order to evaluate the degree of congestion, state machine is adopted. Working states of WSNs are classified into eight states in accordance with different degrees of congestion. According to the change rate of a queue and the expected change rate of a queue, different rate adjustment mechanisms and bandwidth allocation schemes based on different working states are developed. Simulation results show that PMUI is lower than RTP-UI in both packet loss rate and the average delay for reliable transmission of urgent information.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2013-12-06
    Description: We study the scenario in which a large number of machine-type communication devices (MTCDs) communicate with each other by utilizing the help of the base station (BS) through some MTCD gateways. We consider an overlay mode of an orthogonal frequency division multiple access (OFDMA) based cellular system using orthogonal beamforming to provide broadband wireless access for the MTCD gateways. In order to avoid the interference with mobile users, the beamforming vectors to the MTCD gateways have to be orthogonal to the channel vectors of mobile users, which become a beamforming constraint for the MTCD gateways. However, with limited feedback of channel state information (CSI) at a BS, the orthogonal beamforming constraints may not be achieved. In such a practical case, conventional feedback schemes are feasible but not efficient due to the orthogonality constraints. In this paper, we propose a novel multiple beam selection (MBS) approach with limited feedback for MTCD gateways by taking into account the previous orthogonality constraints. Simulation results show that the performance improvement of the proposed approach over the conventional ones is generally about 10% when a BS is equipped with an array of 6 elements.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2013-12-09
    Description: A joint access control and subchannel allocation (JACSA) scheme is proposed in this paper for femtocell-based machine-to-machine (M2M) network to provide better communication services. As short-range and cost-beneficial eNodeBs, femtocells can improve indoor coverage and data transmission, and can further be used for M2M communication. There are two challenges for femtocell network, access control and truth-telling. Femtocell machine-type communication devices (FMD) select femtocell access points (FAPs) according to the reported channel capacities, while the true values are private information of each femtocell. Therefore, selfish FAPs have incentive to report larger capacities to win greater opportunity to be selected. To solve the aforementioned two problems, a JACSA scheme based on the Arrow-d’Aspremont-Gerard-Varet (AGV) is proposed both in open access and hybrid access scenarios, and formula derivations are given. We prove that, compared with the optimal subchannel allocation (OSA) scheme, JACSA scheme has the feature of achieving near optimal performances with much lower computational complexity. Furthermore, we compare the allocation results for open access and hybrid access in the proposed JACSA scheme. Finally, simulations are performed, and the results verify the availability of our proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2013-12-09
    Description: Today, wireless sensor networks (WSNs) in electronic engineering are used in the monitoring of remote intelligent buildings, and the need for emerging Web 3.0 is becoming more and more in every aspect of electronic engineering. However, the key challenges of monitoring are the monitoring approaches and storage models of huge historical monitoring data. To address these limitations, we attempt to design a WebSocket-based real-time monitoring system for remote intelligent buildings. On one hand, we utilize the latest HTML5 WebSocket, Canvas and Chart technologies to monitor the sensor data collected in WSNs in the Web browser. The proposed monitoring system supports the latest HTML5 browsers and legacy browsers without native WebSocket capability transparently. On the other hand, we propose a storage model with lifecycle to optimize the NoSQL data warehouse. Finally, we have made the monitoring and storage experiments to illustrate the superiority of our approach. The monitoring experimental results show that the average latency time of our WebSocket monitoring is generally lower than polling, FlashSocket, and Socket solution, and the storage experimental results show that our storage model has low redundancy rate, storage space, and latency.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2013-12-11
    Description: The IEEE Wireless Access for Vehicular Environment (WAVE) standard consists of the IEEE 802.11p and the IEEE 1609 specifications supporting fast link establishment as well as broadband data communication in vehicular environment. Although the standard has been widely accepted by industry as well as highway authorities in many countries to be used for the radio communication infrastructure of the next-generation Intelligent Transport System (ITS), it remains open for further enhancements such as seamless handover support. This paper presents two proactive caching and forwarding schemes for seamless handover in IEEE WAVE networks: one for straight highway sections and the other for crossroads and junctions. Practical and efficient handover procedures, based on the proposed schemes, are also presented. Specifically, an on-board unit (OBU) informs the old road-side unit (RSU) about its departure from the coverage area such that the old RSU can forward the buffered packets to candidate RSUs for proactive caching. In handover scenarios around crossroads and junctions, the IEEE 802.11f Move-notify message is used by the new RSU to request the rest of candidate RSUs to purge the cached packets in order to prevent the waste of radio resource. Simulation results show that the proposed schemes outperform conventional schemes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Publication Date: 2013-12-11
    Description: We propose a location-based mobile social networking system (SNS) that integrates biometric facial authentication using a modified local directional pattern (MLDP), collaborative content recommendations, and communication among users. The proposed system is an effective fusion of a traditional social networking system, a location-based system, and a provider of intelligent recommendations. The prototype and service scenario in this study show possibilities for technical advancement and the future extension of mobile social networking services. To verify the proposed system, we performed experiments to determine the recognition rate for a user’s facial image on a real-world smartphone and the preference prediction accuracy of a collaborative filtering-based recommendation system. Through our implementation and preference prediction experiments, we confirmed that the proposed system is highly effective and applicable to convergence using a location-based service and a content recommender.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2013-12-11
    Description: One of the fundamental requirements for visual surveillance using nonoverlapping camera networks is the correct labeling of tracked objects on each camera in a consistent way, in the sense that the observations of the same object at different cameras should be assigned with the same label. In this paper, we formulate this task as a Bayesian inference problem and propose a distributed inference framework in which the posterior distribution of labeling variable corresponding to each observation is calculated based solely on local information processing on each camera and mutual information exchanging between neighboring cameras. In our framework, the number of objects presenting in the monitored region does not need to be specified beforehand. Instead, it can be determined automatically on the fly. In addition, we make no assumption about the appearance distribution of a single object, but use “similarity” scores between appearance pairs as appearance likelihood for inference. To cope with the problem of missing detection, we consider an enlarged neighborhood of each camera during inference and use a mixture model to describe the higher order spatiotemporal constraints. Finally, we demonstrate the effectiveness of our method through experiments on an indoor office building dataset and an outdoor campus garden dataset.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...