Wireless sensor and actor networks (WSAN) are composed of low-powered, low-resourced, densely deployed sensor nodes and high-powered, resource-rich, sparsely deployed actor nodes to perform distributed sensing and act...
详细信息
ISBN:
(纸本)9788132220084
Wireless sensor and actor networks (WSAN) are composed of low-powered, low-resourced, densely deployed sensor nodes and high-powered, resource-rich, sparsely deployed actor nodes to perform distributed sensing and acting tasks, respectively. Sensor nodes sense the physical phenomenon and report to actor nodes at earliest possible time for appropriate action by the actor nodes. The major objective of WSAN is to have the desired action correspondent to the reported event with higher precession. Due to the coexistence of sensor and actor nodes, one of the major challenges in such networks is communication and coordination mechanisms among the sensor and actor nodes. We have considered the problem of communication and coordination and proposed an efficient model based on geometric structure called Voronoi diagram. Our protocol is based on clustering (virtual grid) and Voronoi region concept. Simulation results demonstrate that the proposed protocol outperforms in terms of throughput, packet delivery ratio, average delay, and normalized routing overhead.
In IEEE 802.16m networks, the existing power saving models (PSMs) had been developed by assuming traffic as Poisson arrival with exponential interarrival time or generalized traffic process. However, the mobile Intern...
详细信息
ISBN:
(纸本)9788132220084
In IEEE 802.16m networks, the existing power saving models (PSMs) had been developed by assuming traffic as Poisson arrival with exponential interarrival time or generalized traffic process. However, the mobile Internet traffic presumes Pareto/Weibull arrival with Pareto interarrival time. The existing PSM with this traffic causes frequent battery drain out at the mobile stations (MSs) with inappropriateness of the sleep parameters. Hence, in this paper, a PSM is derived for MS with mobile Internet traffic by considering the traffic parameters, namely scaling, shaping and location or threshold. A combined power saving class (PSC) is also suggested to improve the system performance with the developed PSM. The effectiveness of the developed model is validated by means of numerical results.
Nowadays, location-aware security policies play a key role in wireless sensor networks. In this paper, we propose to develop a distributed secured localization scheme that validates the reliability of location informa...
详细信息
ISBN:
(纸本)9788132220084
Nowadays, location-aware security policies play a key role in wireless sensor networks. In this paper, we propose to develop a distributed secured localization scheme that validates the reliability of location information associated with event reports. We make the anchor nodes are deployed such that they form connected sensor coverage and their routing information to these anchor nodes, thereby avoiding the sink overload problem. Since this scheme involves distributed anchor nodes for verification, it has less overhead and delay. By simulation results, we show that our proposed scheme attains good delivery ratio with reduced delay and overhead.
Achieving security in case of data aggregation in wireless sensor network (WSN) is a challenging task because of its limitations in terms of computation, resources, battery power, transmission capabilities, etc. This ...
详细信息
ISBN:
(纸本)9788132220084
Achieving security in case of data aggregation in wireless sensor network (WSN) is a challenging task because of its limitations in terms of computation, resources, battery power, transmission capabilities, etc. This paper provides a comprehensive discussion on literature of security concerns in data aggregation in WSNs. Main contributions of this paper are describing the fundamentals of secure data aggregation in WSN, identifying the important parameters for the classification of secure data aggregation techniques for WSN, considering key characteristics of existing secure data aggregation techniques, comparing the existing secure data aggregation techniques, and introducing table of comparison based on various parameters such as security principles, prevention of attacks by protocols, aggregation function, and cryptographic techniques used.
Since the inception of wireless sensor networks (WSN), many protocols have been designed and developed to address various issues. Energy efficient data aggregation has been a challenge for researchers working in this ...
详细信息
ISBN:
(纸本)9788132220084
Since the inception of wireless sensor networks (WSN), many protocols have been designed and developed to address various issues. Energy efficient data aggregation has been a challenge for researchers working in this field. In this work, we have investigated the performance of some state-of-the-art hierarchical data aggregation protocols used in WSN from the energy conservation perspective when information is gathered at the sink node. The primary objective of data aggregation is to gather and aggregate data in a way that the network lifetime is enhanced as well as power is conserved. Two well-accepted aggregation protocols namely low energy adaptive clustering hierarchy (LEACH) and power efficient gathering in sensor information systems (PEGASIS) are considered for evaluation on a common network scenario. Analysis of these protocols has been done through extensive simulation and is found that the simulation results give an insight into theoretical properties only without providing enough information regarding its practical performance. We conclude with possible future research directions.
With the pace of modern lifestyle, about 40-50 million people in the world suffer from epilepsy-a disease with neurological disorder. Electroencephalography (EEG) is the process of recording brain signals that generat...
详细信息
ISBN:
(纸本)9788132220084
With the pace of modern lifestyle, about 40-50 million people in the world suffer from epilepsy-a disease with neurological disorder. Electroencephalography (EEG) is the process of recording brain signals that generate due to a small amount of electric discharge in brain. This may occur due to the information flow among several neurons. Therefore, in every minute, analysis of EEG signal can solve much neurological disorders like epilepsy. In this paper, a systematic procedure for analysis and classification of EEG signal is discussed for identification of epilepsy in a human brain. The analysis of EEG signal is made through a series of steps from feature extraction to classification. Feature extraction from EEG signal is done through discrete wavelet transform (DWT), and the classification task is carried out by MLPNN based on supervised training algorithms such as backpropagation, resilient propagation (RPROP), and Manhattan update rule. Experimental study in a Java platform confirms that RPROP trained MLPNN to classify EEG signal is promising as compared to back-propagation or Manhattan update rule trained MLPNN.
The proceedings contain 22 papers. The topics discussed include: fundamental tradeoffs and evaluation methodology for future green wireless networks;integrated cross-layer energy savings in a smart and flexible cellul...
ISBN:
(纸本)9781467329972
The proceedings contain 22 papers. The topics discussed include: fundamental tradeoffs and evaluation methodology for future green wireless networks;integrated cross-layer energy savings in a smart and flexible cellular network;on the energy-bandwidth trade-off in green wireless networks: system level results;optimisation of Lambertian order for indoor non-directed optical wireless communication;MOMCC:market-oriented architecture for mobile cloud computing based on service oriented architecture;SAMI: service-based arbitrated multi-tier infrastructure for mobile cloud computing;optical wireless communications using the visible spectrum;simplified calculation method of indoor optical impulse response based on recursive algorithm;performance analysis of multiuser uplink amplify-and-forward relay networks with fixed-gain relaying;optimizing dual-hop systems under orthogonal transmission and relay selection schemes;and radio resource allocation for OSC downlink channels.
In this paper, we explore resource optimization problem in dual hop multi-carrier amplify and forward (AF) based relay networks. First, we consider an orthogonal transmission where the source and relay stations transm...
详细信息
In this paper, we explore resource optimization problem in dual hop multi-carrier amplify and forward (AF) based relay networks. First, we consider an orthogonal transmission where the source and relay stations transm...
详细信息
In this paper, we explore resource optimization problem in dual hop multi-carrier amplify and forward (AF) based relay networks. First, we consider an orthogonal transmission where the source and relay stations transmit information in different time slots. We investigate the joint optimization of subcarrier matching over two hops and the power allocation over different subcarriers at the source and the relay nodes. Although the joint optimization problem under power and subcarrier constraints is a mixed integer programming problem, we propose an efficient solution based on the dual decomposition approach. Then, we present a selection scheme where a single best relay is selected for the dual hop communication. Finally, simulation results are provided to corroborate the proposed studies.
The proceedings contain 91 papers. The topics discussed include: experimental analysis of different metrics (object-oriented and structural) of software;discrete cosine transformation based image authentication and se...
ISBN:
(纸本)9780769537436
The proceedings contain 91 papers. The topics discussed include: experimental analysis of different metrics (object-oriented and structural) of software;discrete cosine transformation based image authentication and secret message transmission scheme;an architecture for mobile social networking applications;orthogonal hermite pulses for indoor communication with UWB (S-V) channel;a design of sensor web registry for wireless sensor networks with SOA approach;a new fast radix-2 decimation-In-frequency algorithm for computing the discrete Hartley transform;probability based search motion estimation algorithm;classification rule mining for object oriented databases: a brief review;amplitude -phase algorithm for SAR signal processing;and design of 1.3 GHz microstrip highpass filter using optimum distributed short circuited stubs.
暂无评论