Grid computing supports workload execution on computing resources that are shared across a set of collaborative organizations. At the core of workload management for Grid computing is a software component, called meta...
详细信息
Over the recent years, one of the most important problems in wireless sensor network is to develop a routing protocol that has energy efficiency. Since the power of the sensor nodes is limited, conserving energy and n...
详细信息
ISBN:
(纸本)9781424419791
Over the recent years, one of the most important problems in wireless sensor network is to develop a routing protocol that has energy efficiency. Since the power of the sensor nodes is limited, conserving energy and network life is a critical issue in wireless sensor network. In this paper, first we propose an ELCH (Extending Lifetime of Cluster Head) routing protocol that has self-configuration and hierarchal routing properties. It reforms the existing routing protocols in several aspects and constructs clusters on the basis of radio radius and the number of cluster members. In this method, the clusters in the network are equally distributed. We also suggest a novel clustering algorithm for sensor networks, which lets sensors vote for their neighbors in order to elect suitable cluster heads.
Communication In and withsensor networks often lacks of exchangeability. Furthermore handling communication data formats during sensor node programming is often complex and programming errors can result in unstable p...
详细信息
ISBN:
(纸本)9784907764319
Communication In and withsensor networks often lacks of exchangeability. Furthermore handling communication data formats during sensor node programming is often complex and programming errors can result in unstable programs. In this poster we introduce the easy to use programming framework XOBE(sensorNetwork), which provides the direct use of XML in a sensor node programming language, while ensuring stable and space-, time- and energy-efficient programs handling XML data.
In this paper, we present new efficient strategy for constructing a wireless tree network containing n nodes of diameter Δ while satisfying the QoS requirements such as bandwidth and delay. Given a tree network T, a ...
详细信息
We introduce a novel sensing device named "three-dimensional capture sheet (3DCS)." the cloth-like sheet measures its own 3D shape with no external equipment. It has many potential applications such as 3D mo...
详细信息
ISBN:
(纸本)9784907764319
We introduce a novel sensing device named "three-dimensional capture sheet (3DCS)." the cloth-like sheet measures its own 3D shape with no external equipment. It has many potential applications such as 3D modeling, size and shape measurement, wearable motion capture, tactile sensor, and so on. It consists of a lattice structure inside of the sheet, and each link of the structure has a sensor chip consisting of a triaxial accelerometer and a triaxial magnetometer. the sensor chip measures the gravity and the Earth's magnetic field to obtain the link posture. After all the link postures are obtained, the whole shape of the sheet is reconstructed by combining them. Additionally, owing to redundancy of the problem, the estimation error (caused by random noise, a distorted magnetic field, and so on) can be corrected. the feasibility and stability of the shape estimation algorithm are confirmed through simulations, and the prototype is presented.
In this paper, we present an online scheduling algorithm for communication in a distributed control system. the packet size of the communication varies for each execution of the loop within certain bounds. We consider...
详细信息
ISBN:
(纸本)9789898111302
In this paper, we present an online scheduling algorithm for communication in a distributed control system. the packet size of the communication varies for each execution of the loop within certain bounds. We consider systems with closed loops that restart immediately after the completion of an execution. Our algorithm is based on priority of the loop and size of the communication packet. We demonstrate through simulation that our algorithm generates a feasible schedule that minimizes average control delay over all the loops. Our simulations demonstrate that this online schedule reduces average delay significantly compared to a-priori schedules for distributed control systems. We demonstrate that bandwidth utilization is more efficient in case of online scheduling.
Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. O...
详细信息
ISBN:
(纸本)9781424417650
Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding to authenticate the legitimate diversity of encoded images and also localize the tampered regions in an inauthentic image. the authentication/localization decoder was supplied with a Slepian-Wolf encoded image projection as authentication data. We extend our scheme to localize tampering in contrast and brightness adjusted images using an Expectation Maximization algorithm at the decoder. Experimental results demonstrate that tampered image blocks can be identified with high probability using data of only a few hundred bytes for a 512x512 image.
Future wireless sensor networks (WSNs) are projected to run multiple applications in the same network infrastructure. While such multi-application WSNs (MA-WSNs) are economically more efficient and adapt better to the...
详细信息
ISBN:
(纸本)9780769534923
Future wireless sensor networks (WSNs) are projected to run multiple applications in the same network infrastructure. While such multi-application WSNs (MA-WSNs) are economically more efficient and adapt better to the changing environments than traditional single-application WSNs, they usually require frequent code redistribution on wireless sensors, making it critical to design energy efficient post-deployment code dissemination protocols in MA-WSNs. Different applications in MA-WSNs often share some common code segments. therefore when there is a need to to disseminate a new, application front the sink node, it is possible to disseminate its shared code segments from peer sensors instead of disseminating everything from the sink node. While dissemination protocols have been proposed to handle code of each single type. it is challenging to achieve energy efficiency when the code contains both types and needs simultaneous dissemination. In this paper we utilize an adaptive buffer management approach to achieve efficient code dissemination in MA-WSNs. Our experimental results show that adaptive buffer management can reduce the completion time and the message overhead up to 10% and 20% respectively.
sensor networks have recently attracted significant attention for many military and civil applications, such as environment monitoring, target tracking, and surveillance. A high-level abstraction of sensor networks fo...
详细信息
ISBN:
(纸本)9783540692928
sensor networks have recently attracted significant attention for many military and civil applications, such as environment monitoring, target tracking, and surveillance. A high-level abstraction of sensor networks forms the distributed database view, in which query is adopted to retrieve data from the network. sensor nodes have limited energy resources and their functionality continues until their energy drains. therefore, query for sensor networks should be wisely designed to extend the lifetime of sensors. this paper presents a query optimization method based on user-specified accuracy item for wireless sensor networks. When issuing a query, user may specify a value/time accuracy constraint according to which an optimized query plan can be created to minimize the energy consumption. At each single sensor node, instead of direct delivery of each reading, algorithms are proposed to reduce both data sensing and data transmission. the performance of the proposed algorithms shows that the proposed methods can achieve better performance than without pet-forming the optimization.
Is presented a three coil system, with a passive wireless sensor, as an interface for a commercial Network. the objective of this experiment is to achieve that the system measures the impedances of electrolytic soluti...
详细信息
暂无评论