No firm can survive without building a mechanism to create knowledge in the 21st century. the knowledge-creation theory by Nonaka has successfully generalized a knowledge-creation process in an organization. However, ...
详细信息
Wireless sensor networks (WSNs) have an intrinsic interdependency withthe environments in which they operate. the part of the world with which an application is concerned is defined as that application's domain. ...
详细信息
ISBN:
(纸本)9783642028298
Wireless sensor networks (WSNs) have an intrinsic interdependency withthe environments in which they operate. the part of the world with which an application is concerned is defined as that application's domain. this paper advocates that an application domain of a WSN application can serve as a supplement to analysis, interpretation, and visualisation methods and tools. We believe it is critical to elevate the capabilities of the visualisation service, the mapping service, proposed in [1] to make use of the special characteristics of an application domain. In this paper, we propose an adaptive Multi-Dimensional Application Domain-driven (M-DAD) visualisation framework that is suitable for visualising an arbitrary number of sense modalities and other parameters of the application domain to improve the visualisation performance. M-DAD starts with an initial user defined model that is maintained and updated throughout the network lifetime. the experimental results demonstrate that M-DAD visualisation framework performs as well or better than visualisation services without its extended capabilities.
Ubiquitous-oriented realistic next generation mobile multimedia technology requires new approaches that sufficiently reflect human's sensory information and mobile Web 2.0-oriented collective intelligence and soci...
详细信息
ISBN:
(纸本)9783642028298
Ubiquitous-oriented realistic next generation mobile multimedia technology requires new approaches that sufficiently reflect human's sensory information and mobile Web 2.0-oriented collective intelligence and social networking concepts. Hence, we suggest and implement enhanced user location-based five senses multimedia technology that realizes a collective intelligence and mobile social networking between multi-mobile users. this includes 1) mobile station-based mixed-web map module via mobile mash-up, 2) authoring module of location-based five senses multimedia contents using ubiquitous-oriented sensor network and WiBro(Mobile Wi-Max), and 3) LBS-oriented intelligent agent module that includes ontology-based five senses multimedia retrieval module, social network-based user detection interface and user-centric automatic five senses multimedia recommender interface.
As data management applications grow more complex, they are likely to need efficient distributed query processing. In distributed Database systems complete replication consists of maintaining complete copies of the da...
详细信息
ISBN:
(纸本)9781424437702
As data management applications grow more complex, they are likely to need efficient distributed query processing. In distributed Database systems complete replication consists of maintaining complete copies of the database at each site;this has advantages such as highest locality of reference, highest reliability, availability, and is best for reading. the most promising and dominant data format for data processing and representing on the Internet is the semistructured data form termed XML. XML. data has no fixed schema;it evolved and is self describing which results in management difficulties compared to, for example relational data. It is therefore a major challenge for the database community to design query languages and storage methods that can retrieve semistructured data. In this paper, we present a storing and querying scheme for semistructured data views of relational form in distributed environments. the proposed technique stores path dictionary, word dictionary, attribute dictionary, and the complete compressed replication of semistructured data in each distributed site of the DDBS. the presented technique provides query performance improvement due to the compression of semistructured data.
During the gravure drum printing, some unexpected external factors have led to overprint error. Overprint error can be characterized by the deviation between the actual interval and the standard interval of the adjace...
详细信息
distributedsystems will be increasingly built on top of wireless networks, such as sensor networks or handheld devices with advanced sensing and computational abilities. Supporting cooperative processes executed by s...
详细信息
ISBN:
(纸本)9789639799769
distributedsystems will be increasingly built on top of wireless networks, such as sensor networks or handheld devices with advanced sensing and computational abilities. Supporting cooperative processes executed by such unreliable and dynamic system components poses a various number of new technical challenges. In terms of recovery, limited resource capabilities have be considered during re-scheduling of failed process activities. In terms of concurrency, a non-blocking protocol is required to allow a high degree of parallelism. In this paper, we introduce a flexible and resource-oriented failure handling mechanism for cooperative processes in hierarchical and distributedsystems. the objective is to ensure both - transactional semantics as well as the selection of suitable nodes with respect to available resource capabilities. Based on a nested execution model, we develop a multi-stage algorithm that uses constraint solving techniques in a parallel fashion thus achieving a more efficient recovery. We evaluate our proposed techniques in a prototype implementation, and demonstrate significant performance gains by using a parallel re-scheduling.
Wireless sensor Networks have become a technology for the new millennium withthe endless possibilities for applications ranging from academic to military. these tiny sensors are deployed in open environments, where s...
详细信息
ISBN:
(纸本)9789639799592
Wireless sensor Networks have become a technology for the new millennium withthe endless possibilities for applications ranging from academic to military. these tiny sensors are deployed in open environments, where security for data or hardware cannot be guaranteed. Unfortunately due to the resource constraints, traditional security schemes cannot be applied. therefore designing protocols that can operate securely using smart inherent features is the best option. In this paper, an efficient way of detecting an intruder using Honeypot and Swarm Intelligence is proposed. the Honeypot architecture strategically enables agents to track the intruders. this process of locating an intruder reduces the false alarm detection rate caused by Denial-of-service attacks. A detailed analysis of the attack is captured to predict future attacks using pattern recognition. the proposed framework is evaluated based on accuracy and speed of intruder detection before the network is compromised. this process of detecting the intruder earlier helps learn his/her future attacks, but also a defensive countermeasure.
this paper presents the design and development of a new Quality Control (QC) system for immunology/serology tests at medical laboratories. the developed QC system which is based on client-server a architecture provide...
详细信息
ISBN:
(纸本)9781424443451
this paper presents the design and development of a new Quality Control (QC) system for immunology/serology tests at medical laboratories. the developed QC system which is based on client-server a architecture provides a scalable architecture for future integration of other categories of medical laboratory tests. the architecture and functional features of the proposed QC system are presented along withthe workflow process and UML design models of the key QC and management processes. More than 15 Graphical User Interface (GUI) forms are designed and implemented to enter/display various types of information. Functionality of each form and its interactivity withthe system database and operator is tested along with its interaction with other forms. Test results showed that the developed QC fulfills all the functional requirements and provides accurate QC reports. A wide spectrum of immunology/serology tests is performed and the obtained results are found in correlation withthe QC statuses assessed manually by specialists. this not only confirms validity of the implemented QC process, but delivers higher confidence in lab-testing procedures, and allows for more reliable results.
the wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the network. I...
详细信息
ISBN:
(纸本)9783642028298
the wormhole attack sniffs packets in one point in the network, tunnels them through a wired or wireless link to another point to cause severe influence on the localization process or routing process in the network. In this paper, we analyze the impact of the wormhole attack on the localization in wireless sensor networks and we propose a wormhole attack resistant secure localization scheme. the main idea of our proposed scheme is to build a so-called conflicting set for each locator based on the abnormalities of message exchanges among neighboring locators, and then to identify all dubious locators which are filtered out during localization. Our proposed scheme can identify the dubious locators with a very high probability to achieve secure localization. the simulation results show that it outperforms the existed schemes under different network parameters.
Target coverage problem in wireless sensor networks remains a challenge. Due to nonlinear nature, previous work has mainly focused on heuristic algorithms, which remain difficult to characterize and have no performanc...
详细信息
ISBN:
(纸本)9781424451142
Target coverage problem in wireless sensor networks remains a challenge. Due to nonlinear nature, previous work has mainly focused on heuristic algorithms, which remain difficult to characterize and have no performance guarantee. To solve the problem, this paper offers two important contributions. the first contribution is to have two lifetime upper bounds, which could be used to justify performance of previously proposed heuristic algorithms. One upper bound is based on the relaxation and reformulation technique while the other is derived by relaxing coverage constraints. We study the interesting connection between those two bounds and thus endow them with physical meanings. the second contribution is proposing a column generation based (CG) approach. the objective is to find an optimal schedule, defined as a time table specifying from what time up to what time which sensor watches which targets while the maximum lifetime has been obtained. We also offer an in-depththeoretic analysis as well as several novel techniques to further optimize the approach. Numerical results not only demonstrate that the lifetime upper bounds are very tight, but also verify that the proposed CG based approach constantly yields the optimal or near optimal solution.
暂无评论