Wireless sensor networks are gaining popularity in practical monitoring and surveillance applications. One of the major challenges for designing sensor networks is to minimize the transmission cost. Distributed compre...
详细信息
In many applications, data from different sensors are aggregated in order to obtain more reliable information about the process that the sensors are monitoring. However, the quality of the aggregated information is in...
详细信息
ISBN:
(纸本)9781467396189
In many applications, data from different sensors are aggregated in order to obtain more reliable information about the process that the sensors are monitoring. However, the quality of the aggregated information is intricately dependent on the reliability of the individual sensors. In fact, unreliable sensors will tend to report erroneous values of the ground truth, and thus degrade the quality of the fused information. Finding strategies to identify unreliable sensors can assist in having a counter-effect on their respective detrimental influences on the fusion process, and this has has been a focal concern in the literature. The purpose of this paper is to propose a solution to an extremely pertinent problem, namely, that of identifying which sensors are unreliable without any knowledge of the ground truth. This fascinating paradox can be formulated in simple terms as trying to identify stochastic liars without any additional information about the truth. Though apparently impossible, we will show that it is feasible to solve the problem, a claim that is counter-intuitive in and of itself. To the best of our knowledge, this is the first reported solution to the aforementioned paradox. Legacy work and the reported literature have merely addressed assessing the reliability of a sensor by comparing its reading to the ground truth either in an online or an offline manner. The informed reader will observe that the so-called Weighted Majority Algorithm is a representative example of a large class of such legacy algorithms. The essence of our approach involves studying the agreement of each sensor with the rest of the sensors, and not comparing the reading of the individual sensors with the ground truth - as advocated in the literature. Under some mild conditions on the reliability of the sensors, we can prove that we can, indeed, filter out the unreliable ones. Our approach leverages the power of the theory of Learning Automata (LA) so as to gradually learn the identity
The proceedings contain 40 papers. The topics discussed include: enhanced network security using text to image encoding;high performance immersed VOx bolometer for spacecraft earth horizon sensor and its reliability s...
ISBN:
(纸本)9781467393287
The proceedings contain 40 papers. The topics discussed include: enhanced network security using text to image encoding;high performance immersed VOx bolometer for spacecraft earth horizon sensor and its reliability studies;studies on high energy particle irradiation on micro sun sensors for space applications;optimum choice of wavelet function and thresholding rule for ECG signal denoising;smart helmets for automatic control of headlamps;high speed multiplier implementation based on vedic mathematics;quality of obstacle distance measurement using ultrasonic sensor and precision of two computer vision-based obstacle detection approaches;a smart home automation technique with Raspberry Pi using IoT;model based test equipment design and controller tuning for elevator-endurance test rig;synthesis of Bi2WO6-RGO nanocomposite for photocatalytic application;comparative study on convolutive BSS algorithms for an app-based assistance system scenario;detail enhancement and dynamic range compression for high dynamic range infrared images;and a novel technique of medical image fusion using stationary wavelet transform and principal component analysis.
The proceedings contain 83 papers. The special focus in this conference is on Wireless algorithms, Systems, and applications. The topics include: Privacy-preserving public auditing together with efficient user revocat...
ISBN:
(纸本)9783319218366
The proceedings contain 83 papers. The special focus in this conference is on Wireless algorithms, Systems, and applications. The topics include: Privacy-preserving public auditing together with efficient user revocation in the mobile environments;multi-proxy multi-signature binding positioning protocol;modeling flu trends with real-time geo-tagged twitter data streams;radio signal based device-free velocity recognition;minimum-cost information dissemination in social networks;finding overlapping communities with random walks on line graph and attraction intensity;computing an optimal path with the minimum number of distinct sensors;ultra-lightweight RFID authentication scheme for mobile device;impact of a deterministic delay in the DCA protocol;a smartphone based intelligent sound fusion system for the hearing impaired;optimal power allocations for two-users spectrum sharing cognitive radio with interference limit;adaptive resource allocation for anti-money laundering based on SMDP;infrastructure deployment and optimization for cloud-radio access networks;a cluster head rotation cooperative MIMO scheme for wireless sensor networks;a distributed game-theoretic power control mechanism for device-to-device communications underlaying cellular network;optimal preference detection based on golden section and genetic algorithm for affinity propagation clustering;a new mobility model in mobile social networks;secure group setup and anonymous authentication in platoon-based vehicular cyber-physical systems;a secure multi-unit sealed first-price auction mechanism;secure and verifiable multi-owner ranked-keyword search in cloud computing;secure and privacy-preserving location proof in database-driven cognitive radio networks and separate design principle for multichannel scheduling in priority-aware packet collection.
The proceedings contain 41 papers. The special focus in this conference is on IOV architectures and applications. The topics include: Vehicle cardinality estimation in VANETs by using RFID tag estimator;an efficient t...
ISBN:
(纸本)9783319272924
The proceedings contain 41 papers. The special focus in this conference is on IOV architectures and applications. The topics include: Vehicle cardinality estimation in VANETs by using RFID tag estimator;an efficient transmission scheme based on adaptive demodulation in wireless multicast systems;a full service model for vehicle scheduling in one-way electric vehicle car-sharing systems;a method for private car transportation dispatching based on a passenger demand model;real-time location system and applied research report;vehicular cloud serving systems with software-defined networking;temporal centrality prediction in opportunistic mobile social networks;a novel data sharing mechanism via cloud-based dynamic audit for social internet of vehicles;a statistical-based anomaly detection method for connected cars in internet of things environment;target localization and navigation with directed radio sensing in wireless sensor networks;predicting pedestrian injury metrics based on vehicle front-end design;safety-aware navigation application for pedestrian protection in vehicular networks;a cooperative collision warning system based on digital map and dynamic vehicle model fusion;sensor data management for driver monitoring system;nighttime vehicle detection for heavy trucks;a quality analysis method for the fuel-level data of IOV;a safety guard for driving fatigue detection based on left prefrontal EEG and mobile ubiquitous computing;efficient regional traffic signal control scheme based on a SVR traffic state forecasting model;managing trust for intelligence vehicles and design and evaluation of a smartphone-based alarming system for pedestrian safety in vehicular networks.
Presented here is a fusion system based on simple, low-cost computer vision and radiological sensors for tracking of multiple objects and identifying potential radiological materials being transported or shipped. The ...
详细信息
ISBN:
(纸本)9781479999194
Presented here is a fusion system based on simple, low-cost computer vision and radiological sensors for tracking of multiple objects and identifying potential radiological materials being transported or shipped. The main focus of this work is the development of calibration algorithms for characterizing the fused sensor system as a single entity. There is an apparent need for correcting for a scene deviation from the basic inverse distance-squared law governing the detection rates even when evaluating system calibration algorithms. In particular, the computer vision system enables a map of distance-dependence of the sources being tracked, to which the time-dependent radiological data can be incorporated by means of data fusion of the two sensors' output data.
Safe Autonomous Vehicles (AVs) will emerge when comprehensive perception systems will be successfully integrated into vehicles. Advanced perception algorithms based on occupancy grids were developed for AV prototypes....
详细信息
Safe Autonomous Vehicles (AVs) will emerge when comprehensive perception systems will be successfully integrated into vehicles. Advanced perception algorithms based on occupancy grids were developed for AV prototypes. These algorithms estimate the position and speed of every obstacle in the environment by using data fusion from multiple sensors. Computational requirements of such fusion prevent their integration into AVs on current low-power embedded hardware. However, recent emerging many-core architectures offer opportunities to fulfill the automotive market constraints and efficiently support advanced perception applications. This paper explores the integration of the occupancy grid multi-sensorfusion algorithm into low power many-core architectures. The parallel properties of this function are used to achieve realtime performance with a power consumption less than 1W. The proposed implementation produces an occupancy grid of 500×300 cells within 6.26ms. The execution time is 6x faster than typical sensor output rates and 9x faster than previous embedded prototypes.
Wireless sensors networks plays an important role for accurate monitoring for various applications such as military surveillance where exact monitoring is required. Critical issue with wireless sensor network is senso...
详细信息
Wireless sensors networks plays an important role for accurate monitoring for various applications such as military surveillance where exact monitoring is required. Critical issue with wireless sensor network is sensor node energy as energy utilization of sensor nodes increases the communication cost. This paper used effective N-DRINA routing algorithm which improves the data fusion and aggregation techniques to save energy efficiently. It also builds the effective routing tree, overlapping routes increases and eliminates the redundant data. This algorithm can compare to other algorithms like information-fusion-based-algorithm, minimum spanning-tree, shortest-path-tree. Our N-DRINA shows improved results along the use of energy-wake-up mechanism.
Smart sensors are becoming an integral part of the evolving technology landscape; their ability to share reduced data over networks enables live data fusion, which significantly improves sensor performance and situati...
详细信息
Smart sensors are becoming an integral part of the evolving technology landscape; their ability to share reduced data over networks enables live data fusion, which significantly improves sensor performance and situational awareness. A lightweight, mobile acoustic sensor network has been used as an infrastructure to layer multi-sensorfusion algorithms, for detection of impulsive events such as gunfire or explosions. The system can create actionable information within seconds, and can be used to direct assets such as unmanned aerial vehicles (UAVs) to specific coordinates, for eyes-on assessment in under a minute. The sensor array will be discussed in terms of its three primary components: the smart sensors, the synchronization network, and the fusion algorithms. Performance of the array from recent tests will be examined with respect to small arms and simulated mortar fire, and producing actionable information. In addition, test results will be discussed in context of autonomous control of UAV assets and potential applications.
Wireless sensor network is a network consists of large number of sensors and a base station. There are many novel architectures, algorithms, protocols implemented so far but one of the major issues in wireless sensor ...
详细信息
ISBN:
(纸本)9781467369121
Wireless sensor network is a network consists of large number of sensors and a base station. There are many novel architectures, algorithms, protocols implemented so far but one of the major issues in wireless sensor network is to develop an energy efficient routing protocol which affects the stability and overall lifetime of the network. Clustering of nodes is one of the effective techniques used to improve energy, scalability and lifetime. The proposed protocol is a Section Based Hybrid Routing Protocol for heterogeneous WSN using Artificial Bee Colony (SBHRA). There are some nodes which send data directly to base station and other uses clustering technique to transmit data to base station (BS). The hybrid technique minimizes energy consumption of sensors and increases the network lifetime and throughput of the network.
暂无评论