The proceedings contain 30 papers. The topics discussed include: dynamic spectrum access in DTV Whitespaces: design rules, architecture and algorithms;mining spectrum usage data: a large-scale spectrum measurement stu...
ISBN:
(纸本)9781605587028
The proceedings contain 30 papers. The topics discussed include: dynamic spectrum access in DTV Whitespaces: design rules, architecture and algorithms;mining spectrum usage data: a large-scale spectrum measurement study;a quorum-based framework for establishing control channels in dynamic spectrum access networks;throughput-efficient sequential channel sensing and probing in cognitive radio networks under sensing errors;SAM: enabling practical spatial multiple access in wireless LAN;order matters: transmission reordering in wireless networks;design, implementation and evaluation of an efficient opportunistic retransmission protocol;Esense: communication through energy sensing;capacity of large-scale CSMA wireless networks;scheduling partition for order optimal capacity in large-scale wireless networks;mobility increases the connectivity of k-hop clustered wireless networks;opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links;and compressive data gathering for large-scale wireless sensor networks.
Wireless (body) sensors are being deployed on patients to continually monitor their physiological health conditions. These body sensors are very tiny devices and when attached to the human patient body would eliminate...
详细信息
ISBN:
(纸本)9780769539157
Wireless (body) sensors are being deployed on patients to continually monitor their physiological health conditions. These body sensors are very tiny devices and when attached to the human patient body would eliminate the need for continuously monitoring by a nurse/doctor. These can be configured to convey the patient's status directly to the assigned doctor/nurse through the personal smart phone, PDA or Palm device. In this situation, Wireless Mesh Networks (WMN) can also be used to transmit vital information arising form the wireless Body sensor Network (WBSN) to the backbone network. The integration of WBSN and WMN technologies, results in Wireless Sensor Mesh Network (WSMN). In this paper we present the results on the performance of such a WSMN used for patient health monitoring application, in terms of parameters like delay, MAC delay and throughput under varying number of patients and varying number of doctors in wards and also the failure performance when the mesh nodes fail, based on simulation study carried out with Opnet modeller 15.0.
The principal drawback of the existing cryptographic algorithms is the maintenance of their key's secrecy. Added with, human users have a difficult time remembering strong but lengthy cryptographic keys. As a resu...
详细信息
ISBN:
(纸本)9781424451043
The principal drawback of the existing cryptographic algorithms is the maintenance of their key's secrecy. Added with, human users have a difficult time remembering strong but lengthy cryptographic keys. As a result, utilizing individual's biometric features in the generation of strong and repeatable cryptographic keys has gained enormous popularity among researchers. The unpredictability of the user's biometric features, incorporated into the generated cryptographic key, makes the key unguessable to an attacker lacking noteworthy knowledge of the user's biometrics. Nevertheless, if a person's biometric is lost once, it will be compromised forever as it is inherently associated with the user. To overcome the above, cancelable biometrics has been proposed as an effective solution for canceling and re-issuing biometric templates. Here, we propose an innovative and efficient approach to generate a non-invertible cryptographic key from cancelable fingerprint templates. Initially, a one-way transformation is applied on the minutiae points extracted from the fingerprints, to attain a set of transformed points. Subsequently, the transformed points are made use of to form cancelable templates. The cancelable fingerprint templates are then utilized to generate a unique non-invertible key. As the cryptographic key generated is non-invertible, it is highly infeasible to acquire the cancelable fingerprint templates or the original fingerprint from the generated key. The effectiveness of the proposed approach is demonstrated by making use of fingerprints accessible from public sources.
作者:
Prasanth, VenugopalHari Prasad, R.Soman, K.P.IV B.tech EEE
Amrita Vishwa Vidyapeetham Coimbatore TamilNadu-641105 India CEN
Centre for Excellence in Computational Engineering and Networking Amrita Vishwa Vidyapeetham Coimbatore TamilNadu-641105 India
Modernization of Indian railways has always been a question in focus for the development of the basic infrastructure of our country. Since the railways represent one of the best modes of transport available to the com...
详细信息
Daubechies & Lagarias algorithm gave the first proof regarding the convergence of the iterations producing the scaling and wavelet functions. The proof however uses advance concepts from linear algebra. Incidental...
详细信息
This paper describes polynomial kernel subspace approach to Isolated Word Recognition (IWR) systems. Linear Predictive Coding (LPC) coefficients derived from wavelet sub-bands of speech frame were used as features. Th...
详细信息
ISBN:
(纸本)9781424451043
This paper describes polynomial kernel subspace approach to Isolated Word Recognition (IWR) systems. Linear Predictive Coding (LPC) coefficients derived from wavelet sub-bands of speech frame were used as features. This approach represents mapping of speech features (input space) into a feature space via a non-linear mapping onto the principal components called Kernel Linear Discriminant Analysis (KLDA). The non-linear mapping between the input space and the feature space is implicitly performed using the kernel-trick. This nonlinear mapping using KLDA increases the discrimination ability of a pattern classifier. The use of Wavelet sub-band based LPC features (WLPC) provide low dimensional features which reduce the memory requirement and KLDA provides the fast classification and recognition. Experimental results obtained on isolated word database show that the proposed technique is computationally efficient and performs well with less training data.
Before the web, a strike tended to be between two parties and the communication rules for such crises were clear: the employer funneled all messages through a single spokesperson to maintain control of its image while...
详细信息
ISBN:
(纸本)9783642027734
Before the web, a strike tended to be between two parties and the communication rules for such crises were clear: the employer funneled all messages through a single spokesperson to maintain control of its image while the union focused most of its efforts on maintaining the morale and commitment of its membership. The web enlarges the audiences for a strike and allows stakeholders to build coalitions against both sides. During a faculty strike at Acadia University in 2007, student stakeholders developed their own online channels of communication to respond to faculty and administration actions. While the professors walked the picket line and the administrators remained cloistered in University Hall, a lively discourse was taking place on the web in student blogs, facebook groups, and You-Tube. This reaction to this strike shows how new media can empower outsiders to make sense of events and organize themselves to put pressure on official social structures. In addition, it demonstrates the power of Millennial students to force others to take their views into account.
An adaptive frequency hopping (AFH) scheme can increase the interference rejection capability of the frequency hopping system, which adopt digital signal processing technology, so it is proposed in military communicat...
详细信息
Traditional TCP variants use packet loss as the indicator of congestion and reduce the congestion windows size, which results in degradation of TCP throughput. Subsequently, ECN is widely used to send the congestion f...
详细信息
ISBN:
(纸本)9781424436927
Traditional TCP variants use packet loss as the indicator of congestion and reduce the congestion windows size, which results in degradation of TCP throughput. Subsequently, ECN is widely used to send the congestion feedback to end hosts by couple with A OM on routers. Based on the TCP fluid model under ECN mechanism, an enhancement over wired/wireless hybrid networks, WECN is analyzed. The contribution of this paper is to implement WECN in Linux and combine it with TCP Reno, TCP Westwood in testbed. The results show that WECN can be extended to current TCP variants and can improve TCP throughput in lossy links.
A scheme is promoted which builds a water-saving irrigation system based on wireless sensor network and fuzzy control technology, we design a wireless sensor network, which consists of sensor node cluster, coordinator...
详细信息
ISBN:
(纸本)9781424436927
A scheme is promoted which builds a water-saving irrigation system based on wireless sensor network and fuzzy control technology, we design a wireless sensor network, which consists of sensor node cluster, coordinator node and irrigation controller nodes Here sensor node cluster is responsible for gathering information such as soil moisture and regularly send it to the coordinator node. Fuzzy controller embedded in the coordinator node takes soil moisture error and error change rate as its input and obtained water demand amount of crops under certain soil moisture through fuzzy inference and fuzzy judge and output it to irrigation controller node. Irrigation controller node controls the implementation of automatic watering. In this article, we describe the implementation scheme of sensor network node and fuzzy controller in detail and design communication protocol for sensor nodes. The experimental results show that the system can quickly and accurately calculate water demand amount of crops, which can provide a scientific basis for water-saving irrigation. In this way, we have made an exploratory study in applying wireless sensor networks and fuzzy control technology to fine agriculture project.
暂无评论