The proceedings contain 117 papers. The topics discussed include: CSMA-MAC performance evaluation for WSN applications;distributed source coding for sensor data model and estimation of cluster head errors using Bayesi...
ISBN:
(纸本)9780769536699
The proceedings contain 117 papers. The topics discussed include: CSMA-MAC performance evaluation for WSN applications;distributed source coding for sensor data model and estimation of cluster head errors using Bayesian and K-near neighborhood classifiers in deployment of dense wireless sensor networks;on the relationship between network congestion and local contention in IEEE 802.15.4 based networks;Zigbee based reconfigurable clustered home area network;Simulink modeling of the 802.15.4 physical layer for model-based design of wireless sensor networks;clustering with discrete power control in wireless sensor networks;an evaluation of the cost and energy consumption of security protocols in WSNs;mobility models for delay-tolerant mobile networks;and performance analysis of ZigBee-based wireless sensor networks with path-constrained mobile sink(s).
WSNs have been impressive progress in recent years and target tracking is one of the most important applications in wireless sensor networks. Clustering is one of the efficient methods for target tracking application ...
详细信息
ISBN:
(纸本)9781479979851
WSNs have been impressive progress in recent years and target tracking is one of the most important applications in wireless sensor networks. Clustering is one of the efficient methods for target tracking application that has ability of scalability and flexibility. In wireless sensor networks with limited recourses, energy is a challenging problem. Thus, energy is very important factor and also the other important factor is tracking accuracy in target tracking applications, thus for designing algorithm the trade-off between energy and tracking accuracy should be considered. In this research we propose an energy efficient cluster based target tracking method by using boundary static clusters (BCTT). The simulation results achieved using the Castalia simulator shows that, BCTT has 48% decreases in average energy consumption compared with hybrid method (HCTT, HCMTT).
The proceedings contain 50 papers. The special focus in this conference is on Various Aspects of Information technologies. The topics include: Development of a bidirectional transformation supporting tool for formaliz...
ISBN:
(纸本)9783662474860
The proceedings contain 50 papers. The special focus in this conference is on Various Aspects of Information technologies. The topics include: Development of a bidirectional transformation supporting tool for formalization with logical formulas and its application;automated theorem finding by forward reasoning based on strong relevant logic;a discovery support scheme for inter-domain DDS gateways in cyber-physical systems;the disaster rescue robot design and implementation using open source;the direct and indirect effects of perceived usability of Smartphone applications on user satisfaction;a new query integrity verification method for encrypted data in database outsourcing;possibility of using embedded sensors of smart devices for augmented reality application;economic and technological aspects of social networks in European business sector;decision making criteria for cloud computing deployment;periocular recognition based on LBP method and matching by bit-shifting;reduced reference quality metric for depth images;sustainable operation algorithm for high availability with integrated desktop storage based on virtualization;analysis on temporal sparsity of human face for various emotion stimuli;method of path computation using national research network federation;smart virtual lab using hand gestures;result verification scheme with resource clustering in desktop grids;embedding data into audio signal by combining sliding window technique with a novel marking bit method;performance comparison for CFDP NAK modes in deep space communications;a fire evacuation guidance system based on ubiquitous sensor networks and stage image control system using visual tracking.
The generation of acoustic images is an important task in area of acoustic monitoring. A wide range of applications is associated to the task of detection and processing of non-stationary random Wiener acoustic signal...
详细信息
Creating and animating a realistic 3D human face is an important task in computer graphics. The capability of capturing the 3D face of a human subject and reanimate it quickly will find many applications in games, tra...
详细信息
ISBN:
(纸本)9781450336369
Creating and animating a realistic 3D human face is an important task in computer graphics. The capability of capturing the 3D face of a human subject and reanimate it quickly will find many applications in games, training simulations, and interactive 3D graphics. We demonstrate a system to capture photorealistic 3D faces and generate the blendshape models automatically using only a single commodity RGB-D sensor. Our method can rapidly generate a set of expressive facial poses from a single depth sensor, such as a Microsoft Kinect version 1, and requires no artistic expertise in order to process those scans. The system takes only a matter of seconds to capture and produce a 3D facial pose and only requires a few minutes of processing time to transform it into a blendshape-compatible model. Our main contributions include an end-to-end pipeline for capturing and generating face blendshape models automatically, and a registration method that solves dense correspondences between two face scans by utilizing facial landmarks detection and optical flows. We demonstrate the effectiveness of the proposed method by capturing different human subjects and puppeteering their 3D faces in an animation system with real-time facial performance retargeting.
sensor-Cloud is an emerging technology and popular paradigm of choice in systems development for various real-life applications. It consists in integrating wireless sensor networks with cloud computing environment. In...
详细信息
sensor-Cloud is an emerging technology and popular paradigm of choice in systems development for various real-life applications. It consists in integrating wireless sensor networks with cloud computing environment. In fact, the cloud provides new opportunities of massive data storage, processing and analysing that wireless sensor networks can not offer. Despite the fact that the cloud have helped to overcome many wireless sensor networks limitations, there are other challenging issues that need to be addressed. The major problem that can significantly affect sensor-Cloud performance is the short lifetime due to limited energy supply of sensors and sometimes some sinks. In this work, we propose a sensor-Cloud Optimization problem (SCL-OPT) that maximizes lifetime as well as increases energy efficiency of sensors and sinks layers.
Advanced sensing techniques are key technologies required for the smart grid. Magnetic tunnel junction (MTJ) sensors hold great promises in the distributed linear current sensing, with small size, low price, and excel...
详细信息
Advanced sensing techniques are key technologies required for the smart grid. Magnetic tunnel junction (MTJ) sensors hold great promises in the distributed linear current sensing, with small size, low price, and excellent performances. In this paper, MTJ Wheatstone bridge sensors were fabricated, attaining a typical sensitivity of 4.94 mV/V/Oe with an offset of -2.84 mV/V. A contactless current sensor based on the MTJ sensor was designed and realized, achieving a sensitivity of 7.75 mV/A and an offset of -8.68 mV. We can adjust the sensitivity and the linear range of the sensor by changing the gap of the magnetic core, and make the sensor much less susceptible to electrical wire's location and orientation. This paper provides a practical current sensing technique for smart grid applications.
Wireless sensor Networks consist of small nodes with sensing, computation and wireless communication wireless capabilities. These Networks are used in many applications in military, ecological, and health-related area...
详细信息
ISBN:
(纸本)9781479960866
Wireless sensor Networks consist of small nodes with sensing, computation and wireless communication wireless capabilities. These Networks are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information therefore security is important in WSNs. Routing attacks can have devastating effect on wireless sensor Network and present a major challenge when designing security mechanisms. Sinkhole attack is the most destructive routing attack for these networks, it enable many other attack. In this type of attack sinkhole node tries to attract data to itself by convincing neighbors through broadcasting fake routing information. This paper present an AODV based secure routing algorithm based on mobile agent for detecting the malicious node in sinkhole attack. The algorithm detects sinkhole node by finding the difference of nodes sequence numbers using threshold value. It also shows performance evaluation of AODV with the enhanced secure routing algorithm and existing secure routing algorithm through simulations, which confirmed the effectiveness and accuracy of the algorithm by considering performance metrics as Throughput, PDR and Packet loss. Simulation is carried out using simulator NS2.
Wireless sensor Network (WSN) has been constantly emerging in the area of wireless communication system. Although Wireless sensor Network has explored its identity in various remote communication system right from env...
详细信息
Wireless sensor Network (WSN) has been constantly emerging in the area of wireless communication system. Although Wireless sensor Network has explored its identity in various remote communication system right from environmental monitoring, health monitoring, to industrial monitoring applications, but still the area is shrouded with some of the significant open issues. In the past decade, numerous attempts have been made to address the frequently occurring issues, but still the applicability of the solution are yet to be seen. This paper presents a state-of-art review of existing techniques of data fusion, which has not found its proportional significance compared to data aggregation among the research community. The paper discusses majority of the significant studies, in-depth analysis of their outcomes along with discussion of research gap at the end of the paper.
Resilience is the capability of a system to absorb and mitigate unexpected faults and risks. This paper describes a resilient middleware for sensor network management for supporting Situation Awareness in security sce...
详细信息
ISBN:
(纸本)9781467396073
Resilience is the capability of a system to absorb and mitigate unexpected faults and risks. This paper describes a resilient middleware for sensor network management for supporting Situation Awareness in security scenarios. The proposed middleware implements an approach based on two main approaches: Quality of Service and Artificial Bee Colony for identifying disturbances, incompleteness and uncertainty in raw data coming from physical sensors and reacting to them. In particular, an algorithm based on Artificial Bee Colony has been defined to discover association rules used to handle the absence of significant observations in the monitored environment and continue working and supporting higher architectural layers.
暂无评论