Low power and lossy networks have been an active area of research due to their large number of potential applications in different environments like health, environment monitoring and entertainment domain. Numbers of ...
详细信息
Low power and lossy networks have been an active area of research due to their large number of potential applications in different environments like health, environment monitoring and entertainment domain. Numbers of protocols have been proposed for routing in these networks using metrics like hop count, delay, bandwidth etc. The working group of IETF has done one major contribution in form of a proactive gradient based routing protocol for low power and lossy networks (RPL). However, for a network having few mobile sinks calculating gradients using proactive approach is costly in terms of energy. This paper proposes a hybrid routing protocol for wireless sensor networks with mobile sinks. It proposes a combination of reactive and proactive approach to enhance RPL for efficiently handling movement of multiple sinks. DAGs are only maintained by nodes close to the sink within a certain zone. While the nodes outside the zone use on demand sink discovery to find the closest possible sink, without maintaining DAG. The frequency of zone creation messages and zone sizes can increase or decrease depending on the speed of sink. This helps to decrease the number of retransmissions resulting in low standing cost for maintain DAGs and enhances the network life time especially under average or high mobility of sink.
Given a specification language, this paper discusses an iterative procedure for the computation of the supremal sublanguage, that possesses a conjunction of certain closed-loop properties, including controllability, n...
详细信息
Given a specification language, this paper discusses an iterative procedure for the computation of the supremal sublanguage, that possesses a conjunction of certain closed-loop properties, including controllability, normality and completeness. The iteration is stated in terms of (i) supremal sublanguage operators for each individual property, (ii) prefix-closures, and, (iii) language intersections. Within the iteration, the individual supremal sublanguage operators are only applied on prefix-closed languages, while the overall specification is not required to be prefix-closed. Our main result establishes finite convergence, provided that all parameters are regular.
This paper proposes a reliable wildfire monitoring system based on a wireless sensor network (WSN) sparsely deployed in adverse conditions. The physical environment under consideration is characterized by asymmetric, ...
详细信息
This paper proposes a reliable wildfire monitoring system based on a wireless sensor network (WSN) sparsely deployed in adverse conditions. The physical environment under consideration is characterized by asymmetric, irregular, and unreliable wireless links, inadequate Fresnel zone clearance, and routing problems, to name a few. We use reliable communication schemes on a fault-tolerant network topology, where sensory data are guaranteed to reach the base station with organized data storage and real-time visualization. Our approach has been validated experimentally for the case of peat-forest wildfire in southern Borneo where the fire breaks out frequently.
Ambient Assisted Living (AAL) aims at providing unobtrusive support to frail and elderly people for their daily life based on their context and situation. To this end, systems and services are required which are user-...
详细信息
Ambient Assisted Living (AAL) aims at providing unobtrusive support to frail and elderly people for their daily life based on their context and situation. To this end, systems and services are required which are user-centric and adaptable towards the needs and capabilities of the people in need of care. The continuous integration of leading-edge technologies, such as cloud and wireless communication technologies, in the context of the Internet of the Things (IoT), can meet this requirement by enabling a new form of communication between frail and elderly people, their environment and relevant groups of care givers. However, for IoT-based systems to reach their full potential, sound answers need to be provided to the important security questions arisen, particularly those regarding authentication of entities (people and environmental objects) and data privacy. This paper presents a system based on Gateways (GW) that aggregate health sensor data and resolve security issues through digital certificates and PKI data encryption.
There has been a considerable advance in computing, to mimic the way in which the brain tries to comprehend and structure the information to retrieve meaningful knowledge. It is identified that neuronal entities hold ...
详细信息
ISBN:
(纸本)9789898565303
There has been a considerable advance in computing, to mimic the way in which the brain tries to comprehend and structure the information to retrieve meaningful knowledge. It is identified that neuronal entities hold whole of the knowledge that the species makes use of. We intended to develop a modified knowledge based system, termed as Informledge System (ILS) with autonomous nodes and intelligent links that integrate and structure the pieces of knowledge. We conceive that every piece of knowledge is a cluster of cross-linked and correlated structure. In this paper, we put forward the theory of the nodes depicting concepts, referred as Entity Concept State which in turn is dealt with Concept State Diagrams (CSD). This theory is based on an abstract framework provided by the concepts. The framework represents the ILS as the weighted graph where the weights attached with the linked nodes help in knowledge retrieval by providing the direction of connectivity of autonomous nodes present in knowledge thread traversal. Here for the first time in the process of developing Informledge, we apply tenor computation for creating intelligent combinatorial knowledge with cross mutation to create fresh knowledge which looks to be the fundamentals of a typical thought process.
Background:The occurrences of missing data in software project data set bring significant impact on effort *** significant impacts of this problem are wasted information and biased *** common studies conducted to inve...
详细信息
Background:The occurrences of missing data in software project data set bring significant impact on effort *** significant impacts of this problem are wasted information and biased *** common studies conducted to investigate in dept. this area is to find sophisticated missing imputation techniques but there are only small numbers of research questioning the quality of ***:This paper aims to systematically analyze researches done on missing data imputation techniques to estimate software effort and review the current approaches exist in the ***:We performed a systematic literature of empirical studies of data imputation techniques published in from 2000-2012.
In the last years there has been a growing interest in software-defined radio communication systems (SDR). SDR technologies are attractive for communication systems because of their reconfigurable capabilities. Due to...
详细信息
ISBN:
(纸本)9781457705564
In the last years there has been a growing interest in software-defined radio communication systems (SDR). SDR technologies are attractive for communication systems because of their reconfigurable capabilities. Due to the complexity of real scenarios, usually characterized by multipath propagation and heterogeneous interfering sources, the antenna plays a key role. It is demonstrated by literature that the use of reconfigurable antennas (known also as smart antennas) could dramatically improve system performance. In this paper, we propose a compact and low-cost antenna array, based on microchip antennas, which will be integrated with a low-cost GNU-radio SDR testbed. The proposed antenna reconfigures its radiation characteristics, turning on/off the array elements, by means of radio frequency (RF) switches. The antenna is software controlled by means of a suitable optimization technique that maximizes the signal-to-noise ratio (SNR). Test results can prove the capability of the proposed antenna to improve the performance of SDR telecommunication systems in terms of increased SNR and reduced bit error rate.
The optimal allocation of power and subcarrier resources in Orthogonal Frequency Division Multiple Access (OFDMA) systems represents a hot topic widely dealt with in literature, given the need to balance the tradeoff ...
详细信息
ISBN:
(纸本)9781457705564
The optimal allocation of power and subcarrier resources in Orthogonal Frequency Division Multiple Access (OFDMA) systems represents a hot topic widely dealt with in literature, given the need to balance the tradeoff between efficiency and fairness. Current state-of-the-art solutions are suboptimal. Indeed, efficiency often privileges users that can exploit favorable channel conditions, while fairness ignores the notion that different users might have different requirements. In this paper, we propose a balanced OFDMA Radio Resource Management (RRM) strategy targeted at maximizing the Quality-of-Experience (QoE), rather than Quality-of-Service (QoS). The proposed RRM is inspired by Game Theory and aims at maximizing the application-oriented Mean-Opinion Score (MOS). The proposed work is intended to go beyond the state-of-the-art by enabling flexibility and dynamicity through re-allocation of resources utilized by those users strongly disadvantaged by adverse channel conditions. The radio resources "wasted" by such users (not able to reach the required QoE level) can be reassigned to the remaining users in order to increase their MOS metrics. Preliminary results showed a sensible QoE increase for the users' population after the radio resource redistribution, in particular for low signal-to-noise ratios and larger number of users.
Victim cache can buffer blocks discarded from the cache on a miss before going to the next lower-level memory to improve performance. Compared with the previous work, rather than only improve performance, we design a ...
详细信息
ISBN:
(纸本)9781467330848
Victim cache can buffer blocks discarded from the cache on a miss before going to the next lower-level memory to improve performance. Compared with the previous work, rather than only improve performance, we design a modified victim cache to reduce power consumption by minimizing accesses to L2 cache, miss rate, and miss penalty in this paper. With the help of this new victim cache, we can turn on/off cache block in a software way to save power and improve performance. The proposed approach can analyze an application, perform scheduling, and then insert the instrumention instructions in the code to control victim cache. The results shows that the proposed approach can improve performance about 6.5%, reduce 32.66% of cache miss, and save 4.19% of power consumption with 2k direct-mapped cache at the cost only of 1.9% code expansion on average.
Pervasive healthcare applications utilizing body sensor networks generate a vast amount of data that need to be managed and stored for processing and future usage. Cloud computing among with the Internet of Things (Io...
详细信息
ISBN:
(纸本)9781467313285
Pervasive healthcare applications utilizing body sensor networks generate a vast amount of data that need to be managed and stored for processing and future usage. Cloud computing among with the Internet of Things (IoT) concept is a new trend for efficient managing and processing of sensor data online. This paper presents a platform based on Cloud Computing for management of mobile and wearable healthcare sensors, demonstrating this way the IoT paradigm applied on pervasive healthcare.
暂无评论