Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378208
Vandna Sikarwar, Vijayshri Chaurasia, J. S. Yadav, Yashwant Kurmi
Recent studies suggest that cells make stochastic choices with respect to differentiation or division. The effect of molecule concentration on cell division rate is analysed in this work. However, the molecular mechanism underlying such stochasticity is unknown. Here, we computationally model the effects of molecule concentration (acts as noise) on the Hes1/miR-9 oscillator. Consequences of low molecular numbers of interacting species are determined experimentally by the researchers. We report that increased stochasticity spreads the timing of differentiation in a population, such that initially equivalent cells differentiate over a period of time. Surprisingly, inherent stochasticity also increases the robustness of the progenitor state and lessens the impact of unequal, random distribution of molecules at cell division on the temporal spread of differentiation at the population level. This advantageous use of biological noise contrasts with the view that noise needs to be counteracted.
{"title":"Stochastic model analysis for Hes1/MiR-9 brain cell division system","authors":"Vandna Sikarwar, Vijayshri Chaurasia, J. S. Yadav, Yashwant Kurmi","doi":"10.1109/RISE.2017.8378208","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378208","url":null,"abstract":"Recent studies suggest that cells make stochastic choices with respect to differentiation or division. The effect of molecule concentration on cell division rate is analysed in this work. However, the molecular mechanism underlying such stochasticity is unknown. Here, we computationally model the effects of molecule concentration (acts as noise) on the Hes1/miR-9 oscillator. Consequences of low molecular numbers of interacting species are determined experimentally by the researchers. We report that increased stochasticity spreads the timing of differentiation in a population, such that initially equivalent cells differentiate over a period of time. Surprisingly, inherent stochasticity also increases the robustness of the progenitor state and lessens the impact of unequal, random distribution of molecules at cell division on the temporal spread of differentiation at the population level. This advantageous use of biological noise contrasts with the view that noise needs to be counteracted.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378156
Arshi Khan, P. Agrawal, Himanshu Sainthiya
The image fusion plays a crucial role in many fields such as remote sensing, medical and robotics applications. This paper is focused on image fusion of images of different focus depth. The aim is to study these concepts and provide simulations and evaluations on various implementations. When performing image fusion the images are decomposed by bi-dimensional Empirical mode decomposition (BEMD) to obtain high frequency coefficients which is used to determine which parts of the input images that makes it into the fused image. The same technique is tested on images of different modality. In this thesis, a novel bi-dimensional Empirical mode decomposition (BEMD) based image fusion scheme is proposed. The BEMD decomposes the source images into intrinsic mode functions (IMFs) and residual components. IMF components of the first signal in the decomposition of the source images are used to generate the fused images using appropriate fusion rule. Performance evaluation of fused images is done by computing fusion quality metrics and the fusion results are compared with other existing fusion schemes. It is seen that the performance of the proposed scheme is better as compared with the existing fusion schemes.
{"title":"Bidimentional emphirical mode decomposition based image fusion","authors":"Arshi Khan, P. Agrawal, Himanshu Sainthiya","doi":"10.1109/RISE.2017.8378156","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378156","url":null,"abstract":"The image fusion plays a crucial role in many fields such as remote sensing, medical and robotics applications. This paper is focused on image fusion of images of different focus depth. The aim is to study these concepts and provide simulations and evaluations on various implementations. When performing image fusion the images are decomposed by bi-dimensional Empirical mode decomposition (BEMD) to obtain high frequency coefficients which is used to determine which parts of the input images that makes it into the fused image. The same technique is tested on images of different modality. In this thesis, a novel bi-dimensional Empirical mode decomposition (BEMD) based image fusion scheme is proposed. The BEMD decomposes the source images into intrinsic mode functions (IMFs) and residual components. IMF components of the first signal in the decomposition of the source images are used to generate the fused images using appropriate fusion rule. Performance evaluation of fused images is done by computing fusion quality metrics and the fusion results are compared with other existing fusion schemes. It is seen that the performance of the proposed scheme is better as compared with the existing fusion schemes.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132234940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378154
Pawan Dubey, T. Kanumuri, Ritesh Vyas
Proposed work aims to explore the discrimination capability of palmprint using Binary Wavelet Transform (BWT). As BWT transform is able to cluster the energy corresponding the edge location so, it can better represent the edges of the bit planes in its sub-bands. Firstly, a gray scale palmprint image is transformed into bit planes and then most significant of these bit planes are transformed through BWT. Further, micro and macro pattern histograms are extracted using Local Binary Pattern (LBP) from different transformed bit planes, and concatenated to form the feature vector. Experimental results validate that proposed approach is effective in terms of Genuine acceptance rate (GAR) of 98.71%.
{"title":"Palmprint recognition using binary wavelet transform and LBP representation","authors":"Pawan Dubey, T. Kanumuri, Ritesh Vyas","doi":"10.1109/RISE.2017.8378154","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378154","url":null,"abstract":"Proposed work aims to explore the discrimination capability of palmprint using Binary Wavelet Transform (BWT). As BWT transform is able to cluster the energy corresponding the edge location so, it can better represent the edges of the bit planes in its sub-bands. Firstly, a gray scale palmprint image is transformed into bit planes and then most significant of these bit planes are transformed through BWT. Further, micro and macro pattern histograms are extracted using Local Binary Pattern (LBP) from different transformed bit planes, and concatenated to form the feature vector. Experimental results validate that proposed approach is effective in terms of Genuine acceptance rate (GAR) of 98.71%.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378170
M. Ahmed
Installed Onboard cameras considering cases of off road unmanned navigating ground vehicles experience severe jitter and vibration. This leads to the prerequisite that the video images acquired from these platforms need to be heavily preprocessed to eliminate the jitter induced variations before human analysis. Digital Video stabilization system is the process of using electronic processing to control the image stability. That is, only software algorithms are used rather than hardware components such as motion sensors, actuators or floating lenses to compensate the disturbances. This makes digital stabilization more portable and cost effective among other methods. Digital stabilization can be used for real time and offline applications if the algorithms are optimized. This literature discusses the state of the art in the field of DVS with an implementation aspect of its use in challenging environment of unmanned ground vehicles where due to the dynamic nature of the vehicle, vibrations and oscillations are affect the camera resulting in a shaky and unstable video feed.
{"title":"Digital video stabilization-review with a perspective of real time implemention","authors":"M. Ahmed","doi":"10.1109/RISE.2017.8378170","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378170","url":null,"abstract":"Installed Onboard cameras considering cases of off road unmanned navigating ground vehicles experience severe jitter and vibration. This leads to the prerequisite that the video images acquired from these platforms need to be heavily preprocessed to eliminate the jitter induced variations before human analysis. Digital Video stabilization system is the process of using electronic processing to control the image stability. That is, only software algorithms are used rather than hardware components such as motion sensors, actuators or floating lenses to compensate the disturbances. This makes digital stabilization more portable and cost effective among other methods. Digital stabilization can be used for real time and offline applications if the algorithms are optimized. This literature discusses the state of the art in the field of DVS with an implementation aspect of its use in challenging environment of unmanned ground vehicles where due to the dynamic nature of the vehicle, vibrations and oscillations are affect the camera resulting in a shaky and unstable video feed.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132316816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378194
H. Banga, Dheeraj Agarwal
Memories are the integral part of digital circuits thus power consumption of memory should be kept in consideration while designing the circuits. Memories should consume less power to improve system performance, stability, and efficiency. Earlier standard CMOS 6T SRAM cell was used which has two bit lines and a word line for both read and write operation. During the read operation stability decreases as the voltage is divided between access and driver transistors. In this paper new 10T SRAM with dynamic feedback control is proposed, which uses single bit line for both read and write operation. Power consumption reduces as single bit line is used and for both read and write operation and stability increases when compared with standard 6T SRAM. Proposed cell also show high static noise margin (SNM). The proposed 10T SRAM when compared with conventional 6T SRAM in terms of power consumed, delays, and SNM. The proposed 10 SRAM cells consume 83.27 % less power for write ‘0’ operation, 85.9 % less power for write 1 operation and delay increase for proposed 10T SRAM cell when compared with standard 6T SRAM cell. The proposed cell has 4.9 times SNM when compared with 6T SRAM. Using Cadence Virtuoso ADE with 180nm technology is used to draw schematics and simulation is carried out.
{"title":"Single bit-line 10T SRAM cell for low power and high SNM","authors":"H. Banga, Dheeraj Agarwal","doi":"10.1109/RISE.2017.8378194","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378194","url":null,"abstract":"Memories are the integral part of digital circuits thus power consumption of memory should be kept in consideration while designing the circuits. Memories should consume less power to improve system performance, stability, and efficiency. Earlier standard CMOS 6T SRAM cell was used which has two bit lines and a word line for both read and write operation. During the read operation stability decreases as the voltage is divided between access and driver transistors. In this paper new 10T SRAM with dynamic feedback control is proposed, which uses single bit line for both read and write operation. Power consumption reduces as single bit line is used and for both read and write operation and stability increases when compared with standard 6T SRAM. Proposed cell also show high static noise margin (SNM). The proposed 10T SRAM when compared with conventional 6T SRAM in terms of power consumed, delays, and SNM. The proposed 10 SRAM cells consume 83.27 % less power for write ‘0’ operation, 85.9 % less power for write 1 operation and delay increase for proposed 10T SRAM cell when compared with standard 6T SRAM cell. The proposed cell has 4.9 times SNM when compared with 6T SRAM. Using Cadence Virtuoso ADE with 180nm technology is used to draw schematics and simulation is carried out.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378168
Daljeet Kaur Kalsi, P. Rai
During the past few years, digital image forgery detection system has been received a significant attention in the field of analyzing and understanding digital images. A copy-move forgery is introduced in images by copying a part of an image and put it in the same image or in the other image. In this paper, we proposed a system that detects a copy-move forgery in the images. The method involves feature extraction, feature matching, and duplicate block identification. In this paper, AILBP (Approximation image local binary pattern) method is being applied for feature extraction. The number of experiments is initiated on a standard standalone image. The experimental results indicate that the proposed system is effective enough to give high performance in terms of speed and accuracy.
{"title":"A copy-move forgery detection system using approximation image local binary pattern","authors":"Daljeet Kaur Kalsi, P. Rai","doi":"10.1109/RISE.2017.8378168","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378168","url":null,"abstract":"During the past few years, digital image forgery detection system has been received a significant attention in the field of analyzing and understanding digital images. A copy-move forgery is introduced in images by copying a part of an image and put it in the same image or in the other image. In this paper, we proposed a system that detects a copy-move forgery in the images. The method involves feature extraction, feature matching, and duplicate block identification. In this paper, AILBP (Approximation image local binary pattern) method is being applied for feature extraction. The number of experiments is initiated on a standard standalone image. The experimental results indicate that the proposed system is effective enough to give high performance in terms of speed and accuracy.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115474895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378213
A. Ukey, M. Chawla
Rendezvous of cognitive radios on commonly available channels is fundamental and crucial phenomena in the formation of cognitive radio networks (CRNs). Rendezvous enables secondary users (SUs) to detect the presence of each other and establish communication links between them. The diversity in free available channels sensed by the SUs and non-awareness of the presence of SUs before rendezvous make the rendezvous process a non-trivial task. Assigning a channel as a common control channel (CCC) for all SUs is not feasible in the dynamic environment of CRNs since SUs may have diverse available channels that change with time and location. Hence, channel hopping (CH) technique often referred as blind rendezvous is more preferred in CRNs. In this paper, we present a unique identity based channel hopping (UID-CH) rendezvous algorithm that dynamically manipulate the unique identity of SUs and constructs the CH sequence on the top of available channels rather than the total potential licensed channels. The gist of the algorithm lies on hopping and waiting phenomena of SUs in a circular manner such that if one SU hops on available channels and the other SU waits on a particular channel then rendezvous can be guaranteed by the time first SU completes a round. Theoretical analysis and simulation experiments show that the UID-CH algorithm provides rendezvous guarantee in finite time without explicit requirement of time synchronization and performs well in distributed dynamic environment of CRNs.
认知无线电在共同可用信道上的交会是认知无线电网络形成过程中的基本和关键现象。会合使次要用户(su)能够检测彼此的存在并在它们之间建立通信链接。单元感知的空闲可用信道的多样性以及在集合前对单元存在的不感知使得集合过程成为一项不平凡的任务。在crn的动态环境中,分配一个通道作为所有su的公共控制通道(common control channel, CCC)是不可实现的,因为su可能有不同的可用通道,这些通道会随着时间和位置的变化而变化。因此,在crn中,信道跳变(CH)技术通常被称为盲交会技术。本文提出了一种基于唯一身份的信道跳(UID-CH)集合算法,该算法动态地操纵SUs的唯一身份,并在可用信道而不是总潜在许可信道的顶部构造CH序列。该算法的要点在于以循环的方式利用节点间的跳变和等待现象,如果一个节点在可用的信道上跳变,而另一个节点在特定的信道上等待,那么在第一个节点完成一轮的时候就可以保证会合。理论分析和仿真实验表明,该算法在没有明确时间同步要求的情况下,提供了有限时间内的交会保证,在crn的分布式动态环境下具有良好的性能。
{"title":"Unique-ID based channel hopping rendezvous algorithm for cognitive radio ad hoc networks","authors":"A. Ukey, M. Chawla","doi":"10.1109/RISE.2017.8378213","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378213","url":null,"abstract":"Rendezvous of cognitive radios on commonly available channels is fundamental and crucial phenomena in the formation of cognitive radio networks (CRNs). Rendezvous enables secondary users (SUs) to detect the presence of each other and establish communication links between them. The diversity in free available channels sensed by the SUs and non-awareness of the presence of SUs before rendezvous make the rendezvous process a non-trivial task. Assigning a channel as a common control channel (CCC) for all SUs is not feasible in the dynamic environment of CRNs since SUs may have diverse available channels that change with time and location. Hence, channel hopping (CH) technique often referred as blind rendezvous is more preferred in CRNs. In this paper, we present a unique identity based channel hopping (UID-CH) rendezvous algorithm that dynamically manipulate the unique identity of SUs and constructs the CH sequence on the top of available channels rather than the total potential licensed channels. The gist of the algorithm lies on hopping and waiting phenomena of SUs in a circular manner such that if one SU hops on available channels and the other SU waits on a particular channel then rendezvous can be guaranteed by the time first SU completes a round. Theoretical analysis and simulation experiments show that the UID-CH algorithm provides rendezvous guarantee in finite time without explicit requirement of time synchronization and performs well in distributed dynamic environment of CRNs.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126203164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378229
Vivekanand, B. Kumar
In this paper, we have studied and analyzed the performance of melody extraction algorithm for different genre of music especially in noisy environment. The algorithm based salience function and pitch contour characteristics is used for extracting the melody. The parameter Frequency Estimation Error (FEE) is taken for evaluating the performance of melody extraction algorithm. Also, their performance is evaluated for various musical genres such as JAZZ, MIDI, POP and OPERA MALE for comparison purpose. We have also shown how final melodicline in polyphonic mixture for different SNR values will look like in case of different musical genre.
{"title":"Melody extraction in noisy Musicof different genre","authors":"Vivekanand, B. Kumar","doi":"10.1109/RISE.2017.8378229","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378229","url":null,"abstract":"In this paper, we have studied and analyzed the performance of melody extraction algorithm for different genre of music especially in noisy environment. The algorithm based salience function and pitch contour characteristics is used for extracting the melody. The parameter Frequency Estimation Error (FEE) is taken for evaluating the performance of melody extraction algorithm. Also, their performance is evaluated for various musical genres such as JAZZ, MIDI, POP and OPERA MALE for comparison purpose. We have also shown how final melodicline in polyphonic mixture for different SNR values will look like in case of different musical genre.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126004130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378155
Shuchi Agarwal, J. Bisht
Improved Binary exploitation modification direction steganographic technique to hide data behind digital images is proposed to increase security of data in communication system. Modification is made in binary power data hiding scheme which results in major improvements in values of PSNR and MSE which increases the stego image quality.
{"title":"Improved BEMD data hiding scheme: Data hiding binary exploitation modification direction scheme using image steganography","authors":"Shuchi Agarwal, J. Bisht","doi":"10.1109/RISE.2017.8378155","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378155","url":null,"abstract":"Improved Binary exploitation modification direction steganographic technique to hide data behind digital images is proposed to increase security of data in communication system. Modification is made in binary power data hiding scheme which results in major improvements in values of PSNR and MSE which increases the stego image quality.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378140
Ali Al-Dahoud, Rayene Doghmane, M. Fezari, Karima Boukari
In this paper, we present a comparative study on the main faults in a Wireless Sensor Networks (WSN) system. The applications using this new technology have recently been increased due to its huge capacity to connect both the physical and the virtual worlds. WSNs allow assessing locations, which are technically hard to reach by robots or human. With Cloud computing added to the WSN, we expect to see a world covered with trillions of connected devices that sense and share data information with each other. However, many parts of the deployments experience high rates of failure due to node's damage, sensor's damage, RF communication and usually power failure. In this paper, we mentioned existing research works that deal with failure detection in the WSN. Eventually, we presented a comparative case-study of model-based approaches used for failure detection. We also mentioned popular simulation environments used for WSNs. And finally, we showed a case-based simulation using NS-2. This work can be a good survey on Wireless Sensor Network main failures.
{"title":"Failure detection on wireless sensor network based on comparative study","authors":"Ali Al-Dahoud, Rayene Doghmane, M. Fezari, Karima Boukari","doi":"10.1109/RISE.2017.8378140","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378140","url":null,"abstract":"In this paper, we present a comparative study on the main faults in a Wireless Sensor Networks (WSN) system. The applications using this new technology have recently been increased due to its huge capacity to connect both the physical and the virtual worlds. WSNs allow assessing locations, which are technically hard to reach by robots or human. With Cloud computing added to the WSN, we expect to see a world covered with trillions of connected devices that sense and share data information with each other. However, many parts of the deployments experience high rates of failure due to node's damage, sensor's damage, RF communication and usually power failure. In this paper, we mentioned existing research works that deal with failure detection in the WSN. Eventually, we presented a comparative case-study of model-based approaches used for failure detection. We also mentioned popular simulation environments used for WSNs. And finally, we showed a case-based simulation using NS-2. This work can be a good survey on Wireless Sensor Network main failures.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}