Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378124
Sanya Anees, M. Bhatnagar, Parasa Ram
In this work, we analyze the performance of decode-and-forward (DF) based triple-hop radio frequency-free space optical-radio frequency (RF-FSO-RF) communication system. The mixed RF-FSO-RF system derive application, where the FSO link can be used to provide high speed connectivity between the two RF networks. The RF links are characterized by Nakagami-m fading and the FSO link is characterized by path loss, Gamma-Gamma distributed turbulence and pointing errors. For this asymmetric triple hop communication system, new closed form mathematical expressions are obtained for statistical characteristics of end-to-end signal-to-noise ratio (SNR), i.e., cumulative distribution function and probability density function. Using these expressions, novel closed form expressions are derived for the outage probability and the average bit error rate of various modulation techniques. Numerical results show the effect of fading, turbulence, and pointing errors on the performance of the considered cooperative system.
{"title":"On the performance of DF based mixed triple-hop RF-FSO-RF cooperative system","authors":"Sanya Anees, M. Bhatnagar, Parasa Ram","doi":"10.1109/RISE.2017.8378124","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378124","url":null,"abstract":"In this work, we analyze the performance of decode-and-forward (DF) based triple-hop radio frequency-free space optical-radio frequency (RF-FSO-RF) communication system. The mixed RF-FSO-RF system derive application, where the FSO link can be used to provide high speed connectivity between the two RF networks. The RF links are characterized by Nakagami-m fading and the FSO link is characterized by path loss, Gamma-Gamma distributed turbulence and pointing errors. For this asymmetric triple hop communication system, new closed form mathematical expressions are obtained for statistical characteristics of end-to-end signal-to-noise ratio (SNR), i.e., cumulative distribution function and probability density function. Using these expressions, novel closed form expressions are derived for the outage probability and the average bit error rate of various modulation techniques. Numerical results show the effect of fading, turbulence, and pointing errors on the performance of the considered cooperative system.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378153
A. Deshpande, M. Subashini
As far as the safety of a driver is concerned, more focus should be put on correct interpretation and information which is conveyed by a traffic sign, while driving a vehicle along the road. A sign board can be thought of as an emblem which disseminates important and meaningful information regarding the potential hazards prevailing among road users comprising roadways cladded with snowfall, construction worksites or repairing of roads taking place and telling the people to follow an alternative route. It alerts the person who is passing through the road about the maximum possible extremity that his vehicle is trying to achieve indicating slowing down the speed of vehicle since chances of having collision cannot be ruled out. With constant increasing of the training database size, not only there cognition accuracy, but also the computation complexity should be considered in designing a feasible recognition approach. The traffic sign images were acquired from the image database and were subjected to some pre-processing techniques such as conversion of the original RGB images into HSV Color Space, Adjustment of the Contrast of the Color images as well as applying the Histogram of Oriented Gradients (HOG) algorithm in which the process of extraction and plotting of the HOG features from a given image is performed that is most popular amongst the feature extraction algorithms. In the future, we will concentrate on detecting, recognizing as well as classifying a particular sign board.
{"title":"A novel method for the extraction of primary visual features from an image through intelligent feature descriptors","authors":"A. Deshpande, M. Subashini","doi":"10.1109/RISE.2017.8378153","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378153","url":null,"abstract":"As far as the safety of a driver is concerned, more focus should be put on correct interpretation and information which is conveyed by a traffic sign, while driving a vehicle along the road. A sign board can be thought of as an emblem which disseminates important and meaningful information regarding the potential hazards prevailing among road users comprising roadways cladded with snowfall, construction worksites or repairing of roads taking place and telling the people to follow an alternative route. It alerts the person who is passing through the road about the maximum possible extremity that his vehicle is trying to achieve indicating slowing down the speed of vehicle since chances of having collision cannot be ruled out. With constant increasing of the training database size, not only there cognition accuracy, but also the computation complexity should be considered in designing a feasible recognition approach. The traffic sign images were acquired from the image database and were subjected to some pre-processing techniques such as conversion of the original RGB images into HSV Color Space, Adjustment of the Contrast of the Color images as well as applying the Histogram of Oriented Gradients (HOG) algorithm in which the process of extraction and plotting of the HOG features from a given image is performed that is most popular amongst the feature extraction algorithms. In the future, we will concentrate on detecting, recognizing as well as classifying a particular sign board.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128940687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378141
R. Sinhal, Kavita Singh, A. Shankar
The human body exhibits many vital signs, such as heart rate (HR) and respiratory rate (RR) used to assess fitness and health. Vital signs are typically measured by a trained health professional and may be difficult for individuals to accurately measure at home. Clinic visits are therefore needed with associated burdens of cost and time spent waiting in long queues. The widespread use of smart phones with video capability presents an opportunity to create non-invasive applications for assessment of vital signs. Over the past decade, several researchers have worked on assessing vital signs from video, including HR, RR and other parameters such as anemia and blood oxygen saturation (SpO2). This paper reviews the different image and video processing algorithms developed for vital signs assessment through non-contact methods, and outline the key remaining challenges in the field which can be used as potential research topics. The CHROM algorithm produces highest accuracy in detecting the signals from rPPG. There are different challenges of handling large database and motion stabilization which is not provided by any algorithm, this is main area of research in rPPG.
{"title":"Estimating vital signs through non-contact video-based approaches: A survey","authors":"R. Sinhal, Kavita Singh, A. Shankar","doi":"10.1109/RISE.2017.8378141","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378141","url":null,"abstract":"The human body exhibits many vital signs, such as heart rate (HR) and respiratory rate (RR) used to assess fitness and health. Vital signs are typically measured by a trained health professional and may be difficult for individuals to accurately measure at home. Clinic visits are therefore needed with associated burdens of cost and time spent waiting in long queues. The widespread use of smart phones with video capability presents an opportunity to create non-invasive applications for assessment of vital signs. Over the past decade, several researchers have worked on assessing vital signs from video, including HR, RR and other parameters such as anemia and blood oxygen saturation (SpO2). This paper reviews the different image and video processing algorithms developed for vital signs assessment through non-contact methods, and outline the key remaining challenges in the field which can be used as potential research topics. The CHROM algorithm produces highest accuracy in detecting the signals from rPPG. There are different challenges of handling large database and motion stabilization which is not provided by any algorithm, this is main area of research in rPPG.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378216
A. Saxena, S. Sinha, P. Shukla
Mobile ad hoc networks (MANET) is the most useful network in present and it is used in many application. In the MANET prevention concept is not sufficient from the security point of view, so the detection concept is added. Intrusion Detection System (IDS) is another concept to provide security in the network. Basically IDS is used to identify selfish and malevolent node in the network. Generally IDS concept is used in wired networks but incase of wireless network then it can no longer sufficient if we used it directly. Here we present the concept of MANET, IDS and we have discussed various existing IDS in MANET environment along with their pros and cons.
{"title":"A review on intrusion detection system in mobile ad-hoc network","authors":"A. Saxena, S. Sinha, P. Shukla","doi":"10.1109/RISE.2017.8378216","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378216","url":null,"abstract":"Mobile ad hoc networks (MANET) is the most useful network in present and it is used in many application. In the MANET prevention concept is not sufficient from the security point of view, so the detection concept is added. Intrusion Detection System (IDS) is another concept to provide security in the network. Basically IDS is used to identify selfish and malevolent node in the network. Generally IDS concept is used in wired networks but incase of wireless network then it can no longer sufficient if we used it directly. Here we present the concept of MANET, IDS and we have discussed various existing IDS in MANET environment along with their pros and cons.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125829285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378194
H. Banga, Dheeraj Agarwal
Memories are the integral part of digital circuits thus power consumption of memory should be kept in consideration while designing the circuits. Memories should consume less power to improve system performance, stability, and efficiency. Earlier standard CMOS 6T SRAM cell was used which has two bit lines and a word line for both read and write operation. During the read operation stability decreases as the voltage is divided between access and driver transistors. In this paper new 10T SRAM with dynamic feedback control is proposed, which uses single bit line for both read and write operation. Power consumption reduces as single bit line is used and for both read and write operation and stability increases when compared with standard 6T SRAM. Proposed cell also show high static noise margin (SNM). The proposed 10T SRAM when compared with conventional 6T SRAM in terms of power consumed, delays, and SNM. The proposed 10 SRAM cells consume 83.27 % less power for write ‘0’ operation, 85.9 % less power for write 1 operation and delay increase for proposed 10T SRAM cell when compared with standard 6T SRAM cell. The proposed cell has 4.9 times SNM when compared with 6T SRAM. Using Cadence Virtuoso ADE with 180nm technology is used to draw schematics and simulation is carried out.
{"title":"Single bit-line 10T SRAM cell for low power and high SNM","authors":"H. Banga, Dheeraj Agarwal","doi":"10.1109/RISE.2017.8378194","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378194","url":null,"abstract":"Memories are the integral part of digital circuits thus power consumption of memory should be kept in consideration while designing the circuits. Memories should consume less power to improve system performance, stability, and efficiency. Earlier standard CMOS 6T SRAM cell was used which has two bit lines and a word line for both read and write operation. During the read operation stability decreases as the voltage is divided between access and driver transistors. In this paper new 10T SRAM with dynamic feedback control is proposed, which uses single bit line for both read and write operation. Power consumption reduces as single bit line is used and for both read and write operation and stability increases when compared with standard 6T SRAM. Proposed cell also show high static noise margin (SNM). The proposed 10T SRAM when compared with conventional 6T SRAM in terms of power consumed, delays, and SNM. The proposed 10 SRAM cells consume 83.27 % less power for write ‘0’ operation, 85.9 % less power for write 1 operation and delay increase for proposed 10T SRAM cell when compared with standard 6T SRAM cell. The proposed cell has 4.9 times SNM when compared with 6T SRAM. Using Cadence Virtuoso ADE with 180nm technology is used to draw schematics and simulation is carried out.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378168
Daljeet Kaur Kalsi, P. Rai
During the past few years, digital image forgery detection system has been received a significant attention in the field of analyzing and understanding digital images. A copy-move forgery is introduced in images by copying a part of an image and put it in the same image or in the other image. In this paper, we proposed a system that detects a copy-move forgery in the images. The method involves feature extraction, feature matching, and duplicate block identification. In this paper, AILBP (Approximation image local binary pattern) method is being applied for feature extraction. The number of experiments is initiated on a standard standalone image. The experimental results indicate that the proposed system is effective enough to give high performance in terms of speed and accuracy.
{"title":"A copy-move forgery detection system using approximation image local binary pattern","authors":"Daljeet Kaur Kalsi, P. Rai","doi":"10.1109/RISE.2017.8378168","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378168","url":null,"abstract":"During the past few years, digital image forgery detection system has been received a significant attention in the field of analyzing and understanding digital images. A copy-move forgery is introduced in images by copying a part of an image and put it in the same image or in the other image. In this paper, we proposed a system that detects a copy-move forgery in the images. The method involves feature extraction, feature matching, and duplicate block identification. In this paper, AILBP (Approximation image local binary pattern) method is being applied for feature extraction. The number of experiments is initiated on a standard standalone image. The experimental results indicate that the proposed system is effective enough to give high performance in terms of speed and accuracy.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115474895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378213
A. Ukey, M. Chawla
Rendezvous of cognitive radios on commonly available channels is fundamental and crucial phenomena in the formation of cognitive radio networks (CRNs). Rendezvous enables secondary users (SUs) to detect the presence of each other and establish communication links between them. The diversity in free available channels sensed by the SUs and non-awareness of the presence of SUs before rendezvous make the rendezvous process a non-trivial task. Assigning a channel as a common control channel (CCC) for all SUs is not feasible in the dynamic environment of CRNs since SUs may have diverse available channels that change with time and location. Hence, channel hopping (CH) technique often referred as blind rendezvous is more preferred in CRNs. In this paper, we present a unique identity based channel hopping (UID-CH) rendezvous algorithm that dynamically manipulate the unique identity of SUs and constructs the CH sequence on the top of available channels rather than the total potential licensed channels. The gist of the algorithm lies on hopping and waiting phenomena of SUs in a circular manner such that if one SU hops on available channels and the other SU waits on a particular channel then rendezvous can be guaranteed by the time first SU completes a round. Theoretical analysis and simulation experiments show that the UID-CH algorithm provides rendezvous guarantee in finite time without explicit requirement of time synchronization and performs well in distributed dynamic environment of CRNs.
认知无线电在共同可用信道上的交会是认知无线电网络形成过程中的基本和关键现象。会合使次要用户(su)能够检测彼此的存在并在它们之间建立通信链接。单元感知的空闲可用信道的多样性以及在集合前对单元存在的不感知使得集合过程成为一项不平凡的任务。在crn的动态环境中,分配一个通道作为所有su的公共控制通道(common control channel, CCC)是不可实现的,因为su可能有不同的可用通道,这些通道会随着时间和位置的变化而变化。因此,在crn中,信道跳变(CH)技术通常被称为盲交会技术。本文提出了一种基于唯一身份的信道跳(UID-CH)集合算法,该算法动态地操纵SUs的唯一身份,并在可用信道而不是总潜在许可信道的顶部构造CH序列。该算法的要点在于以循环的方式利用节点间的跳变和等待现象,如果一个节点在可用的信道上跳变,而另一个节点在特定的信道上等待,那么在第一个节点完成一轮的时候就可以保证会合。理论分析和仿真实验表明,该算法在没有明确时间同步要求的情况下,提供了有限时间内的交会保证,在crn的分布式动态环境下具有良好的性能。
{"title":"Unique-ID based channel hopping rendezvous algorithm for cognitive radio ad hoc networks","authors":"A. Ukey, M. Chawla","doi":"10.1109/RISE.2017.8378213","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378213","url":null,"abstract":"Rendezvous of cognitive radios on commonly available channels is fundamental and crucial phenomena in the formation of cognitive radio networks (CRNs). Rendezvous enables secondary users (SUs) to detect the presence of each other and establish communication links between them. The diversity in free available channels sensed by the SUs and non-awareness of the presence of SUs before rendezvous make the rendezvous process a non-trivial task. Assigning a channel as a common control channel (CCC) for all SUs is not feasible in the dynamic environment of CRNs since SUs may have diverse available channels that change with time and location. Hence, channel hopping (CH) technique often referred as blind rendezvous is more preferred in CRNs. In this paper, we present a unique identity based channel hopping (UID-CH) rendezvous algorithm that dynamically manipulate the unique identity of SUs and constructs the CH sequence on the top of available channels rather than the total potential licensed channels. The gist of the algorithm lies on hopping and waiting phenomena of SUs in a circular manner such that if one SU hops on available channels and the other SU waits on a particular channel then rendezvous can be guaranteed by the time first SU completes a round. Theoretical analysis and simulation experiments show that the UID-CH algorithm provides rendezvous guarantee in finite time without explicit requirement of time synchronization and performs well in distributed dynamic environment of CRNs.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126203164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378229
Vivekanand, B. Kumar
In this paper, we have studied and analyzed the performance of melody extraction algorithm for different genre of music especially in noisy environment. The algorithm based salience function and pitch contour characteristics is used for extracting the melody. The parameter Frequency Estimation Error (FEE) is taken for evaluating the performance of melody extraction algorithm. Also, their performance is evaluated for various musical genres such as JAZZ, MIDI, POP and OPERA MALE for comparison purpose. We have also shown how final melodicline in polyphonic mixture for different SNR values will look like in case of different musical genre.
{"title":"Melody extraction in noisy Musicof different genre","authors":"Vivekanand, B. Kumar","doi":"10.1109/RISE.2017.8378229","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378229","url":null,"abstract":"In this paper, we have studied and analyzed the performance of melody extraction algorithm for different genre of music especially in noisy environment. The algorithm based salience function and pitch contour characteristics is used for extracting the melody. The parameter Frequency Estimation Error (FEE) is taken for evaluating the performance of melody extraction algorithm. Also, their performance is evaluated for various musical genres such as JAZZ, MIDI, POP and OPERA MALE for comparison purpose. We have also shown how final melodicline in polyphonic mixture for different SNR values will look like in case of different musical genre.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126004130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378155
Shuchi Agarwal, J. Bisht
Improved Binary exploitation modification direction steganographic technique to hide data behind digital images is proposed to increase security of data in communication system. Modification is made in binary power data hiding scheme which results in major improvements in values of PSNR and MSE which increases the stego image quality.
{"title":"Improved BEMD data hiding scheme: Data hiding binary exploitation modification direction scheme using image steganography","authors":"Shuchi Agarwal, J. Bisht","doi":"10.1109/RISE.2017.8378155","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378155","url":null,"abstract":"Improved Binary exploitation modification direction steganographic technique to hide data behind digital images is proposed to increase security of data in communication system. Modification is made in binary power data hiding scheme which results in major improvements in values of PSNR and MSE which increases the stego image quality.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122830908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/RISE.2017.8378140
Ali Al-Dahoud, Rayene Doghmane, M. Fezari, Karima Boukari
In this paper, we present a comparative study on the main faults in a Wireless Sensor Networks (WSN) system. The applications using this new technology have recently been increased due to its huge capacity to connect both the physical and the virtual worlds. WSNs allow assessing locations, which are technically hard to reach by robots or human. With Cloud computing added to the WSN, we expect to see a world covered with trillions of connected devices that sense and share data information with each other. However, many parts of the deployments experience high rates of failure due to node's damage, sensor's damage, RF communication and usually power failure. In this paper, we mentioned existing research works that deal with failure detection in the WSN. Eventually, we presented a comparative case-study of model-based approaches used for failure detection. We also mentioned popular simulation environments used for WSNs. And finally, we showed a case-based simulation using NS-2. This work can be a good survey on Wireless Sensor Network main failures.
{"title":"Failure detection on wireless sensor network based on comparative study","authors":"Ali Al-Dahoud, Rayene Doghmane, M. Fezari, Karima Boukari","doi":"10.1109/RISE.2017.8378140","DOIUrl":"https://doi.org/10.1109/RISE.2017.8378140","url":null,"abstract":"In this paper, we present a comparative study on the main faults in a Wireless Sensor Networks (WSN) system. The applications using this new technology have recently been increased due to its huge capacity to connect both the physical and the virtual worlds. WSNs allow assessing locations, which are technically hard to reach by robots or human. With Cloud computing added to the WSN, we expect to see a world covered with trillions of connected devices that sense and share data information with each other. However, many parts of the deployments experience high rates of failure due to node's damage, sensor's damage, RF communication and usually power failure. In this paper, we mentioned existing research works that deal with failure detection in the WSN. Eventually, we presented a comparative case-study of model-based approaches used for failure detection. We also mentioned popular simulation environments used for WSNs. And finally, we showed a case-based simulation using NS-2. This work can be a good survey on Wireless Sensor Network main failures.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125668497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}