Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164222
M. S. Beg, Binish Fatimah, Shashank Jain, R. Muzammil
Bluetooth based new wireless applications can increase comfort and security by automation of the tasks earlier controlled manually. In this paper advantages of low cost, low power and robustness of Bluetooth have been exploited to propose and implement two new consumer systems in the form of a garage door opening system and an electronic attendance record system. Both the applications provide luxury of automation along with promise of a better security system and will thus be a step towards realization of a smart building environment. Bluetooth based garage door opening system helps to overcome the inconvenience to move out of the car for unlocking the door and it provides the luxury of keyless opening which is electronically controlled just by enabling the authenticated Bluetooth slave device. The other Bluetooth based application proposed and implemented in this work relates to automatic monitoring and recording of attendance of employees in an organization. Both the applications proposed and implemented in this paper offer better security, higher flexibility and lesser complexity. In this paper the applications are developed based on Bluetooth Link using Host Controller Interface and Asynchronous Connection Less (ACL) link.
{"title":"Bluetooth based implementations for realising new consumer systems","authors":"M. S. Beg, Binish Fatimah, Shashank Jain, R. Muzammil","doi":"10.1109/MSPCT.2009.5164222","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164222","url":null,"abstract":"Bluetooth based new wireless applications can increase comfort and security by automation of the tasks earlier controlled manually. In this paper advantages of low cost, low power and robustness of Bluetooth have been exploited to propose and implement two new consumer systems in the form of a garage door opening system and an electronic attendance record system. Both the applications provide luxury of automation along with promise of a better security system and will thus be a step towards realization of a smart building environment. Bluetooth based garage door opening system helps to overcome the inconvenience to move out of the car for unlocking the door and it provides the luxury of keyless opening which is electronically controlled just by enabling the authenticated Bluetooth slave device. The other Bluetooth based application proposed and implemented in this work relates to automatic monitoring and recording of attendance of employees in an organization. Both the applications proposed and implemented in this paper offer better security, higher flexibility and lesser complexity. In this paper the applications are developed based on Bluetooth Link using Host Controller Interface and Asynchronous Connection Less (ACL) link.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120819420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164187
S. Saeed, Zia Abbas, Balamurugan A. Gopal
An electronic nose is an instrument intended to mimic the human sense of smell. Electronic noses (e-nose) employ an array of chemical gas sensors, a sample handling system and a pattern recognition system. Pattern recognition provides a higher degree of selectivity and reversibility to the system leading to an extensive range of applications. These ranges from the food and medical industries to environmental monitoring and process control. Many other types of different gas sensors available. These include conducting polymers (CP), metal oxide semiconductors (MOS), piezoelectric, optical fluorescence, quartz crystal microbalance (QCM) and Amperometric gas sensors. The ideal gas sensor would exhibit reliability, robustness, sensitivity, selectivity and reversibility. High selectivity with high reversibility is difficult to attain. After signal processing and feature extraction the output of the sensors provide a unique “smellprint” for that substances which can be used to classify, measure concentration, or verify quality. The present paper illustrates the function of electronic nose, its application and investigates the effective use of e-nose in detecting gases that have some smell developed by the volatile organic compounds (VOC) like ethanol, acetone and benzene at different concentrations. The response and characteristics prove that the Electronic nose is a reliable instrument which can be used for environment control (air quality, pollutants, and gas emission levels), medical science (urine, skin and breath odour etc.), food industry (coffee, milk, soft drink fish, meat etc.), pharmaceutics, chemical industry, Defence and security industries (detecting humanitarian land mines etc.) and semiconductor industrial processes.
{"title":"Experimental use of electronic nose for analysis of volatile organic compound (VOC)","authors":"S. Saeed, Zia Abbas, Balamurugan A. Gopal","doi":"10.1109/MSPCT.2009.5164187","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164187","url":null,"abstract":"An electronic nose is an instrument intended to mimic the human sense of smell. Electronic noses (e-nose) employ an array of chemical gas sensors, a sample handling system and a pattern recognition system. Pattern recognition provides a higher degree of selectivity and reversibility to the system leading to an extensive range of applications. These ranges from the food and medical industries to environmental monitoring and process control. Many other types of different gas sensors available. These include conducting polymers (CP), metal oxide semiconductors (MOS), piezoelectric, optical fluorescence, quartz crystal microbalance (QCM) and Amperometric gas sensors. The ideal gas sensor would exhibit reliability, robustness, sensitivity, selectivity and reversibility. High selectivity with high reversibility is difficult to attain. After signal processing and feature extraction the output of the sensors provide a unique “smellprint” for that substances which can be used to classify, measure concentration, or verify quality. The present paper illustrates the function of electronic nose, its application and investigates the effective use of e-nose in detecting gases that have some smell developed by the volatile organic compounds (VOC) like ethanol, acetone and benzene at different concentrations. The response and characteristics prove that the Electronic nose is a reliable instrument which can be used for environment control (air quality, pollutants, and gas emission levels), medical science (urine, skin and breath odour etc.), food industry (coffee, milk, soft drink fish, meat etc.), pharmaceutics, chemical industry, Defence and security industries (detecting humanitarian land mines etc.) and semiconductor industrial processes.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124158061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164172
P. Tiwari, Surendra Kumar, S. Mittal, Vaibhav Srivastava, Utkarsh Pandey, S. Jit
The paper presents a 2D analytical model for the potential function and threshold voltage of symmetric Double-Gate (DG) MOSFETs with vertical Gaussian doping profile in the channel.
本文建立了沟道中垂直高斯掺杂的对称双栅mosfet的势函数和阈值电压的二维解析模型。
{"title":"A 2D analytical model of the channel potential and threshold voltage of Double-Gate (DG) MOSFETs with vertical Gaussian doping profile","authors":"P. Tiwari, Surendra Kumar, S. Mittal, Vaibhav Srivastava, Utkarsh Pandey, S. Jit","doi":"10.1109/MSPCT.2009.5164172","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164172","url":null,"abstract":"The paper presents a 2D analytical model for the potential function and threshold voltage of symmetric Double-Gate (DG) MOSFETs with vertical Gaussian doping profile in the channel.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125711254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164219
Mohd Ayyub Khan, E. Khan
The Set Partitioning in Hierarchical Trees (SPIHT) based color image coder, commonly referred as Color SPIHT (CSPIHT) are developed to quantize and encode wavelet coefficients and have excellent rate distortion characteristic in the noise free environments. However in presence of noise they are extremely sensitive to the bit errors. It was observed that bits have different degree of vulnerability of errors. The error in some of the bits (critical bits) causes the severe degradation while errors in other bits (non-critical bits) have negligible effect in the reconstructed images. In this paper, we propose an unequal error protection (UEP) scheme, in which within each bits plane, the bits are reorganized according to their sensitivity of errors and then critical bits are protected unequally using Rate Compatible Puncturing Convolutional (RCPC) codes. The protection is reduced for higher bit-planes, by changing the puncturing rate. The simulation results show an improvement of 5–15 dB in the quality of reproduced images, as compared to the equal error protection (EEP) and unprotected CSPIHT bit-stream.
基于分层树集分割(Set Partitioning in Hierarchical Trees,简称spieht)的彩色图像编码器,通常称为CSPIHT (color SPIHT,简称CSPIHT),用于对小波系数进行量化编码,在无噪声环境下具有良好的率失真特性。然而,在噪声存在的情况下,它们对误码极为敏感。结果表明,比特具有不同程度的易出错性。某些比特(关键比特)的误差会导致严重的退化,而其他比特(非关键比特)的误差对重构图像的影响可以忽略不计。本文提出了一种不等错保护(UEP)方案,该方案在每个比特平面内,根据比特对错误的敏感性对比特进行重组,然后使用速率兼容刺破卷积(RCPC)码对关键比特进行不等错保护。通过改变穿刺率,对更高位平面的保护降低了。仿真结果表明,与等错误保护(EEP)和不受保护的CSPIHT比特流相比,再现图像的质量提高了5-15 dB。
{"title":"Error resilient technique for SPIHT coded color images","authors":"Mohd Ayyub Khan, E. Khan","doi":"10.1109/MSPCT.2009.5164219","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164219","url":null,"abstract":"The Set Partitioning in Hierarchical Trees (SPIHT) based color image coder, commonly referred as Color SPIHT (CSPIHT) are developed to quantize and encode wavelet coefficients and have excellent rate distortion characteristic in the noise free environments. However in presence of noise they are extremely sensitive to the bit errors. It was observed that bits have different degree of vulnerability of errors. The error in some of the bits (critical bits) causes the severe degradation while errors in other bits (non-critical bits) have negligible effect in the reconstructed images. In this paper, we propose an unequal error protection (UEP) scheme, in which within each bits plane, the bits are reorganized according to their sensitivity of errors and then critical bits are protected unequally using Rate Compatible Puncturing Convolutional (RCPC) codes. The protection is reduced for higher bit-planes, by changing the puncturing rate. The simulation results show an improvement of 5–15 dB in the quality of reproduced images, as compared to the equal error protection (EEP) and unprotected CSPIHT bit-stream.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164216
Navneet, T. C. Aseri, A. Abbas
Provision of quality of service (QoS) in todays Internet is an area that attracts the current state-of-the-art research. In this paper, we study the effect of topological and traffic variations on the provision of QoS using RSVP/ns. In our performance evaluation, we focus on the effect of varying packet size, number of flows, and mixing of best-effort flows with RSVP flows on the bandwidth reservations.
{"title":"Effect of topological and traffic variations on quality of service using RSVP/ns","authors":"Navneet, T. C. Aseri, A. Abbas","doi":"10.1109/MSPCT.2009.5164216","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164216","url":null,"abstract":"Provision of quality of service (QoS) in todays Internet is an area that attracts the current state-of-the-art research. In this paper, we study the effect of topological and traffic variations on the provision of QoS using RSVP/ns. In our performance evaluation, we focus on the effect of varying packet size, number of flows, and mixing of best-effort flows with RSVP flows on the bandwidth reservations.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125471235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164167
Nahla A. Flayh, R. Parveen, S. Ahson
In this paper new partial encryption schemes are present, in which a secure encryption algorithm is used to encrypt only part of the images. Only part of the original data is encrypted for two different grayscale images and two color images of size (256 × 256) pixels, resulting in a significant reduction in encryption and decryption time.
{"title":"Wavelet based partial image encryption","authors":"Nahla A. Flayh, R. Parveen, S. Ahson","doi":"10.1109/MSPCT.2009.5164167","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164167","url":null,"abstract":"In this paper new partial encryption schemes are present, in which a secure encryption algorithm is used to encrypt only part of the images. Only part of the original data is encrypted for two different grayscale images and two color images of size (256 × 256) pixels, resulting in a significant reduction in encryption and decryption time.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120954801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164201
Brojeshwar Bhowmick, Debaleena Chattopadhyay
Content based video indexing and retrieval traces back to the elementary video structures, such as a table of contents. Thus, algorithms for video partitioning have become crucial with the unremitting growth in the prevalent digital video technology. This demands for a tool which would break down the video into smaller and manageable units called shots. In this paper, a shot boundary detection technique has been proposed for abrupt scene cuts. The method computes cooccurrence matrices by taking block differences between the consecutive frames in each of R, G, and B plane, using sum of absolute differences (SAD). Feature vectors are extracted from the co-occurrence matrices' statistics, defined at various pixel displacement distances. The statistical find-outs are integrated into a training set and an unsupervised classifier, K-means, is used to identify the shot-frames and the non-shot frames.
基于内容的视频索引和检索可以追溯到基本的视频结构,如目录。因此,随着数字视频技术的不断发展,视频分割算法变得至关重要。这就需要一种工具将视频分解成更小的、可管理的单元,称为镜头。本文提出了一种针对场景突然剪切的镜头边界检测技术。该方法采用绝对差和(sum of absolute difference, SAD)的方法,取R、G、B各平面连续帧之间的块差来计算共发生矩阵。特征向量是从共现矩阵的统计量中提取的,这些统计量在不同的像素位移距离上定义。统计结果被整合到训练集中,并使用无监督分类器K-means来识别投篮帧和非投篮帧。
{"title":"Shot boundary detection using texture feature based on co-occurrence matrices","authors":"Brojeshwar Bhowmick, Debaleena Chattopadhyay","doi":"10.1109/MSPCT.2009.5164201","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164201","url":null,"abstract":"Content based video indexing and retrieval traces back to the elementary video structures, such as a table of contents. Thus, algorithms for video partitioning have become crucial with the unremitting growth in the prevalent digital video technology. This demands for a tool which would break down the video into smaller and manageable units called shots. In this paper, a shot boundary detection technique has been proposed for abrupt scene cuts. The method computes cooccurrence matrices by taking block differences between the consecutive frames in each of R, G, and B plane, using sum of absolute differences (SAD). Feature vectors are extracted from the co-occurrence matrices' statistics, defined at various pixel displacement distances. The statistical find-outs are integrated into a training set and an unsupervised classifier, K-means, is used to identify the shot-frames and the non-shot frames.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115958031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164194
Rajeshwari Hegde, K. Gurumurthy
Electronic Control Units (ECUs) are widely used to improve the comfort and reliability of vehicles. It has become the fundamental building block of any automotive subsystem and is interfaced with electro mechanics counterpart. To meet the system wide requirements, these ECUs are interconnected using the communication infrastructure. Although the communication infrastructure in terms of, predominantly, the CAN based vehicle network took its birth to enable ECUs to work in a coordinated manner in order to support system wide requirements, during the past decade, this infrastructure was also viewed as a potential means to incorporate extensibility in terms of addition of newer ECUs which are built for implementing additional requirements. With this paradigm, the number of ECUs started growing in a steep manner, uncontrolled and as a result, today, it is not hard to see a high segment automotive housing ECUs as large as 75–80. Hence, load balancing mechanisms are needed to ease ECU integration and for efficient utilization of CPU power in ECUs. In this paper, we explain the concept of load balancing on the basis of CPU utilization across ECUs.
{"title":"Load balancing issues in automotives","authors":"Rajeshwari Hegde, K. Gurumurthy","doi":"10.1109/MSPCT.2009.5164194","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164194","url":null,"abstract":"Electronic Control Units (ECUs) are widely used to improve the comfort and reliability of vehicles. It has become the fundamental building block of any automotive subsystem and is interfaced with electro mechanics counterpart. To meet the system wide requirements, these ECUs are interconnected using the communication infrastructure. Although the communication infrastructure in terms of, predominantly, the CAN based vehicle network took its birth to enable ECUs to work in a coordinated manner in order to support system wide requirements, during the past decade, this infrastructure was also viewed as a potential means to incorporate extensibility in terms of addition of newer ECUs which are built for implementing additional requirements. With this paradigm, the number of ECUs started growing in a steep manner, uncontrolled and as a result, today, it is not hard to see a high segment automotive housing ECUs as large as 75–80. Hence, load balancing mechanisms are needed to ease ECU integration and for efficient utilization of CPU power in ECUs. In this paper, we explain the concept of load balancing on the basis of CPU utilization across ECUs.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125846181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164228
Syed Abdaheer, E. Khan
In this paper we adopt FFT based fractal analysis method. With the help FFT based method breast tumors (benign and malignant) are classified based on their shapes. In general malignant tumors contour have rough and irregular shapes whereas benign contour have smooth and macrolobulated shapes. In this paper we present a fractal based Fourier transform method to classify the contours. The log -log magnitude frequency response plot and rose plot (for average radial distance and angle variations in terms of average slops and slope of intercept) are used in this study in order to extract the features for classifications.
{"title":"Shape based classification of breast tumors using fractal analysis","authors":"Syed Abdaheer, E. Khan","doi":"10.1109/MSPCT.2009.5164228","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164228","url":null,"abstract":"In this paper we adopt FFT based fractal analysis method. With the help FFT based method breast tumors (benign and malignant) are classified based on their shapes. In general malignant tumors contour have rough and irregular shapes whereas benign contour have smooth and macrolobulated shapes. In this paper we present a fractal based Fourier transform method to classify the contours. The log -log magnitude frequency response plot and rose plot (for average radial distance and angle variations in terms of average slops and slope of intercept) are used in this study in order to extract the features for classifications.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-03-14DOI: 10.1109/MSPCT.2009.5164186
P. Gaur, B. Dhaliwal, Ameeta Seehra
The adhoc networks are considered to be infrastructure less networks therefore the scarcity of resources (i.e. Bandwidth and Energy) are the main issues requiring attention. In this paper the routing applications/algorithms for optimizing battery life time are analyzed while taking into account the highly unreliable real time behavior of mica2 motes. Routing applications are run in Matlab based probabilistic event driven platform having layered architecture for power centric radio model. Although the adhoc networks have dynamic topology and are randomly placed in specified environments, radio motes are placed in a twodimentional virtual grid for simulating the flow of packet information in a multicasting source-destination domain. Power Efficient Wireless Adhoc Networks have their applications in military (spying, battlefield surveillance), environmental (forest fire and flood detection, seismic structure response and bio-complexity), health (drug administration in hospitals) set ups.
{"title":"Analysis of power saving multicasting routing applications for Mica2 motes-an event based MATLAB implementation","authors":"P. Gaur, B. Dhaliwal, Ameeta Seehra","doi":"10.1109/MSPCT.2009.5164186","DOIUrl":"https://doi.org/10.1109/MSPCT.2009.5164186","url":null,"abstract":"The adhoc networks are considered to be infrastructure less networks therefore the scarcity of resources (i.e. Bandwidth and Energy) are the main issues requiring attention. In this paper the routing applications/algorithms for optimizing battery life time are analyzed while taking into account the highly unreliable real time behavior of mica2 motes. Routing applications are run in Matlab based probabilistic event driven platform having layered architecture for power centric radio model. Although the adhoc networks have dynamic topology and are randomly placed in specified environments, radio motes are placed in a twodimentional virtual grid for simulating the flow of packet information in a multicasting source-destination domain. Power Efficient Wireless Adhoc Networks have their applications in military (spying, battlefield surveillance), environmental (forest fire and flood detection, seismic structure response and bio-complexity), health (drug administration in hospitals) set ups.","PeriodicalId":179541,"journal":{"name":"2009 International Multimedia, Signal Processing and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132388067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}