Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160180
Hamoud H. Alshammari, H. Bajwa, JeongKyu Lee
Scientific data sets usually have similar jobs that are frequently applied to them by different users. In addition, many of these data sets are unstructured and complex, and required fast and simple processing. In order to increase the performance of the existing Hadoop and MapReduce algorithm, it is necessary to develop an algorithm based on the type of data sets and requirements of the jobs. Genomic and biological data is an example of unstructured data because it only has a huge sequence of unreadable and non-relational letters. In this paper, we present an overview of a developed MapReduce algorithm and its simulation using HBase as a NoSQL database.
{"title":"Enhancing performance of Hadoop and MapReduce for scientific data using NoSQL database","authors":"Hamoud H. Alshammari, H. Bajwa, JeongKyu Lee","doi":"10.1109/LISAT.2015.7160180","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160180","url":null,"abstract":"Scientific data sets usually have similar jobs that are frequently applied to them by different users. In addition, many of these data sets are unstructured and complex, and required fast and simple processing. In order to increase the performance of the existing Hadoop and MapReduce algorithm, it is necessary to develop an algorithm based on the type of data sets and requirements of the jobs. Genomic and biological data is an example of unstructured data because it only has a huge sequence of unreadable and non-relational letters. In this paper, we present an overview of a developed MapReduce algorithm and its simulation using HBase as a NoSQL database.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134383708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In this paper, a new Trojan Horse detection method by using Windows Dynamic Link Libraries to identify system calls from a Trojan Horses is explicated. Process explorer is used to identify the malicious executables and to determine whether they are Trojans or not. Further, an attempt made to study the network behavior after a Trojan Horse is executed using Wireshark.
{"title":"Detection of Trojan Horses by the analysis of system behavior and data packets","authors":"Vamshi Krishna Gudipati, Aayush Vetwal, Varun Kumar, Anjorin Adeniyi, Abdel-shakour Abuzneid","doi":"10.1109/LISAT.2015.7160176","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160176","url":null,"abstract":"Trojan Horse is said to be one of the most serious threats to computer security. A Trojan Horse is an executable file in the Windows operating system. This executable file will have certain static and runtime characteristics. Multiple system processes in the Windows OS will be called whenever a Trojan Horse tries to execute any operation on the system. In this paper, a new Trojan Horse detection method by using Windows Dynamic Link Libraries to identify system calls from a Trojan Horses is explicated. Process explorer is used to identify the malicious executables and to determine whether they are Trojans or not. Further, an attempt made to study the network behavior after a Trojan Horse is executed using Wireshark.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160210
Akin Tatoglu, K. Pochiraju
Current Monocular Simultaneous Localization and Mapping (MonoSLAM) methodologies use constant velocity and smooth motion assumptions. If the motion consists of rapid accelerations, decelerations or stops, the position estimates become erroneous and unstable. Mobile robots require frequent stops due to mission dictated or safety reasons. With the objective of using MonoSLAM to localize a mobile robot, we determined the effectiveness of trajectory estimation for a typical robot moving with constant velocity and stopping to execute missions. Experiments were performed with a camera mounted on a 3-axis translational robot and several path profiles with brief stops were executed. The trajectory estimated with a MonoSLAM algorithm is compared with the known motion profile. As the stop causes significant error and drift in the position estimates, we modified the constant velocity motion model to incorporate a stop detection method. An optical flow based stop detection model was formulated and implemented in conjunction with MonoSLAM. Velocity update is modified when a stop or start is detected by optical flow. By adaptively switching between constant velocity and stop models, the trajectory estimate is seen to be more accurate and stable after an intermittent stop. Details of the adaptive switching method and the performance of the modified MonoSLAM are described in this paper.
{"title":"Motion model binary switch for MonoSLAM","authors":"Akin Tatoglu, K. Pochiraju","doi":"10.1109/LISAT.2015.7160210","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160210","url":null,"abstract":"Current Monocular Simultaneous Localization and Mapping (MonoSLAM) methodologies use constant velocity and smooth motion assumptions. If the motion consists of rapid accelerations, decelerations or stops, the position estimates become erroneous and unstable. Mobile robots require frequent stops due to mission dictated or safety reasons. With the objective of using MonoSLAM to localize a mobile robot, we determined the effectiveness of trajectory estimation for a typical robot moving with constant velocity and stopping to execute missions. Experiments were performed with a camera mounted on a 3-axis translational robot and several path profiles with brief stops were executed. The trajectory estimated with a MonoSLAM algorithm is compared with the known motion profile. As the stop causes significant error and drift in the position estimates, we modified the constant velocity motion model to incorporate a stop detection method. An optical flow based stop detection model was formulated and implemented in conjunction with MonoSLAM. Velocity update is modified when a stop or start is detected by optical flow. By adaptively switching between constant velocity and stop models, the trajectory estimate is seen to be more accurate and stable after an intermittent stop. Details of the adaptive switching method and the performance of the modified MonoSLAM are described in this paper.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125755254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160181
Abrar Alajlan, M. Almasri, K. Elleithy
Collision Avoidance (CA) systems have been used in wide range of different robotics areas and had extraordinary success in minimizing the risk of collisions. It is a critical requirement in building mobile robot systems where they all featured some kind of obstacle detection techniques in order to avoid two or more objects from colliding. The purpose of this paper is to present an algorithm for performing collision avoidance in mobile robot that is relying on the use of low-cost ultrasonic with infrared sensors, and involving some other modules, so that it can be easily used in real-time robotic applications. The proposed algorithm is implemented in multiple scenarios with several obstacles placed in different locations around the robot. Our experimental run shows that the robot has been successfully detecting obstacles and avoiding collisions along its path.
{"title":"Multi-sensor based collision avoidance algorithm for mobile robot","authors":"Abrar Alajlan, M. Almasri, K. Elleithy","doi":"10.1109/LISAT.2015.7160181","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160181","url":null,"abstract":"Collision Avoidance (CA) systems have been used in wide range of different robotics areas and had extraordinary success in minimizing the risk of collisions. It is a critical requirement in building mobile robot systems where they all featured some kind of obstacle detection techniques in order to avoid two or more objects from colliding. The purpose of this paper is to present an algorithm for performing collision avoidance in mobile robot that is relying on the use of low-cost ultrasonic with infrared sensors, and involving some other modules, so that it can be easily used in real-time robotic applications. The proposed algorithm is implemented in multiple scenarios with several obstacles placed in different locations around the robot. Our experimental run shows that the robot has been successfully detecting obstacles and avoiding collisions along its path.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129629165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160190
Tariq Alshugran, J. Dichter, A. Rusu
Some software applications are developed to collect, store, and manage users' personal, medical, or financial information. In the United States, such applications are required to preserve users' privacy and to be compliant with the federal privacy laws and regulations. To formally guarantee compliance with federal regulations, it is necessary to express the privacy rules enforced by those regulations in a standard policy specification language. In this work we evaluate the eXtensible Access Control Model Language (XACML) as a formal specification language for privacy laws and regulations. Furthermore, we evaluate XACML features and attributes to extend it in order to enforce those privacy rules.
{"title":"Extending XACML to express and enforce laws and regulations privacy policies","authors":"Tariq Alshugran, J. Dichter, A. Rusu","doi":"10.1109/LISAT.2015.7160190","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160190","url":null,"abstract":"Some software applications are developed to collect, store, and manage users' personal, medical, or financial information. In the United States, such applications are required to preserve users' privacy and to be compliant with the federal privacy laws and regulations. To formally guarantee compliance with federal regulations, it is necessary to express the privacy rules enforced by those regulations in a standard policy specification language. In this work we evaluate the eXtensible Access Control Model Language (XACML) as a formal specification language for privacy laws and regulations. Furthermore, we evaluate XACML features and attributes to extend it in order to enforce those privacy rules.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Privacy and Security of Big Data is gaining high importance since recently all the technologies started to depend on Big Data. In this paper, we are going to discuss particularly Hadoop and difficulty in maintaining the privacy and security of Big Data. The main goal is to propose a Hadoop system that maintains the privacy and security of the information stored on the cloud.
{"title":"Hadoop eco system for big data security and privacy","authors":"Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang","doi":"10.1109/LISAT.2015.7160211","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160211","url":null,"abstract":"Privacy and Security of Big Data is gaining high importance since recently all the technologies started to depend on Big Data. In this paper, we are going to discuss particularly Hadoop and difficulty in maintaining the privacy and security of Big Data. The main goal is to propose a Hadoop system that maintains the privacy and security of the information stored on the cloud.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134335626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160217
R. Desimone, Betsy Mendieta Brito, J. Baston
Indoor signal propagation characteristics can be difficult to predict accurately. Factors such as building layout and building materials can have a major effect on signal propagation. In this paper we will model indoor signal propagation using lognormal shadowing characteristics. The benefit of this model over others is its simplicity. The accuracy of this model at predicting the relationship between received signal strength (RSS) and the distance from transmitter to receiver will be determined. The link that was tested and modeled uses the IEEE 802.11n standard. Both 2.4 GHz and 5 GHz Industrial Scientific and Medical (ISM) bands were tested and modeled.
{"title":"Model of indoor signal propagation using log-normal shadowing","authors":"R. Desimone, Betsy Mendieta Brito, J. Baston","doi":"10.1109/LISAT.2015.7160217","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160217","url":null,"abstract":"Indoor signal propagation characteristics can be difficult to predict accurately. Factors such as building layout and building materials can have a major effect on signal propagation. In this paper we will model indoor signal propagation using lognormal shadowing characteristics. The benefit of this model over others is its simplicity. The accuracy of this model at predicting the relationship between received signal strength (RSS) and the distance from transmitter to receiver will be determined. The link that was tested and modeled uses the IEEE 802.11n standard. Both 2.4 GHz and 5 GHz Industrial Scientific and Medical (ISM) bands were tested and modeled.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160191
M. Almi'ani, B. Barkana
The progress of medical imaging instrumentation has stirred the development of new computer-aided methods of image processing and analysis for better understanding and interpretation of medical images for differential diagnosis, intervention, and treatment monitoring. Image processing and analysis methods have been used to help physicians to make important medical decisions through physician-computer interaction. A modified region growing algorithm is proposed to extract cerebral vessels using a magnetic resonance angiography (MRA) database. To improve the performance of the image segmentation method, as a pre-processing step, image enhancement methods are applied by the gamma correction technique and spatial operations. This step improves the detection of gray-level discontinuities in MRA images. The traditional region growing method is modified by extending the neighborhood as 24 pixels and by defining a filling protocol to label vascular structure. The performance of the proposed algorithm is compared with that of the traditional region growing method and four other segmentation methods. Our proposed method outperformed the other methods. The minimum and maximum errors of the modified region growing method is calculated as zero and 0.82, respectively while the traditional region growing method has 1.85 and 21.91.
{"title":"A modified region growing based algorithm to vessel segmentation in magnetic resonance angiography","authors":"M. Almi'ani, B. Barkana","doi":"10.1109/LISAT.2015.7160191","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160191","url":null,"abstract":"The progress of medical imaging instrumentation has stirred the development of new computer-aided methods of image processing and analysis for better understanding and interpretation of medical images for differential diagnosis, intervention, and treatment monitoring. Image processing and analysis methods have been used to help physicians to make important medical decisions through physician-computer interaction. A modified region growing algorithm is proposed to extract cerebral vessels using a magnetic resonance angiography (MRA) database. To improve the performance of the image segmentation method, as a pre-processing step, image enhancement methods are applied by the gamma correction technique and spatial operations. This step improves the detection of gray-level discontinuities in MRA images. The traditional region growing method is modified by extending the neighborhood as 24 pixels and by defining a filling protocol to label vascular structure. The performance of the proposed algorithm is compared with that of the traditional region growing method and four other segmentation methods. Our proposed method outperformed the other methods. The minimum and maximum errors of the modified region growing method is calculated as zero and 0.82, respectively while the traditional region growing method has 1.85 and 21.91.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132474813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160194
Zyad Nossire, J. Dichter, Navarun Gupta, J. Fathi
Mobile phone base station (tower) provides coverage for one or more geographical areas, known as cells. A mobile phone network is made up of a base station operating in conjunction with adjacent base stations. Base stations must be carefully located in relation to each other, so each cell in the network functions efficiently to ensure minimum interference between cells and good signal quality. One of the major problems for cellular wireless devices is calls being dropped and failure in downloading data. Our research uses a new recommendation in determining tower positions. Thus, providing an easy interface to replace traditional control methods and maintain signal levels. The weak WiFi wave propagation outside tower's coverage areas is investigated at the University of Bridgeport (UB) campus. The campus serves as good experimental settings because it exemplifies typical signal dead spots, locations where little to no WiFi signal is available. In this paper, we investigate path loss propagation between the base stations and we identify and categorize these problems. We then apply our path loss propagation algorithmic models to show that signal strength is significantly improved when applying the proposed model. Finally, we show the efficiency of the proposed positions.
移动电话基站(塔)提供覆盖一个或多个地理区域,称为小区。移动电话网络是由一个基站与相邻的基站一起操作组成的。基站之间必须仔细定位,这样网络中的每个小区才能有效地工作,以确保小区之间的干扰最小和良好的信号质量。蜂窝无线设备的主要问题之一是掉线和下载数据失败。我们的研究采用了一种新的建议来确定塔的位置。因此,提供了一个简单的接口,以取代传统的控制方法和维持信号电平。在布里奇波特大学(University of Bridgeport, UB)校园内,对塔架覆盖区域外的弱WiFi波传播进行了研究。校园是一个很好的实验场所,因为它是典型的信号盲区,在那里几乎没有WiFi信号可用。本文研究了基站间的路径损耗传播问题,并对这些问题进行了识别和分类。然后,我们应用我们的路径损耗传播算法模型来表明,当应用所提出的模型时,信号强度显着提高。最后,我们展示了所提出的位置的效率。
{"title":"A new selected points to enhance radio wave propagation strength outside the coverage area of the mobile towers in the dead spots of cellular mobile WiFi downloads","authors":"Zyad Nossire, J. Dichter, Navarun Gupta, J. Fathi","doi":"10.1109/LISAT.2015.7160194","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160194","url":null,"abstract":"Mobile phone base station (tower) provides coverage for one or more geographical areas, known as cells. A mobile phone network is made up of a base station operating in conjunction with adjacent base stations. Base stations must be carefully located in relation to each other, so each cell in the network functions efficiently to ensure minimum interference between cells and good signal quality. One of the major problems for cellular wireless devices is calls being dropped and failure in downloading data. Our research uses a new recommendation in determining tower positions. Thus, providing an easy interface to replace traditional control methods and maintain signal levels. The weak WiFi wave propagation outside tower's coverage areas is investigated at the University of Bridgeport (UB) campus. The campus serves as good experimental settings because it exemplifies typical signal dead spots, locations where little to no WiFi signal is available. In this paper, we investigate path loss propagation between the base stations and we identify and categorize these problems. We then apply our path loss propagation algorithmic models to show that signal strength is significantly improved when applying the proposed model. Finally, we show the efficiency of the proposed positions.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117214180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160206
Bandar Alotaibi, K. Elleithy
The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (i.e, Beacon Frame (BF)) when it is planted in the Wireless Local Area Network (WLAN) is proposed. We apply the proposed fingerprint to detect RAPs to evaluate the fingerprint effectiveness. The proposed framework examines every beacon frame size, and compares it with a threshold value. The technique is implemented on a commercially available Wireless Network Interface Controller (WNIC) to evaluate its accuracy. The detection algorithm achieves 100 percent accuracy to determine the RAPs in a lightly loaded traffic environment. The detection time can be taken in approximately 100 ms and is scanned in real-time setting. The robustness and the efficiency of the detection algorithm are examined in two different locations.
{"title":"An empirical fingerprint framework to detect Rogue Access Points","authors":"Bandar Alotaibi, K. Elleithy","doi":"10.1109/LISAT.2015.7160206","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160206","url":null,"abstract":"The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (i.e, Beacon Frame (BF)) when it is planted in the Wireless Local Area Network (WLAN) is proposed. We apply the proposed fingerprint to detect RAPs to evaluate the fingerprint effectiveness. The proposed framework examines every beacon frame size, and compares it with a threshold value. The technique is implemented on a commercially available Wireless Network Interface Controller (WNIC) to evaluate its accuracy. The detection algorithm achieves 100 percent accuracy to determine the RAPs in a lightly loaded traffic environment. The detection time can be taken in approximately 100 ms and is scanned in real-time setting. The robustness and the efficiency of the detection algorithm are examined in two different locations.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}