Wireless sensor networks (WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low cost, small size and battery powered sensor nodes, it has more potentials than a MANET to be depolyed in many emerging areas. But they also raised many new challenges and these challenges include the design of embedded sensors and wireless networking technology, ie. routing protocols and network security.Many ad hoc routing protocols such as AODV, DSR, DSDR, TORA and OLSR, which have been developed particularly for the mobile wireless ad hoc networks(MANETs), performed satisfactorily on MANETs. In this paper, we investigate how well these ad-hoc routing protocols work on wireless sensor networks (WSNs). We focus on their performances in terms of average end-to-end delay, packet delivery ratio and routing overheads.
{"title":"Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks","authors":"Zhongwei Zhang, Hong Zhou, Jason H. Gao","doi":"10.1109/ACIIDS.2009.30","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.30","url":null,"abstract":"Wireless sensor networks (WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low cost, small size and battery powered sensor nodes, it has more potentials than a MANET to be depolyed in many emerging areas. But they also raised many new challenges and these challenges include the design of embedded sensors and wireless networking technology, ie. routing protocols and network security.Many ad hoc routing protocols such as AODV, DSR, DSDR, TORA and OLSR, which have been developed particularly for the mobile wireless ad hoc networks(MANETs), performed satisfactorily on MANETs. In this paper, we investigate how well these ad-hoc routing protocols work on wireless sensor networks (WSNs). We focus on their performances in terms of average end-to-end delay, packet delivery ratio and routing overheads.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129025015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a QoS unicast routing scheme withABC supported is proposed. With gaming analysis and particle swarm optimization algorithm, it tries to find a QoS unicast path with Pareto optimum under Nash equilibrium on both the network provider utility and the user utility achieved or approached. Simulation results have shown that it is both feasible and effective.
{"title":"ABC Supporting QoS Unicast Routing Scheme with Particle Swarm Optimization","authors":"Xingwei Wang, Hai-Quan Yang, Min Huang, Lei Guo","doi":"10.1109/ACIIDS.2009.37","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.37","url":null,"abstract":"In this paper, a QoS unicast routing scheme withABC supported is proposed. With gaming analysis and particle swarm optimization algorithm, it tries to find a QoS unicast path with Pareto optimum under Nash equilibrium on both the network provider utility and the user utility achieved or approached. Simulation results have shown that it is both feasible and effective.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125478583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel method for human recognition using gait information. The moving object position at first is detected by using the difference of two continuous frames. And then, based on the detected moving object, all of gait information will be exploited. Based on the head shoulder and back contour, the walking direction can be extracted. Depend on this parameter, the lateral or frontal characteristic will be focused in the features detection process. One all of these are exploited, a feature vector is constructed to serve for applying in the recognition process. To evaluate the effect of this proposed and compare with another method, we also present some simulation results which are performed on indoor outdoor environment
{"title":"Real-Time Human Recognition by Their Walk","authors":"A. Nguyen, Eung-Joo Lee","doi":"10.1109/ACIIDS.2009.72","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.72","url":null,"abstract":"This paper presents a novel method for human recognition using gait information. The moving object position at first is detected by using the difference of two continuous frames. And then, based on the detected moving object, all of gait information will be exploited. Based on the head shoulder and back contour, the walking direction can be extracted. Depend on this parameter, the lateral or frontal characteristic will be focused in the features detection process. One all of these are exploited, a feature vector is constructed to serve for applying in the recognition process. To evaluate the effect of this proposed and compare with another method, we also present some simulation results which are performed on indoor outdoor environment","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128825118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper an approach to developing representations jOr embodied ontologies used by other agents is proposed. Agents are assumed to posses their own systems ofmeaning captured in the form oftheir strictly private ontology. Therefore, in order to communicate successfUlly the agent should be able to circumscribe the meaning assigned by other agents to incoming symbols ofcommunication language. Simple correlation analysis, between symbols incoming from other agents and associated states of the external world, allows an agent to develop its internal reflection of meaning assigned to uttered language symbols by their senders. Referring to the representation ofother agents' embodied ontology the agent may determine the level ofconsistency between the language symbols semantics assigned byparticular agents. The novelty of this work lies in the jOct that language symbols used by communicating agents are assumed to be grounded in agent experience. As a direct consequence the introduced process of other agents' embodied ontology representation determination can beformalized.
{"title":"Representing the Meaning of Symbols in Autonomous Agents","authors":"Wojciech A. Lorkiewicz, R. Katarzyniak","doi":"10.1109/ACIIDS.2009.70","DOIUrl":"https://doi.org/10.1109/ACIIDS.2009.70","url":null,"abstract":"In this paper an approach to developing representations jOr embodied ontologies used by other agents is proposed. Agents are assumed to posses their own systems ofmeaning captured in the form oftheir strictly private ontology. Therefore, in order to communicate successfUlly the agent should be able to circumscribe the meaning assigned by other agents to incoming symbols ofcommunication language. Simple correlation analysis, between symbols incoming from other agents and associated states of the external world, allows an agent to develop its internal reflection of meaning assigned to uttered language symbols by their senders. Referring to the representation ofother agents' embodied ontology the agent may determine the level ofconsistency between the language symbols semantics assigned byparticular agents. The novelty of this work lies in the jOct that language symbols used by communicating agents are assumed to be grounded in agent experience. As a direct consequence the introduced process of other agents' embodied ontology representation determination can beformalized.","PeriodicalId":275776,"journal":{"name":"2009 First Asian Conference on Intelligent Information and Database Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}