Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918963
S. Khalid, M. Akram, Tehmina Khalil
Macula is the most sensitive component of human retina and it is responsible for sharp colored vision. Any abnormality effecting macula results in blurriness and other eye impairments. Two main abnormalities related to macula are macular edema and ARMD (Age Related Macular Degeneration). This paper focus on automated detection of ARMD using digital fundus images. The proposed technique extracts macular region automatically from input image and then analyzes texture of macular region to identify abnormal macula. A novel hybrid feature set consisting of different textural and color features have been proposed. The experiments are conducted using publicly available STARE and locally available AFIO databases. Our proposed system achieves 97.5%, 83% and 95.52% sensitivity, specificity, and accuracy respectively.
{"title":"Hybrid textural feature set based automated diagnosis system for Age Related Macular Degeneration using fundus images","authors":"S. Khalid, M. Akram, Tehmina Khalil","doi":"10.1109/C-CODE.2017.7918963","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918963","url":null,"abstract":"Macula is the most sensitive component of human retina and it is responsible for sharp colored vision. Any abnormality effecting macula results in blurriness and other eye impairments. Two main abnormalities related to macula are macular edema and ARMD (Age Related Macular Degeneration). This paper focus on automated detection of ARMD using digital fundus images. The proposed technique extracts macular region automatically from input image and then analyzes texture of macular region to identify abnormal macula. A novel hybrid feature set consisting of different textural and color features have been proposed. The experiments are conducted using publicly available STARE and locally available AFIO databases. Our proposed system achieves 97.5%, 83% and 95.52% sensitivity, specificity, and accuracy respectively.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127226639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918958
Rizwan Qureshi, M. Uzair, K. Khurshid
In this busy and competitive world, though we have a lot of affection with our parents and loved ones, we can not always be with them. The advancement in the field of information technology explores new paths for healthcare and E-health systems are becoming increasingly popular. The American company Biotelemetry provides healthcare facilities wirelessly to approximately one million patients. It was the first to provide real time heartbeat ECG monitoring, analysis and response to the patients at home or anywhere. In automatic ECG analysis or E-health Systems, The analysis of the ECG wave is done automatically, instead of a doctor so a noisy ECG signal will lead to wrong clinical diagnosis. During data acquisition or transmission, several types of artifacts are embedded in the signal which degrades the signal quality and the signal does not remain faithful for clinical diagnosis. For automatic ECG analysis these artifacts should be suppressed. Many techniques are found in the literature to remove these artifacts like wavelet transform, Neural Networks and Adaptive filters. In this paper we propose novel adaptive algorithm for processing of ECG signal. A single stage adaptive filter can remove only one type of artifact from the ECG because it has only one reference input. The proposed multistage filter can eliminate multiple types of artifacts because of multiple reference inputs so it can be applied to the systems where multiple types of interference are found, provided that the apriori knowledge about the interference is available.
{"title":"Multistage Adaptive filter for ECG signal processing","authors":"Rizwan Qureshi, M. Uzair, K. Khurshid","doi":"10.1109/C-CODE.2017.7918958","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918958","url":null,"abstract":"In this busy and competitive world, though we have a lot of affection with our parents and loved ones, we can not always be with them. The advancement in the field of information technology explores new paths for healthcare and E-health systems are becoming increasingly popular. The American company Biotelemetry provides healthcare facilities wirelessly to approximately one million patients. It was the first to provide real time heartbeat ECG monitoring, analysis and response to the patients at home or anywhere. In automatic ECG analysis or E-health Systems, The analysis of the ECG wave is done automatically, instead of a doctor so a noisy ECG signal will lead to wrong clinical diagnosis. During data acquisition or transmission, several types of artifacts are embedded in the signal which degrades the signal quality and the signal does not remain faithful for clinical diagnosis. For automatic ECG analysis these artifacts should be suppressed. Many techniques are found in the literature to remove these artifacts like wavelet transform, Neural Networks and Adaptive filters. In this paper we propose novel adaptive algorithm for processing of ECG signal. A single stage adaptive filter can remove only one type of artifact from the ECG because it has only one reference input. The proposed multistage filter can eliminate multiple types of artifacts because of multiple reference inputs so it can be applied to the systems where multiple types of interference are found, provided that the apriori knowledge about the interference is available.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"513 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116564914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918924
Syed Tahir Hussain Rizvi, M. Asif, Husnain Ashfaq
In this paper, implementation of a wearable glove is presented that can be used to assist the visually impaired people. It can help the blind person to avoid hurdles using haptic and voice feedback. It does not only navigate the path to the blind person but also informs about his/her location to others through a message on the mobile device. It can help his/her caretaker (in case he is not near to the blind person) to locate him using the received coordinates from the communication module of glove having Global Positioning System (GPS) and Global System for Mobile Communication (GSM) technology. This wearable glove is physically realized by interfacing different sensors and communication modules with Arduino UNO. Different modes of obstacles detection and alerts are provided using various sensors and actuators to assist visually impaired person.
{"title":"Visual impairment aid using haptic and sound feedback","authors":"Syed Tahir Hussain Rizvi, M. Asif, Husnain Ashfaq","doi":"10.1109/C-CODE.2017.7918924","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918924","url":null,"abstract":"In this paper, implementation of a wearable glove is presented that can be used to assist the visually impaired people. It can help the blind person to avoid hurdles using haptic and voice feedback. It does not only navigate the path to the blind person but also informs about his/her location to others through a message on the mobile device. It can help his/her caretaker (in case he is not near to the blind person) to locate him using the received coordinates from the communication module of glove having Global Positioning System (GPS) and Global System for Mobile Communication (GSM) technology. This wearable glove is physically realized by interfacing different sensors and communication modules with Arduino UNO. Different modes of obstacles detection and alerts are provided using various sensors and actuators to assist visually impaired person.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918891
Muhammad Sajjad Khan, Insoo Koo
Spectrum sensing is one of the key functionalities in cognitive radio (CR) which enables opportunistic spectrum access. How to promptly sense the presence of the primary user (PU) is a key issue to CR network. The quick detection of the PU is critical such that violation of the detection on time will cause an interference to the PU. Particularly the spectrum sensing can be evaluated by how quickly it detect the changes. This involves detecting reliably and quickly possibly weak primary user signal. In this work, we propose a cluster based quickest change detection algorithm for the spectrum sensing. The Proposed scheme utilizes one-sided CUSUM (cumulative sum) algorithm at the user level, and proposed an algorithm at the cluster level which maintain 1-slot history of the user at the cluster head (CH), which also helps in detecting the change at the cluster level. CH only collect data from the users which observe change in their slot. By exploiting the advantage of one-sided CUSUM algorithm with cluster-based approach, the proposed scheme achieve the minimum detection delay subject to false alarm constraint. With simulation results, we demonstrate that the proposed scheme has faster detection as compare to conventional detection scheme.
{"title":"Primary user detection in cognitive radio networks through quickest detection","authors":"Muhammad Sajjad Khan, Insoo Koo","doi":"10.1109/C-CODE.2017.7918891","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918891","url":null,"abstract":"Spectrum sensing is one of the key functionalities in cognitive radio (CR) which enables opportunistic spectrum access. How to promptly sense the presence of the primary user (PU) is a key issue to CR network. The quick detection of the PU is critical such that violation of the detection on time will cause an interference to the PU. Particularly the spectrum sensing can be evaluated by how quickly it detect the changes. This involves detecting reliably and quickly possibly weak primary user signal. In this work, we propose a cluster based quickest change detection algorithm for the spectrum sensing. The Proposed scheme utilizes one-sided CUSUM (cumulative sum) algorithm at the user level, and proposed an algorithm at the cluster level which maintain 1-slot history of the user at the cluster head (CH), which also helps in detecting the change at the cluster level. CH only collect data from the users which observe change in their slot. By exploiting the advantage of one-sided CUSUM algorithm with cluster-based approach, the proposed scheme achieve the minimum detection delay subject to false alarm constraint. With simulation results, we demonstrate that the proposed scheme has faster detection as compare to conventional detection scheme.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130761878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918949
Z. Waheed, Amna Waheed, Madeeha Zafar, F. Riaz
Diagnosis of dermoscopic skin lesions due to skin cancer is the most challenging task for the experienced dermatologists. In this context, dermoscopy is the non-invasive useful method for the detection of skin lesions which are not visible to naked human eye. Among different types of skin cancers, malignant melanoma is the most aggressive and deadliest form of skin cancer. Its diagnosis is crucial if not detected in early stage. This paper mainly aims to present an efficient machine learning approach for the detection of melanoma from dermoscopic images. It detects melanomic skin lesions based upon their discriminating properties. In first step of proposed method, different types of color and texture features are extracted from dermoscopic images based on distinguished structures and varying intensities of melanomic lesions. In second step, extracted features are fed to the classifier to classify melanoma out of dermoscopic images. Paper also focuses on the role of color and texture features in the context of detection of melanomas. Proposed method is tested on publicly available PH2 dataset in terms of accuracy, sensitivity, specificity and Area under ROC curve (AUC). It is observed that good results are achieved using extracted features, hence proving the validity of the proposed system.
{"title":"An efficient machine learning approach for the detection of melanoma using dermoscopic images","authors":"Z. Waheed, Amna Waheed, Madeeha Zafar, F. Riaz","doi":"10.1109/C-CODE.2017.7918949","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918949","url":null,"abstract":"Diagnosis of dermoscopic skin lesions due to skin cancer is the most challenging task for the experienced dermatologists. In this context, dermoscopy is the non-invasive useful method for the detection of skin lesions which are not visible to naked human eye. Among different types of skin cancers, malignant melanoma is the most aggressive and deadliest form of skin cancer. Its diagnosis is crucial if not detected in early stage. This paper mainly aims to present an efficient machine learning approach for the detection of melanoma from dermoscopic images. It detects melanomic skin lesions based upon their discriminating properties. In first step of proposed method, different types of color and texture features are extracted from dermoscopic images based on distinguished structures and varying intensities of melanomic lesions. In second step, extracted features are fed to the classifier to classify melanoma out of dermoscopic images. Paper also focuses on the role of color and texture features in the context of detection of melanomas. Proposed method is tested on publicly available PH2 dataset in terms of accuracy, sensitivity, specificity and Area under ROC curve (AUC). It is observed that good results are achieved using extracted features, hence proving the validity of the proposed system.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918928
Fakhra Aftab, M. A. Ismail
W3C Web Ontology Working Group developed Web Ontology language (OWL) for sharing and distributing semantically marked up ontologies for next generation Web. Simulation, on the other hand, is used to evaluate any proposed system under different configuration scenarios. In this paper, a new web ontology based multi-level CACHE Simulator is presented that is developed at NED University. It is a trace driven multi-level cache simulator implemented using modular approach. Its unique and significant feature is the Ontology Generation of CACHE model according to user's input that introduces the idea of online simulation, data portability and reusability. It is developed using Java Programming Language with OWL 2 API. The generated ontologies have been verified using standard reasoners.
W3C Web Ontology工作组开发了Web Ontology语言(OWL),用于下一代Web的语义标记本体的共享和分发。另一方面,仿真用于在不同配置场景下评估任何提出的系统。本文介绍了NED大学开发的一种基于web本体的多级缓存模拟器。它是采用模块化方法实现的跟踪驱动多级缓存模拟器。其独特而显著的特点是基于用户输入的缓存模型本体生成,引入了在线仿真、数据可移植性和可重用性的思想。本系统采用Java编程语言开发,采用owl2 API。生成的本体已经使用标准推理器进行了验证。
{"title":"Web Ontology based multi-level CACHE Simulator","authors":"Fakhra Aftab, M. A. Ismail","doi":"10.1109/C-CODE.2017.7918928","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918928","url":null,"abstract":"W3C Web Ontology Working Group developed Web Ontology language (OWL) for sharing and distributing semantically marked up ontologies for next generation Web. Simulation, on the other hand, is used to evaluate any proposed system under different configuration scenarios. In this paper, a new web ontology based multi-level CACHE Simulator is presented that is developed at NED University. It is a trace driven multi-level cache simulator implemented using modular approach. Its unique and significant feature is the Ontology Generation of CACHE model according to user's input that introduces the idea of online simulation, data portability and reusability. It is developed using Java Programming Language with OWL 2 API. The generated ontologies have been verified using standard reasoners.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131392567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918916
Maryam Jamal, Nazir Ahmad Zafar
Agent-based Mobile Petri Nets are a powerful variant of classical Petri Nets which integrate mobile agent technology. A mobile agent migrates among heterogeneous platforms by acquiring their services to perform its goal. Agent-based Mobile Petri Nets effectively model mobility, concurrency and distributed nature of a mobile agent. However, security aspects related to mobile agent's mobility are still lacking. This paper has enriched Agent-based Mobile Petri Nets with access control mechanisms. Two access control mechanisms namely; static and dynamic, have been integrated in Agent-based Mobile Petri Nets. For static access control, each mobile agent net is equipped with an access control list which defines a fixed list and access rights for visiting mobile agents. For dynamic access control, access control matrix has been associated with each mobile agent net for granting the visiting mobile agents with respective privileges. The assigned privileges are not fixed and they change with state of agent net. Finally the proposed access control mechanisms are verified with a case study.
{"title":"Extending agent-based Mobile Petri Nets with access control","authors":"Maryam Jamal, Nazir Ahmad Zafar","doi":"10.1109/C-CODE.2017.7918916","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918916","url":null,"abstract":"Agent-based Mobile Petri Nets are a powerful variant of classical Petri Nets which integrate mobile agent technology. A mobile agent migrates among heterogeneous platforms by acquiring their services to perform its goal. Agent-based Mobile Petri Nets effectively model mobility, concurrency and distributed nature of a mobile agent. However, security aspects related to mobile agent's mobility are still lacking. This paper has enriched Agent-based Mobile Petri Nets with access control mechanisms. Two access control mechanisms namely; static and dynamic, have been integrated in Agent-based Mobile Petri Nets. For static access control, each mobile agent net is equipped with an access control list which defines a fixed list and access rights for visiting mobile agents. For dynamic access control, access control matrix has been associated with each mobile agent net for granting the visiting mobile agents with respective privileges. The assigned privileges are not fixed and they change with state of agent net. Finally the proposed access control mechanisms are verified with a case study.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115406802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918934
M. Kamran, Mubashir Ali, Adeel Ahmed
The process of building an understanding of the existing system is time consuming and takes a big portion of the allocated time for a maintenance task. Numerous efforts have been made to reduce the time consumed in the program comprehension process by providing support to the programmer during this phase. The segments of the program that can be attractive from the comprehension viewpoint must be brought into the notice of the programmer. The key contribution of this paper is a heuristic approach that can aid the programmer by automatically suggesting the classes that are potentially interesting for the initial stages of the program comprehension process.
{"title":"Generating suggestions for initial program investigation using Dynamic Analysis","authors":"M. Kamran, Mubashir Ali, Adeel Ahmed","doi":"10.1109/C-CODE.2017.7918934","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918934","url":null,"abstract":"The process of building an understanding of the existing system is time consuming and takes a big portion of the allocated time for a maintenance task. Numerous efforts have been made to reduce the time consumed in the program comprehension process by providing support to the programmer during this phase. The segments of the program that can be attractive from the comprehension viewpoint must be brought into the notice of the programmer. The key contribution of this paper is a heuristic approach that can aid the programmer by automatically suggesting the classes that are potentially interesting for the initial stages of the program comprehension process.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114799529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918957
Hajra Masood, Humera Farooq
Gait recognition based person identification through visual analysis is preferred over other biometric because gait is the only biometric trait that is perceivable from remote distance, extractable from low quality visuals and did not require subject's cooperation for data collection. Extensive research in the field of vision based gait recognition have enable researchers to achieve milestones of person identification, age estimation and gender recognition through visual analysis of gait. Moreover, rapid growth of security camera networks and sparse implementation of visual analysis on security visuals urges researchers to design vision based gait recognition systems for person identification. Person identification based on gait recognition can be implemented for monitoring of abnormal activities at public places and for access control of security critical places. Gait biometric based access control systems are equally vulnerable to spoofing attacks despite of passive and unnoticeable mode of action. In order to address limitations of vision based gait biometrics system under spoofing attacks, this paper proposed a methodology for detection of targeted spoofing attacks with different scenarios. The main contribution is to figure out replication of clothing, physical structure and gait dynamics can affect classification result. Since spoofing attacks against gait biometric systems are less explored, testing strategies are also suggested in the proposed work
{"title":"A proposed framework for vision based gait biometric system against spoofing attacks","authors":"Hajra Masood, Humera Farooq","doi":"10.1109/C-CODE.2017.7918957","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918957","url":null,"abstract":"Gait recognition based person identification through visual analysis is preferred over other biometric because gait is the only biometric trait that is perceivable from remote distance, extractable from low quality visuals and did not require subject's cooperation for data collection. Extensive research in the field of vision based gait recognition have enable researchers to achieve milestones of person identification, age estimation and gender recognition through visual analysis of gait. Moreover, rapid growth of security camera networks and sparse implementation of visual analysis on security visuals urges researchers to design vision based gait recognition systems for person identification. Person identification based on gait recognition can be implemented for monitoring of abnormal activities at public places and for access control of security critical places. Gait biometric based access control systems are equally vulnerable to spoofing attacks despite of passive and unnoticeable mode of action. In order to address limitations of vision based gait biometrics system under spoofing attacks, this paper proposed a methodology for detection of targeted spoofing attacks with different scenarios. The main contribution is to figure out replication of clothing, physical structure and gait dynamics can affect classification result. Since spoofing attacks against gait biometric systems are less explored, testing strategies are also suggested in the proposed work","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122757529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-03-01DOI: 10.1109/C-CODE.2017.7918902
Syed Bilal Hussain Shah, F. Yin, Zhe Chen, I. Khan
The routing protocols are of great importance to researchers which deal with the QoS, energy consumption, network design and packet overhead. This paper describes a new method for efficient performance of wireless sensor networks concentrating on cluster design strategy. The proposed approach Water-Rippling Shaped Clustering (WARIS), is a hybrid approach applies to cluster the large-scale network which looks like the shape of water rippling. It considers the parameters like per node energy consumption, total network energy consumption, the number of designed clusters and their member nodes, and the time spent during cluster design for evaluating the performance of competing algorithms. Major achievements are improved cluster design, energy aware cluster head (CH) selection method and reducing re-clustering overhead. Simulation results prove the enhancements.
{"title":"An efficient cluster designing mechanism for Wireless Sensor Networks","authors":"Syed Bilal Hussain Shah, F. Yin, Zhe Chen, I. Khan","doi":"10.1109/C-CODE.2017.7918902","DOIUrl":"https://doi.org/10.1109/C-CODE.2017.7918902","url":null,"abstract":"The routing protocols are of great importance to researchers which deal with the QoS, energy consumption, network design and packet overhead. This paper describes a new method for efficient performance of wireless sensor networks concentrating on cluster design strategy. The proposed approach Water-Rippling Shaped Clustering (WARIS), is a hybrid approach applies to cluster the large-scale network which looks like the shape of water rippling. It considers the parameters like per node energy consumption, total network energy consumption, the number of designed clusters and their member nodes, and the time spent during cluster design for evaluating the performance of competing algorithms. Major achievements are improved cluster design, energy aware cluster head (CH) selection method and reducing re-clustering overhead. Simulation results prove the enhancements.","PeriodicalId":344222,"journal":{"name":"2017 International Conference on Communication, Computing and Digital Systems (C-CODE)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116392982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}