首页 > 最新文献

2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

英文 中文
Low-complexity registration of visual imagery with 3-D LiDAR 三维激光雷达视觉图像的低复杂度配准
Prakash Duraisamy, B. Yassine, Ye Yu, S. Jackson, K. Namuduri, B. Buckles
A robust 3-D model reconstruction plays vital role in many real world applications like city planning, architecture design and cartography. In this paper, we develop a low complexity robust hybrid model-based algorithm for registering oblique aerial images onto a 3D model generated from airborne Light Detection and Ranging data. Our proposed algorithm consists of two steps. In the first step, we use an intelligent search process to roughly estimate the extrinsic parameters of a calibrated camera without any apriori knowledge. The estimated camera parameters are used to transform the Digital Surface Model (DSM) to a view close to the view from which the visual image is taken. The second step is an adjustment process, in which we determine the transformation that maps the visual image onto DSM. Experiments were conducted on a real world datasets.
一个强大的三维模型重建在城市规划、建筑设计和制图等许多现实应用中起着至关重要的作用。在本文中,我们开发了一种低复杂度的鲁棒混合模型算法,用于将倾斜航空图像配准到由机载光探测和测距数据生成的3D模型上。我们提出的算法包括两个步骤。在第一步中,我们使用智能搜索过程来粗略估计校准相机的外部参数,而不需要任何先验知识。估计的相机参数用于将数字表面模型(DSM)转换为接近视觉图像拍摄视图的视图。第二步是调整过程,在此过程中,我们确定将视觉图像映射到DSM的转换。实验是在真实世界的数据集上进行的。
{"title":"Low-complexity registration of visual imagery with 3-D LiDAR","authors":"Prakash Duraisamy, B. Yassine, Ye Yu, S. Jackson, K. Namuduri, B. Buckles","doi":"10.1109/ICCCNT.2012.6479591","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6479591","url":null,"abstract":"A robust 3-D model reconstruction plays vital role in many real world applications like city planning, architecture design and cartography. In this paper, we develop a low complexity robust hybrid model-based algorithm for registering oblique aerial images onto a 3D model generated from airborne Light Detection and Ranging data. Our proposed algorithm consists of two steps. In the first step, we use an intelligent search process to roughly estimate the extrinsic parameters of a calibrated camera without any apriori knowledge. The estimated camera parameters are used to transform the Digital Surface Model (DSM) to a view close to the view from which the visual image is taken. The second step is an adjustment process, in which we determine the transformation that maps the visual image onto DSM. Experiments were conducted on a real world datasets.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting salient regions in static images 检测静态图像中的显著区域
G. Cheng, E. Ayeh, Ziming Zhang
Computational visual attention systems, which aim at detecting salient regions in images, have been the subject of research for more than two decades. In this paper, we propose a novel approach (SEC) to detect salient regions in static images. This method is composed of two modules: segmentation-based entropy computation to determine the information content of clusters and local color contrast computation to enhance the saliency. DBSCAN is used first to segment the image. Then, the entropies of the resulting segments are computed. Spatial information of each segment size and cohesion is employed to adjust the entropy in terms of distinctiveness. Color contrast between adjacent segments is then computed and combined with spatial information to determine the most salient regions within the input image. We conducted two types of experiments, and compared visually and quantitatively with existing methods.
计算视觉注意系统,旨在检测图像中的显著区域,已经被研究了二十多年。在本文中,我们提出了一种新的方法(SEC)来检测静态图像中的显著区域。该方法由两个模块组成:基于分割的熵计算来确定聚类的信息含量和局部颜色对比计算来增强显著性。首先使用DBSCAN对图像进行分割。然后,计算结果段的熵。利用每个片段的空间信息大小和内聚来调整熵的显著性。然后计算相邻部分之间的颜色对比度,并结合空间信息来确定输入图像中最显著的区域。我们进行了两类实验,并与现有方法进行了直观和定量的比较。
{"title":"Detecting salient regions in static images","authors":"G. Cheng, E. Ayeh, Ziming Zhang","doi":"10.1109/ICCCNT.2012.6477848","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6477848","url":null,"abstract":"Computational visual attention systems, which aim at detecting salient regions in images, have been the subject of research for more than two decades. In this paper, we propose a novel approach (SEC) to detect salient regions in static images. This method is composed of two modules: segmentation-based entropy computation to determine the information content of clusters and local color contrast computation to enhance the saliency. DBSCAN is used first to segment the image. Then, the entropies of the resulting segments are computed. Spatial information of each segment size and cohesion is employed to adjust the entropy in terms of distinctiveness. Color contrast between adjacent segments is then computed and combined with spatial information to determine the most salient regions within the input image. We conducted two types of experiments, and compared visually and quantitatively with existing methods.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an approach for improved security in wireless sensor networks 一种提高无线传感器网络安全性的方法
T. Thenmozhi, R. Somasundaram
Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.
无线传感器网络由大量低成本、资源受限的传感器节点组成。每个节点都必须感知某些现象,并将其数据转发给中心节点,该中心节点也称为基站。应用范围包括基本数据读取,如温度到各种应用,包括农业。大量的工作发生在传感器器件的设计和分析中。这些传感器可以处理高水平的数据交换而不降低性能。交换的数据至关重要,需要以高度机密的方式处理。尽管存在提供数据机密性机制的安全算法,但为了提高安全性水平,对改进的需求正在增加。黑客可以从节点级到进程级。本文概述了无线传感器网络中的各种安全问题,并提出了改进的余地。
{"title":"Towards an approach for improved security in wireless sensor networks","authors":"T. Thenmozhi, R. Somasundaram","doi":"10.1109/ICCCNT.2012.6395920","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395920","url":null,"abstract":"Wireless sensor networks are of a large number of low cost resource constrained sensor nodes. Each node has to sense certain phenomena and forward its data towards a central node, which is also called the base station. The range of applications include basic data reading like temperature to a wide variety of applications including agriculture. A large amount of work has happened into the design and analysis of the sensor devices. These sensor can handle high level of data exchange without reduction in performance. The data to be exchanged are of vital importance and need to be handled with high level of confidentiality. Though there are security algorithms that offers mechanisms for data confidentiality there is a rising need for improvement for better level of security. The hackers can be from node level to process level. This paper outlines the different security issues in wireless sensor network and provides scope for improvement.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gain scheduling adaptive model predictive controller for two conical tank interacting level system 双锥槽交互液位系统增益调度自适应模型预测控制器
V. Ravi, T. Thyagarajan, S. Y. Priyadharshni
Model predictive control (MPC) has become the leading form of advanced multivariable control in the chemical process industry. The objective of this work is to introduce a gain scheduling control strategy for multivariable MPC. The method of approach is to design multiple linear MPC controllers. This strategy maintains performance of multiple linear MPC controllers over a wide range of operating levels. One important contribution is that the strategy combines several multiple linear MPC controllers, each with their own linear state space model describing process dynamics at a specific level of operation. One of the linear MPC controller output is selected as gain scheduling adaptive controller's output based on the current value of the measured process variable. The tuning parameters for the MPC controller are obtained using real coded Genetic Algorithm (GA). The capabilities of the gain scheduling adaptive (GSA) control strategy for MPC controller are investigated on Two Conical Tank Interacting Level System (TCTILS) through computer simulation.
模型预测控制(MPC)已成为化工过程中先进多变量控制的主要形式。本文的目的是介绍一种多变量MPC的增益调度控制策略。方法是设计多个线性MPC控制器。该策略在广泛的操作水平范围内保持多个线性MPC控制器的性能。一个重要的贡献是该策略结合了几个多个线性MPC控制器,每个控制器都有自己的线性状态空间模型,描述特定操作级别的过程动态。根据测量过程变量的当前值,选择线性MPC控制器的一个输出作为增益调度自适应控制器的输出。采用实数编码遗传算法获得了MPC控制器的整定参数。通过计算机仿真研究了增益调度自适应(GSA) MPC控制器控制策略在双锥槽相互作用液位系统(TCTILS)上的性能。
{"title":"Gain scheduling adaptive model predictive controller for two conical tank interacting level system","authors":"V. Ravi, T. Thyagarajan, S. Y. Priyadharshni","doi":"10.1109/ICCCNT.2012.6396058","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396058","url":null,"abstract":"Model predictive control (MPC) has become the leading form of advanced multivariable control in the chemical process industry. The objective of this work is to introduce a gain scheduling control strategy for multivariable MPC. The method of approach is to design multiple linear MPC controllers. This strategy maintains performance of multiple linear MPC controllers over a wide range of operating levels. One important contribution is that the strategy combines several multiple linear MPC controllers, each with their own linear state space model describing process dynamics at a specific level of operation. One of the linear MPC controller output is selected as gain scheduling adaptive controller's output based on the current value of the measured process variable. The tuning parameters for the MPC controller are obtained using real coded Genetic Algorithm (GA). The capabilities of the gain scheduling adaptive (GSA) control strategy for MPC controller are investigated on Two Conical Tank Interacting Level System (TCTILS) through computer simulation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
P2P Botnet detection: Combined host- and network-level analysis P2P僵尸网络检测:结合主机和网络级分析
K. Muthumanickam, E. Ilavarasan
As Internet becomes part of our daily life, Botnet (BotNetwork) attacker take advantage of it to misuse in different ways. Botnet is a collection of interconnected compromised computers (Bots) which are remotely controlled by its owner (BotMaster) under a common command-and-control(C&C) infrastructure. Botnets can be innovatively designed propositionally for technology improvement, which makes the bonet detection a challenging problem. As P2P (peer to peer) Botnet has a unique distributed attacking behavior, it is difficult to detect this bot. Thus to build an efficient botnet detection system we coined a framework that combines host level information and network level information for p2p botnet detection.
随着互联网成为我们日常生活的一部分,僵尸网络攻击者利用互联网进行各种方式的滥用。僵尸网络是一组相互连接的受感染计算机(Bots),它们由其所有者(BotMaster)在通用命令与控制(C&C)基础设施下远程控制。为了技术的改进,可以对僵尸网络进行创新设计,这使得僵尸网络的检测成为一个具有挑战性的问题。由于P2P(点对点)僵尸网络具有独特的分布式攻击行为,因此很难检测到这种僵尸网络。为了构建高效的僵尸网络检测系统,我们提出了一个结合主机级信息和网络级信息的p2p僵尸网络检测框架。
{"title":"P2P Botnet detection: Combined host- and network-level analysis","authors":"K. Muthumanickam, E. Ilavarasan","doi":"10.1109/ICCCNT.2012.6395940","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395940","url":null,"abstract":"As Internet becomes part of our daily life, Botnet (BotNetwork) attacker take advantage of it to misuse in different ways. Botnet is a collection of interconnected compromised computers (Bots) which are remotely controlled by its owner (BotMaster) under a common command-and-control(C&C) infrastructure. Botnets can be innovatively designed propositionally for technology improvement, which makes the bonet detection a challenging problem. As P2P (peer to peer) Botnet has a unique distributed attacking behavior, it is difficult to detect this bot. Thus to build an efficient botnet detection system we coined a framework that combines host level information and network level information for p2p botnet detection.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129340211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On proposing automobile accident prevention system (A2PS) using wireless sensors and zigbee technology 提出基于无线传感器和zigbee技术的汽车事故预防系统(A2PS)
M. Rajesh, D. Muruganandam
A disaster is a deviation from planned or expected behavior or a course of event that endangers or adversely affects people, property, or the environment. This paper proposes a realtime accident prevention system combining signal processing and zigbee technique, that gets triggered by rash driving. The objective is to detect speed patterns in the driver's driving and alert the guard if certain patterns repeatedly occur. Several patterns are identified which are linked to irresponsible driving. The fluctuations in acceleration and deceleration for a period of time is measured by a sensor attached to the accelerator and the footbrake. This sensor gives inputs to the microcontroller kit, based on the amount of pressure on the accelerator / brake. The microcontroller in the system ascertains the traffic conditions, based on these variations in speed. Once the driving pattern matches the pre-defined pattern of rash driving in heavy or low traffic region, an alarm is sent to the driver along with the speed recommended. If the vehicle continues to travel in the same manner as before, an Zbee module in a Zigbee network sends an alert, giving details of the vehicle, the date and time of violation to the nearest control room. This will allow early response and rescue of accidents.
灾难是一种偏离计划或预期的行为或事件的过程,危及或对人、财产或环境产生不利影响。提出了一种结合信号处理和zigbee技术的交通事故实时预防系统。目的是检测驾驶员驾驶中的速度模式,并在某些模式重复出现时向警卫发出警报。发现了几种与不负责任驾驶有关的模式。在一段时间内,加速和减速的波动是由附着在加速器和脚制动器上的传感器测量的。该传感器根据加速器/制动器上的压力量向微控制器套件提供输入。系统中的微控制器根据这些速度变化来确定交通状况。一旦驾驶模式符合预先设定的在繁忙或低交通区域的鲁莽驾驶模式,就会向驾驶员发送警报并建议速度。如果车辆继续以同样的方式行驶,Zigbee网络中的Zbee模块将发送警报,向最近的控制室提供车辆的详细信息、违规日期和时间。这将有助于事故的早期反应和救援。
{"title":"On proposing automobile accident prevention system (A2PS) using wireless sensors and zigbee technology","authors":"M. Rajesh, D. Muruganandam","doi":"10.1109/ICCCNT.2012.6396066","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396066","url":null,"abstract":"A disaster is a deviation from planned or expected behavior or a course of event that endangers or adversely affects people, property, or the environment. This paper proposes a realtime accident prevention system combining signal processing and zigbee technique, that gets triggered by rash driving. The objective is to detect speed patterns in the driver's driving and alert the guard if certain patterns repeatedly occur. Several patterns are identified which are linked to irresponsible driving. The fluctuations in acceleration and deceleration for a period of time is measured by a sensor attached to the accelerator and the footbrake. This sensor gives inputs to the microcontroller kit, based on the amount of pressure on the accelerator / brake. The microcontroller in the system ascertains the traffic conditions, based on these variations in speed. Once the driving pattern matches the pre-defined pattern of rash driving in heavy or low traffic region, an alarm is sent to the driver along with the speed recommended. If the vehicle continues to travel in the same manner as before, an Zbee module in a Zigbee network sends an alert, giving details of the vehicle, the date and time of violation to the nearest control room. This will allow early response and rescue of accidents.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mining the customer behavior using web usage mining in e-commerce 利用网络使用挖掘技术挖掘电子商务中的客户行为
Mahendra Pratap Yadav
With the explosive growth of information sources available on the WWW, it has become an important tool for users in order to find, extract, filter and evaluate the desired information and resources. The main purpose of this paper is to study the customer's behavior using the Web mining techniques and its application in e-commerce to mine customer behavior. The concept of Web mining describing the process of Web data mining in detail: source data collection, data pre-processing, pattern discovery, pattern analysis and cluster analysis. With the advanced information technologies, server are now able to collect and store mountains of data, describing their numerous contributions and different customer profiles, from which they seek to derive information about their customer's requirements. Conventional methods are no longer appropriate for these business situations to find the customer behavior. The principle of data mining is to cluster customer segments by using K-Means algorithm in which input data comes from web log of various e-commerce websites. Hence, determine the relationship between Web data mining and e-commerce and also to apply Web mining technology in e-commerce.
随着万维网上可用信息源的爆炸式增长,它已成为用户查找、提取、过滤和评估所需信息和资源的重要工具。本文的主要目的是利用Web挖掘技术研究客户行为,并将其应用于电子商务中对客户行为进行挖掘。Web挖掘的概念详细描述了Web数据挖掘的过程:源数据采集、数据预处理、模式发现、模式分析和聚类分析。随着先进的信息技术的发展,服务器现在能够收集和存储大量的数据,这些数据描述了他们的大量贡献和不同的客户档案,从中他们寻求获得有关客户需求的信息。传统的方法不再适合这些业务情况来发现客户的行为。数据挖掘的原理是利用K-Means算法对客户群进行聚类,该算法的输入数据来源于各电子商务网站的web日志。因此,确定了Web数据挖掘与电子商务的关系,并将Web挖掘技术应用于电子商务。
{"title":"Mining the customer behavior using web usage mining in e-commerce","authors":"Mahendra Pratap Yadav","doi":"10.1109/ICCCNT.2012.6395938","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395938","url":null,"abstract":"With the explosive growth of information sources available on the WWW, it has become an important tool for users in order to find, extract, filter and evaluate the desired information and resources. The main purpose of this paper is to study the customer's behavior using the Web mining techniques and its application in e-commerce to mine customer behavior. The concept of Web mining describing the process of Web data mining in detail: source data collection, data pre-processing, pattern discovery, pattern analysis and cluster analysis. With the advanced information technologies, server are now able to collect and store mountains of data, describing their numerous contributions and different customer profiles, from which they seek to derive information about their customer's requirements. Conventional methods are no longer appropriate for these business situations to find the customer behavior. The principle of data mining is to cluster customer segments by using K-Means algorithm in which input data comes from web log of various e-commerce websites. Hence, determine the relationship between Web data mining and e-commerce and also to apply Web mining technology in e-commerce.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130568421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Patient monitoring system using Wireless Sensor based Mesh Network 基于Mesh网络的无线传感器病人监护系统
B. Vijayalakshmi, C. Ram Kumar
Wireless Sensor Networks (WSN) is a significant technology that has a considerable attraction in many areas, particularly in health sector. On the other hand Wireless Mesh Networks (WMN), which are an extension of LAN, have far better range and also reduce the amount of cabling needed to connect to the backbone network. In this paper a scheme that is Wireless Sensor based Mesh Networks, which is an integration of the above two technologies has been used for monitoring the patients status as follows: The patient's temperature, heart beat and pressure is monitored automatically using a bio-medical kit that is connected with the patient. A LCD is provided with the kit that is used to notify the nurse about the patient's health status. The information is then sent to a mesh node through Zigbee technology. The mesh node is generally a PC that helps the duty doctor to monitor all the wards that are present in the hospital. This ensures that the patient's health status is monitored even in the absence of the nurse. From the mesh node, a SMS is sent to specified doctors through GSM connection. With the help of the information got through SMS, the doctors can be able to attend the patient very quickly. Since the monitoring is done automatically there is no need for any person to look after the patient.
无线传感器网络(WSN)是一项重要的技术,在许多领域,特别是在卫生部门具有相当大的吸引力。另一方面,无线网状网络(WMN)是局域网的一种扩展,它的覆盖范围要大得多,而且还减少了连接到骨干网络所需的电缆数量。本文采用基于Mesh网络的无线传感器方案,将上述两种技术相结合,实现了对患者状态的监测:通过与患者连接的生物医疗包,自动监测患者的体温、心跳和血压。整套设备配有液晶显示器,用于通知护士患者的健康状况。然后通过Zigbee技术将信息发送到网状节点。网状节点通常是一台PC,帮助值班医生监控医院里的所有病房。这确保了即使在护士不在的情况下也能监测病人的健康状况。在mesh节点上,通过GSM连接向指定的医生发送短信。有了通过短信获得的信息的帮助,医生可以非常迅速地照顾病人。由于监测是自动完成的,所以不需要任何人来照顾病人。
{"title":"Patient monitoring system using Wireless Sensor based Mesh Network","authors":"B. Vijayalakshmi, C. Ram Kumar","doi":"10.1109/ICCCNT.2012.6396102","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396102","url":null,"abstract":"Wireless Sensor Networks (WSN) is a significant technology that has a considerable attraction in many areas, particularly in health sector. On the other hand Wireless Mesh Networks (WMN), which are an extension of LAN, have far better range and also reduce the amount of cabling needed to connect to the backbone network. In this paper a scheme that is Wireless Sensor based Mesh Networks, which is an integration of the above two technologies has been used for monitoring the patients status as follows: The patient's temperature, heart beat and pressure is monitored automatically using a bio-medical kit that is connected with the patient. A LCD is provided with the kit that is used to notify the nurse about the patient's health status. The information is then sent to a mesh node through Zigbee technology. The mesh node is generally a PC that helps the duty doctor to monitor all the wards that are present in the hospital. This ensures that the patient's health status is monitored even in the absence of the nurse. From the mesh node, a SMS is sent to specified doctors through GSM connection. With the help of the information got through SMS, the doctors can be able to attend the patient very quickly. Since the monitoring is done automatically there is no need for any person to look after the patient.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Data repliation techniques in MANETS MANETS中的数据复制技术
M. Qayyum, M. Husamuddin
Data Replication Techniques in Mobile Adhoc Networks is presented in this paper and discussed about the Data Replication Technique for Real-Time Ad Hoc Mobile Databases (DREAM); Collaborative Allocation and Deallocation of Replicas with Efficiency (CADRE); Consistency and Load Based Efficicient Allocation of Replicas (CLEAR); Expanding Ring Replication; Distributed Hash Table Replication (DHTR); Hara's Data Replication Schemes; An Economic Model for Effcient Dynamic Replication in Mobile-P2P networks (EcoRep).
介绍了移动自组织网络中的数据复制技术,讨论了实时自组织移动数据库(DREAM)的数据复制技术;基于效率的副本协同分配与回收(CADRE)基于一致性和负载的副本高效分配(CLEAR)扩展环复制;分布式哈希表复制;Hara的数据复制方案;移动p2p网络(EcoRep)中高效动态复制的经济模型。
{"title":"Data repliation techniques in MANETS","authors":"M. Qayyum, M. Husamuddin","doi":"10.1109/ICCCNT.2012.6395988","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395988","url":null,"abstract":"Data Replication Techniques in Mobile Adhoc Networks is presented in this paper and discussed about the Data Replication Technique for Real-Time Ad Hoc Mobile Databases (DREAM); Collaborative Allocation and Deallocation of Replicas with Efficiency (CADRE); Consistency and Load Based Efficicient Allocation of Replicas (CLEAR); Expanding Ring Replication; Distributed Hash Table Replication (DHTR); Hara's Data Replication Schemes; An Economic Model for Effcient Dynamic Replication in Mobile-P2P networks (EcoRep).","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power control with QoS constraints in WSN using game theoretic approach 基于博弈论的无线传感器网络QoS约束功率控制
R. Valli, P. Dananjayan
The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.
无线传感器网络(WSN)的主要问题是功率控制,因为传感器的电池无法充电或更换。传感器以高功率传输,使其传输成功。高功率传输不仅会降低节点和网络的寿命,还会引入过多的干扰。因此,每个节点都应在满足服务质量(QoS)要求的情况下,以最小的功率进行传输。在考虑QoS要求的情况下,提出了一种带有错误控制编码(ECC)的功率控制对策。从误码率(BER)、吞吐量和延迟三个方面对满足QoS延迟约束的无线传感器网络功率控制博弈的性能进行了评价。
{"title":"Power control with QoS constraints in WSN using game theoretic approach","authors":"R. Valli, P. Dananjayan","doi":"10.1109/ICCCNT.2012.6396104","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396104","url":null,"abstract":"The major issue in wireless sensor network (WSN) is the power control since it is impossible to recharge or replace the batteries of the sensors. The sensors transmit at high power to make its transmission successful. Transmitting at high power not only reduces the lifetime of the nodes and that of the network, it also introduces excessive interference. Therefore, every node should transmit at minimal power while satisfying the quality of service (QoS) requirements. This paper proposes a power control game with error control coding (ECC) while considering the QoS requirements. The performance of the power control game satisfying QoS delay constraints with Reed Solomon (RS) and Multivariate Interpolation Decoded RS code (MIDRS) code for WSN is evaluated in terms of bit error rate (BER), throughput and delay.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1