Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342978
Zhenshan Liu, Qingxian Wang, Junyong Luo
Most existed distributed topology discovery applications deploy multiple probing hosts throughout the network. Paths are then probed from the individual points and the data later is unified into a single topology graph. This approach relies on the ability to deploy probing hosts throughout the network, which in many cases is not possible. This paper presents MTAS (multi tunnel access system), a system which deploys probing hosts in a single IPv4 subnet. Each probing host creates an IPv6 over IPv4 tunnel to reach an ISATAP (intra-site automatic tunnel addressing protocol) or 6to4 relay router which distributed in the world and provides service for public. In MTAS, ISATAP and 6 to 4 relay routers just work like probing springboards distributed in different location for IPv6 network topology discovery, so MTAS is a handy distributed application. To avoid retracing the same trace route paths, MTAS system deploys a middle database to store the collected path. The authors also present some preliminary test results from probing CERNET2, the largest native IPv6 network in China. And the test results illustrate the effectiveness of MTAS.
大多数现有的分布式拓扑发现应用程序在整个网络中部署多个探测主机。然后从单个点探测路径,然后将数据统一到单个拓扑图中。这种方法依赖于在整个网络中部署探测主机的能力,这在许多情况下是不可能的。MTAS(多隧道接入系统)是一种在单个IPv4子网中部署探测主机的系统。每个探测主机创建一条IPv6 over IPv4隧道,到达一个ISATAP(站点内自动隧道寻址协议)或6to4中继路由器,该路由器分布在世界各地,为公众提供服务。在MTAS中,ISATAP和6到4中继路由器就像探测分布在不同位置的跳板一样工作,用于IPv6网络拓扑发现,因此MTAS是一个方便的分布式应用程序。为了避免重复跟踪相同的跟踪路由路径,MTAS系统部署了一个中间数据库来存储收集到的路径。作者还介绍了中国最大的本地IPv6网络CERNET2的初步测试结果。测试结果表明了该方法的有效性。
{"title":"A new distributed topology discovery technology for IPv6 networks","authors":"Zhenshan Liu, Qingxian Wang, Junyong Luo","doi":"10.1109/SECON.2007.342978","DOIUrl":"https://doi.org/10.1109/SECON.2007.342978","url":null,"abstract":"Most existed distributed topology discovery applications deploy multiple probing hosts throughout the network. Paths are then probed from the individual points and the data later is unified into a single topology graph. This approach relies on the ability to deploy probing hosts throughout the network, which in many cases is not possible. This paper presents MTAS (multi tunnel access system), a system which deploys probing hosts in a single IPv4 subnet. Each probing host creates an IPv6 over IPv4 tunnel to reach an ISATAP (intra-site automatic tunnel addressing protocol) or 6to4 relay router which distributed in the world and provides service for public. In MTAS, ISATAP and 6 to 4 relay routers just work like probing springboards distributed in different location for IPv6 network topology discovery, so MTAS is a handy distributed application. To avoid retracing the same trace route paths, MTAS system deploys a middle database to store the collected path. The authors also present some preliminary test results from probing CERNET2, the largest native IPv6 network in China. And the test results illustrate the effectiveness of MTAS.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125011691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342856
L. Seiber, G. Armstrong
As capacitor manufacturers race to meet the needs of the hybrid-electric vehicle (HEV) of the future, many trade-offs at the system level as well as the component level must be considered. Even though the ultra-capacitor has the spot light for recent research and development (R&D) for HEVs, the electrostatic capacitor is also the subject of R&D (for HEVs as well as wireless communications). The Department of Energy has funded the Oak Ridge National Laboratory's Power Electronic and Electric Machinery Research Center to develop an automated test to aid in the independent testing of prototype electrostatic capacitors. This paper describes the design and development of such a stand.
{"title":"Automated test stand for HEV capacitor testing","authors":"L. Seiber, G. Armstrong","doi":"10.1109/SECON.2007.342856","DOIUrl":"https://doi.org/10.1109/SECON.2007.342856","url":null,"abstract":"As capacitor manufacturers race to meet the needs of the hybrid-electric vehicle (HEV) of the future, many trade-offs at the system level as well as the component level must be considered. Even though the ultra-capacitor has the spot light for recent research and development (R&D) for HEVs, the electrostatic capacitor is also the subject of R&D (for HEVs as well as wireless communications). The Department of Energy has funded the Oak Ridge National Laboratory's Power Electronic and Electric Machinery Research Center to develop an automated test to aid in the independent testing of prototype electrostatic capacitors. This paper describes the design and development of such a stand.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116044538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342906
Lei Zhu, Chun Tang
In the information age, career and life-long learning are increasingly dependent on information-retrieval (IR) skills to utilize digital and on-line information effectively, and IR deserves more attention as an integral element of many disciplines. This paper presents a module-based approach, which aims to integrate IR into undergraduate curricula of multiple disciplines by developing and adopting appropriate IR course modules based on specific needs of different programs. Particularly, a detailed evaluation procedure will be described in order to assess the effectiveness of the module-based approach.
{"title":"Evaluation procedure of a module-based approach for undergraduate information retrieval education","authors":"Lei Zhu, Chun Tang","doi":"10.1109/SECON.2007.342906","DOIUrl":"https://doi.org/10.1109/SECON.2007.342906","url":null,"abstract":"In the information age, career and life-long learning are increasingly dependent on information-retrieval (IR) skills to utilize digital and on-line information effectively, and IR deserves more attention as an integral element of many disciplines. This paper presents a module-based approach, which aims to integrate IR into undergraduate curricula of multiple disciplines by developing and adopting appropriate IR course modules based on specific needs of different programs. Particularly, a detailed evaluation procedure will be described in order to assess the effectiveness of the module-based approach.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342904
E. Sheybani, G. Javidi
Technology is having a dramatic effect on colleges and universities, producing what may be the most challenging period in the history of higher education. One form of the convergence of technology and education is distributed learning. The World Wide Web (WWW) provides alternative means for delivery of the courses and services, providing learners with an extraordinary range of options. Distance learning methods are being developed and implemented to offer educational opportunities to those who are unable or choose not to attend an educational institution on a conventional, scheduled basis. There are few, if any, studies that have attempted to evaluate the learning achieved through interactivity of students with the online contents using interactive multimedia in online environments, perhaps because of the difficulties in designing rich multimedia contents, a tight experiment for such studies and the fact that confounding variables can easily become significant. The purpose of this study would be to investigate the effectiveness of learning through interactive multimedia and present the results. This research report provides information on the design and development of an online Computational Method in Engineering Technology course. The course is interactive multimedia-based including 3D animation, simulation, video, graphics, and audio. The research considers information on the theoretical framework for designing the course, the process of developing the multimedia and developing the course. The results of the study on the effectiveness of the course is reported in the presentation. Major points of emphasis studied in this research include: 1. Discussing the need for multimedia-rich courses for teaching technology-based subjects in online environments; 2. Developing multimedia based online courses; 3. The effects of using multimedia in teaching technology-based concepts; 4. The results of the study on the effects of using multimedia in an online environment and 5. Results of student attitudes toward learning through multimedia.
{"title":"Development and evaluation of an educational computer network software","authors":"E. Sheybani, G. Javidi","doi":"10.1109/SECON.2007.342904","DOIUrl":"https://doi.org/10.1109/SECON.2007.342904","url":null,"abstract":"Technology is having a dramatic effect on colleges and universities, producing what may be the most challenging period in the history of higher education. One form of the convergence of technology and education is distributed learning. The World Wide Web (WWW) provides alternative means for delivery of the courses and services, providing learners with an extraordinary range of options. Distance learning methods are being developed and implemented to offer educational opportunities to those who are unable or choose not to attend an educational institution on a conventional, scheduled basis. There are few, if any, studies that have attempted to evaluate the learning achieved through interactivity of students with the online contents using interactive multimedia in online environments, perhaps because of the difficulties in designing rich multimedia contents, a tight experiment for such studies and the fact that confounding variables can easily become significant. The purpose of this study would be to investigate the effectiveness of learning through interactive multimedia and present the results. This research report provides information on the design and development of an online Computational Method in Engineering Technology course. The course is interactive multimedia-based including 3D animation, simulation, video, graphics, and audio. The research considers information on the theoretical framework for designing the course, the process of developing the multimedia and developing the course. The results of the study on the effectiveness of the course is reported in the presentation. Major points of emphasis studied in this research include: 1. Discussing the need for multimedia-rich courses for teaching technology-based subjects in online environments; 2. Developing multimedia based online courses; 3. The effects of using multimedia in teaching technology-based concepts; 4. The results of the study on the effects of using multimedia in an online environment and 5. Results of student attitudes toward learning through multimedia.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"274 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114244809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342916
M. Khan, A. Al zaman, M. Ferdjallah
Electromyography (EMG) used to discover diseases of the muscles, spinal cord, and peripheral nerves is a diagnostic test, which records the electrical responses of skeletal muscles while at rest and during voluntary action and electrical stimulation. A novel method, ultrasound modulated EMG, is proposed in this study as a mode of determining the location of fiber producing action potential. Frequency dependent attenuation of ultrasound is observed in skeletal muscle. The attenuation at different ultrasonic frequencies, which modulate EMG signal, assists to locate the source.
{"title":"Proposed model for skeletal muscle: Estimation of fiber location using ultrasonic effect","authors":"M. Khan, A. Al zaman, M. Ferdjallah","doi":"10.1109/SECON.2007.342916","DOIUrl":"https://doi.org/10.1109/SECON.2007.342916","url":null,"abstract":"Electromyography (EMG) used to discover diseases of the muscles, spinal cord, and peripheral nerves is a diagnostic test, which records the electrical responses of skeletal muscles while at rest and during voluntary action and electrical stimulation. A novel method, ultrasound modulated EMG, is proposed in this study as a mode of determining the location of fiber producing action potential. Frequency dependent attenuation of ultrasound is observed in skeletal muscle. The attenuation at different ultrasonic frequencies, which modulate EMG signal, assists to locate the source.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122152883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342987
J. L. Thames, R. Abler
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportunity for malicious users to do their damage becomes very great and lucrative. The computer industry is combating the rising threat of malicious activity with new hardware and software products such as intrusion detection systems, intrusion prevention systems, and firewalls. However, malicious users are constantly looking for ways to by-pass the security features of these products, and many times they will succeed. In order to enhance the capabilities of computer network security devices such as firewalls, the Distributed Network Applications Laboratory at the Georgia Institute of Technology is investigating the use of a distributed Internet security architecture known as the general network security collaboration framework (GNSCF). This paper describes a particular instance of the GNSCF using firewalls as the basic network element of the framework, and this system is referred to as a firewall collaboration framework (FCF).
{"title":"Implementing distributed internet security using a firewall collaboration framework","authors":"J. L. Thames, R. Abler","doi":"10.1109/SECON.2007.342987","DOIUrl":"https://doi.org/10.1109/SECON.2007.342987","url":null,"abstract":"Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportunity for malicious users to do their damage becomes very great and lucrative. The computer industry is combating the rising threat of malicious activity with new hardware and software products such as intrusion detection systems, intrusion prevention systems, and firewalls. However, malicious users are constantly looking for ways to by-pass the security features of these products, and many times they will succeed. In order to enhance the capabilities of computer network security devices such as firewalls, the Distributed Network Applications Laboratory at the Georgia Institute of Technology is investigating the use of a distributed Internet security architecture known as the general network security collaboration framework (GNSCF). This paper describes a particular instance of the GNSCF using firewalls as the basic network element of the framework, and this system is referred to as a firewall collaboration framework (FCF).","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128395024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342966
J. D. Djigbenou, Thien Van Nguyen, Cheng Wei Ren, D. Ha
Standard library cells are basic building blocks for ASIC (application-specific integrated circuit) design, which improves designers' productivity through reduced design time and debugging. This paper presents the development of a CMOS standard cell library by the VTVT (Virginia Tech for VLSI and Telecommunications) Lab.
{"title":"Development of TSMC 0.25/spl mu/m standard cell library","authors":"J. D. Djigbenou, Thien Van Nguyen, Cheng Wei Ren, D. Ha","doi":"10.1109/SECON.2007.342966","DOIUrl":"https://doi.org/10.1109/SECON.2007.342966","url":null,"abstract":"Standard library cells are basic building blocks for ASIC (application-specific integrated circuit) design, which improves designers' productivity through reduced design time and debugging. This paper presents the development of a CMOS standard cell library by the VTVT (Virginia Tech for VLSI and Telecommunications) Lab.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342883
K. Subbu, I. Howitt
IEEE 802.15.4 is an emerging standard developed for applications demanding low power, low data rates and functioning within a short range in the 2.4 GHz industrial scientific and medical band. It finds its application in residential, commercial and industrial, sensing, automation and control. With its ability to support a variety of applications, it is possible for there to be collocated and uncoordinated IEEE 802.15.4 networks. Since these devices are not coordinated, they may interfere with each other's operational performance. The research presented in this paper examines the impact of collocated IEEE 802.15.4 devices on each other by observing the effect of the interfering device on the desired device in terms of packet error rate. Coexistence between these devices is said to be impaired if an overlap between the packets causes a desired packet to be received in error or to be lost. The packet error rate is an important measures of performance (MoP) which is computed based on the packet overlap factor. The relationship of packet error rate with signal to interference ratio and effect of frequency offset are presented.
{"title":"Empirical study of IEEE 802.15.4 mutual interference issues","authors":"K. Subbu, I. Howitt","doi":"10.1109/SECON.2007.342883","DOIUrl":"https://doi.org/10.1109/SECON.2007.342883","url":null,"abstract":"IEEE 802.15.4 is an emerging standard developed for applications demanding low power, low data rates and functioning within a short range in the 2.4 GHz industrial scientific and medical band. It finds its application in residential, commercial and industrial, sensing, automation and control. With its ability to support a variety of applications, it is possible for there to be collocated and uncoordinated IEEE 802.15.4 networks. Since these devices are not coordinated, they may interfere with each other's operational performance. The research presented in this paper examines the impact of collocated IEEE 802.15.4 devices on each other by observing the effect of the interfering device on the desired device in terms of packet error rate. Coexistence between these devices is said to be impaired if an overlap between the packets causes a desired packet to be received in error or to be lost. The packet error rate is an important measures of performance (MoP) which is computed based on the packet overlap factor. The relationship of packet error rate with signal to interference ratio and effect of frequency offset are presented.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130376236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342842
S. Mangayyagari, R. Sankar
Voice conversion is a subject of major research interest these days, due to its numerous applications including dubbing, text to speech synthesis and multimedia. Pitch conversion is an important building block for efficient voice conversion. This paper focuses on the implementation of pitch scaling and pitch conversion. Effective silence removal, voice/unvoiced detection, pitch extraction, pitch marking and PSOLA techniques have been implemented for pitch scaling along with an implementation of pitch mark mapping method for pitch conversion. A graphical user interface has been developed for evaluation and illustration purposes. Evaluation of the pitch scaling and pitch conversion technique was performed on various speech data. Pitch scaling and pitch conversion for both the male and female speakers was implemented and verified with the help of pitch contour plots of the transformed speech.
{"title":"Pitch conversion based on pitch mark mapping","authors":"S. Mangayyagari, R. Sankar","doi":"10.1109/SECON.2007.342842","DOIUrl":"https://doi.org/10.1109/SECON.2007.342842","url":null,"abstract":"Voice conversion is a subject of major research interest these days, due to its numerous applications including dubbing, text to speech synthesis and multimedia. Pitch conversion is an important building block for efficient voice conversion. This paper focuses on the implementation of pitch scaling and pitch conversion. Effective silence removal, voice/unvoiced detection, pitch extraction, pitch marking and PSOLA techniques have been implemented for pitch scaling along with an implementation of pitch mark mapping method for pitch conversion. A graphical user interface has been developed for evaluation and illustration purposes. Evaluation of the pitch scaling and pitch conversion technique was performed on various speech data. Pitch scaling and pitch conversion for both the male and female speakers was implemented and verified with the help of pitch contour plots of the transformed speech.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121653443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342986
P. Joshi, T. Jannett
Sensor networks that can reconfigure to extend their useful operating life while guaranteeing coverage performance are of interest. This paper describes the use of localized performance-guided reconfiguration (PGR) for reconfiguring a distributed sensor network in a target localization scenario using binary sensor data. If a sensor in a cluster becomes unavailable due to a loss of battery power or other reasons, PGR activates redundant sensors as necessary to allow the network to achieve the desired coverage performance. For a simple demonstration of localized PGR, we compare the performance of a multicluster network using localized PGR, a nearest-neighbor reconfiguration approach, and an approach where no reconfiguration of the field is done. Without PGR, coverage performance degraded as sensors were lost. With PGR, every time a sensor failed, the respective cluster was reconfigured to maintain coverage. In this way, clusters made local reconfiguration decisions to achieve the global field coverage performance goal.
{"title":"Localized performance-guided reconfiguration for distributed sensor networks","authors":"P. Joshi, T. Jannett","doi":"10.1109/SECON.2007.342986","DOIUrl":"https://doi.org/10.1109/SECON.2007.342986","url":null,"abstract":"Sensor networks that can reconfigure to extend their useful operating life while guaranteeing coverage performance are of interest. This paper describes the use of localized performance-guided reconfiguration (PGR) for reconfiguring a distributed sensor network in a target localization scenario using binary sensor data. If a sensor in a cluster becomes unavailable due to a loss of battery power or other reasons, PGR activates redundant sensors as necessary to allow the network to achieve the desired coverage performance. For a simple demonstration of localized PGR, we compare the performance of a multicluster network using localized PGR, a nearest-neighbor reconfiguration approach, and an approach where no reconfiguration of the field is done. Without PGR, coverage performance degraded as sensors were lost. With PGR, every time a sensor failed, the respective cluster was reconfigured to maintain coverage. In this way, clusters made local reconfiguration decisions to achieve the global field coverage performance goal.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}