Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342871
T.B. Fleming, P. Athanas
Nodes in sensor fields and in autonomous swarms of mobile robots need to communicate; this usually requires individual nodes to either consume a significant amount of energy, carefully position themselves, precisely align carrier phase, or use complex coding. The paper proposes allowing multiple independent and mobile wireless transmitters to share the power-consumption burden by combining low-power transmissions into a unified higher-power transmission. This is not a distributed beamforming or space-time coding approach. Instead, all nodes simultaneously broadcast the same symbol on the same channel without using different code books and without aligning carriers. This paper briefly describes a modulation scheme (random-phase frequency shift keying, RPFSK), a synchronization scheme (Ensemble), and a node selection scheme which make this possible. It then describes an RPFSK demodulator design in detail for Ensemble nodes. It also covers both baseband and over-the-air test results.
{"title":"Demodulator design for collaborative signal reinforcement in sensor networks","authors":"T.B. Fleming, P. Athanas","doi":"10.1109/SECON.2007.342871","DOIUrl":"https://doi.org/10.1109/SECON.2007.342871","url":null,"abstract":"Nodes in sensor fields and in autonomous swarms of mobile robots need to communicate; this usually requires individual nodes to either consume a significant amount of energy, carefully position themselves, precisely align carrier phase, or use complex coding. The paper proposes allowing multiple independent and mobile wireless transmitters to share the power-consumption burden by combining low-power transmissions into a unified higher-power transmission. This is not a distributed beamforming or space-time coding approach. Instead, all nodes simultaneously broadcast the same symbol on the same channel without using different code books and without aligning carriers. This paper briefly describes a modulation scheme (random-phase frequency shift keying, RPFSK), a synchronization scheme (Ensemble), and a node selection scheme which make this possible. It then describes an RPFSK demodulator design in detail for Ensemble nodes. It also covers both baseband and over-the-air test results.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114918545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342858
Brian Butka
This paper describes a high-speed output driver circuit architecture that incorporates impedance control to allow matching the impedance of the output driver to the impedance of a printed circuit board trace. The impedance is set via an external resistor. Unlike many existing impedance controlled output drivers, the output impedance is not controlled by varying the number of output fingers included in the output, but instead by varying the pre-drive signals provided to the output stage. The impedance of the output as the output switches is examined and the signal integrity of the output driving a typical transmission line is presented.
{"title":"A high-speed impedance controlled output driver using pre-drive control for standard CMOS technology","authors":"Brian Butka","doi":"10.1109/SECON.2007.342858","DOIUrl":"https://doi.org/10.1109/SECON.2007.342858","url":null,"abstract":"This paper describes a high-speed output driver circuit architecture that incorporates impedance control to allow matching the impedance of the output driver to the impedance of a printed circuit board trace. The impedance is set via an external resistor. Unlike many existing impedance controlled output drivers, the output impedance is not controlled by varying the number of output fingers included in the output, but instead by varying the pre-drive signals provided to the output stage. The impedance of the output as the output switches is examined and the signal integrity of the output driving a typical transmission line is presented.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126785678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342999
T. Buennemeyer, T. Nelson, R. Marchany, J. Tront
This paper introduces a supporting model for a unique battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts when power changes are detected on small wireless devices. An analytical model is employed to examine smart battery characteristics to support the theoretical intrusion detection limits and capabilities of B-SIPS. Battery-based attack detections can be significantly increased by investigating variable smart battery polling rates, system management bus speeds, and attack execution times. This research explores the modification of smart battery polling rates in conjunction with the variance of malicious network activity. An optimum static polling rate for each of the selected illicit network attack densities was determined by altering these two parameters. These optimum static polling rates introduce minimum and maximum thresholds for the various scenarios mobile devices encounter on a daily basis. Future work will investigate dynamic solutions to optimize battery lifetime under a range of circumstances by encompassing the data results found in this study.
{"title":"Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems","authors":"T. Buennemeyer, T. Nelson, R. Marchany, J. Tront","doi":"10.1109/SECON.2007.342999","DOIUrl":"https://doi.org/10.1109/SECON.2007.342999","url":null,"abstract":"This paper introduces a supporting model for a unique battery-sensing intrusion protection system (B-SIPS) for mobile computers, which alerts when power changes are detected on small wireless devices. An analytical model is employed to examine smart battery characteristics to support the theoretical intrusion detection limits and capabilities of B-SIPS. Battery-based attack detections can be significantly increased by investigating variable smart battery polling rates, system management bus speeds, and attack execution times. This research explores the modification of smart battery polling rates in conjunction with the variance of malicious network activity. An optimum static polling rate for each of the selected illicit network attack densities was determined by altering these two parameters. These optimum static polling rates introduce minimum and maximum thresholds for the various scenarios mobile devices encounter on a daily basis. Future work will investigate dynamic solutions to optimize battery lifetime under a range of circumstances by encompassing the data results found in this study.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127343670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342864
Jianhua Liu, Jun Yu Li
Orthogonal frequency-division multiplexing (OFDM) has been selected as the basis for several standards for high-speed wireless local area networks (WLANs), such as IEEE 802.11a. Increasing the transmission robustness of the SISO (single-input single-output) WLAN system was considered by using the space-time block coding (STBC) scheme with two transmit and one receive antennas. A preamble design for this STBC system was proposed. This preamble is backward compatible with its SISO counterpart as specified by the standards. With this preamble design, a sequential method can be used for the estimation of the channel parameters. Phase tracking and least-squares fitting approaches are discussed to improve channel parameter estimation. A simple soft-detector is also given. Furthermore, a semi-blind channel estimation technique is presented to improve the channel estimation accuracy which leads to improved performance. The approaches given herein are ideally suited for real-time implementations. The effectiveness of this system design and algorithms is demonstrated via numerical examples.
{"title":"A space-time block coding system with backward compatibility for OFDM-based WLANs","authors":"Jianhua Liu, Jun Yu Li","doi":"10.1109/SECON.2007.342864","DOIUrl":"https://doi.org/10.1109/SECON.2007.342864","url":null,"abstract":"Orthogonal frequency-division multiplexing (OFDM) has been selected as the basis for several standards for high-speed wireless local area networks (WLANs), such as IEEE 802.11a. Increasing the transmission robustness of the SISO (single-input single-output) WLAN system was considered by using the space-time block coding (STBC) scheme with two transmit and one receive antennas. A preamble design for this STBC system was proposed. This preamble is backward compatible with its SISO counterpart as specified by the standards. With this preamble design, a sequential method can be used for the estimation of the channel parameters. Phase tracking and least-squares fitting approaches are discussed to improve channel parameter estimation. A simple soft-detector is also given. Furthermore, a semi-blind channel estimation technique is presented to improve the channel estimation accuracy which leads to improved performance. The approaches given herein are ideally suited for real-time implementations. The effectiveness of this system design and algorithms is demonstrated via numerical examples.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121707654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342884
I. Akbar, W. Tranter
Cognitive radio networks can be designed to manage the radio spectrum more efficiently by utilizing the spectrum holes in primary users' licensed frequency bands. Recent studies have shown that the radio spectrum is poorly utilized by the licensed users even in urban geographical areas. This spectrum utilization can be improved significantly by making it possible for secondary users (who are not being served by the primary system) to access spectrum holes, i.e., frequency bands not used by licensed users. In this novel work, we use hidden Markov models (HMMs) to model and predict the spectrum occupancy of licensed radio bands. The proposed technique can dynamically select different licensed bands for its own use with significantly less interference from and to the licensed users. It is found that by predicting the duration of spectrum holes of primary users, the CR can utilize them more efficiently by leaving the band, that it currently occupies, before the start of traffic from the primary user of that band. We propose a simple algorithm, called the Markov-based channel prediction algorithm (MCPA), for dynamic spectrum allocation in cognitive radio networks. In this work, we present the performance of our proposed dynamic spectrum allocation algorithm when the channel state occupancy of primary users are assumed to be Poisson distributed. The impact of CR transmission on the licensed users is also presented. It is shown that significant SIR improvements can be achieved using HMM based dynamic spectrum allocation as compared to the traditional CSMA based approach. The results obtained using HMM are very promising and HMM can offer a new paradigm for predicting channel behavior in cognitive radio, an area that has been of much research interest lately.
{"title":"Dynamic spectrum allocation in cognitive radio using hidden Markov models: Poisson distributed case","authors":"I. Akbar, W. Tranter","doi":"10.1109/SECON.2007.342884","DOIUrl":"https://doi.org/10.1109/SECON.2007.342884","url":null,"abstract":"Cognitive radio networks can be designed to manage the radio spectrum more efficiently by utilizing the spectrum holes in primary users' licensed frequency bands. Recent studies have shown that the radio spectrum is poorly utilized by the licensed users even in urban geographical areas. This spectrum utilization can be improved significantly by making it possible for secondary users (who are not being served by the primary system) to access spectrum holes, i.e., frequency bands not used by licensed users. In this novel work, we use hidden Markov models (HMMs) to model and predict the spectrum occupancy of licensed radio bands. The proposed technique can dynamically select different licensed bands for its own use with significantly less interference from and to the licensed users. It is found that by predicting the duration of spectrum holes of primary users, the CR can utilize them more efficiently by leaving the band, that it currently occupies, before the start of traffic from the primary user of that band. We propose a simple algorithm, called the Markov-based channel prediction algorithm (MCPA), for dynamic spectrum allocation in cognitive radio networks. In this work, we present the performance of our proposed dynamic spectrum allocation algorithm when the channel state occupancy of primary users are assumed to be Poisson distributed. The impact of CR transmission on the licensed users is also presented. It is shown that significant SIR improvements can be achieved using HMM based dynamic spectrum allocation as compared to the traditional CSMA based approach. The results obtained using HMM are very promising and HMM can offer a new paradigm for predicting channel behavior in cognitive radio, an area that has been of much research interest lately.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131432217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342898
H. Basher
This correspondence investigates the modeling and simulation of a single link flexible robot arm (beam) having both rotational and translation motions, and the effects of higher-order dynamics on the response of the arm. The model is suitable for the development of control strategy to suppress the vibration of the arm. Assumed modes techniques have been reported in the literature where only two or three modes are retained and the rest are truncated which in many cases is inadequate for high performance control system development. In this study, an analytical model of the manipulator, characterized by an infinite number of modes, is developed using Euler-Bernoulli beam equation and modal expansion method. The infinite-dimensional transcendental transfer function for the robot arm is formulated without modal approximation that is conveniently transformed into state-space form. The effects of higher-order dynamics are demonstrated through computer simulations using National Instrument's LabVIEW software package. In this approach, adding modes or increasing the order of transfer function is straightforward and provides a straightforward check of the effect of ignoring higher-order terms. The results are illustrated for different modes through an example.
{"title":"Modeling and simulation of flexible robot manipulator with a prismatic joint","authors":"H. Basher","doi":"10.1109/SECON.2007.342898","DOIUrl":"https://doi.org/10.1109/SECON.2007.342898","url":null,"abstract":"This correspondence investigates the modeling and simulation of a single link flexible robot arm (beam) having both rotational and translation motions, and the effects of higher-order dynamics on the response of the arm. The model is suitable for the development of control strategy to suppress the vibration of the arm. Assumed modes techniques have been reported in the literature where only two or three modes are retained and the rest are truncated which in many cases is inadequate for high performance control system development. In this study, an analytical model of the manipulator, characterized by an infinite number of modes, is developed using Euler-Bernoulli beam equation and modal expansion method. The infinite-dimensional transcendental transfer function for the robot arm is formulated without modal approximation that is conveniently transformed into state-space form. The effects of higher-order dynamics are demonstrated through computer simulations using National Instrument's LabVIEW software package. In this approach, adding modes or increasing the order of transfer function is straightforward and provides a straightforward check of the effect of ignoring higher-order terms. The results are illustrated for different modes through an example.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342886
R. Wu
Decision input from human factors play crucial role in component-based design. In the past decade, much of the alternative decision in criteria and preference evaluation have been massively implemented by group decision. In this research, we extended the focus of the methods and techniques to component decision in supporting the enterprise integration and ontology interoperability, we believe, to follow the nature of business in performing human interactive in this early analysis and pre-design stage, play a key role in the integration's success, we have assessed the feasibility and received the consensus of pre-design stage of industry.
{"title":"Validation and analysis process in component based design","authors":"R. Wu","doi":"10.1109/SECON.2007.342886","DOIUrl":"https://doi.org/10.1109/SECON.2007.342886","url":null,"abstract":"Decision input from human factors play crucial role in component-based design. In the past decade, much of the alternative decision in criteria and preference evaluation have been massively implemented by group decision. In this research, we extended the focus of the methods and techniques to component decision in supporting the enterprise integration and ontology interoperability, we believe, to follow the nature of business in performing human interactive in this early analysis and pre-design stage, play a key role in the integration's success, we have assessed the feasibility and received the consensus of pre-design stage of industry.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121070949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342989
D. Jakubisin, M. Davis, C. Roberts, I. Howitt
This paper describes the design and testing of a device that employs pre-built IEEE 802.11b wireless cards in a real-time audio application. IEEE 802.11b WiFi cards have been used for high data rate applications where latency is not of primary concern. The main goal was to investigate if IEEE 802.11b would be capable of handling the type of load created by audio transmission. The application for this specific device is a wireless guitar transmitter/receiver for real time transmission between a guitar and an amplifier. For testing and analysis purposes, two embedded boards interfaced to IEEE 802.11b Compact Flash cards were connected in an ad hoc network. A 16 bit, 44.1 kHz mono signal was selected in order to ensure the quality of the audio output. Buffering was implemented at both the transmitter and receiver for reliability with careful selection of the buffer length to ensure no perceivable latency. Both the wireless card configuration and packet headers were primary issues in operating IEEE 802.11b in a real-time scenario. Timing results and the overall system performance will be presented in this work.
{"title":"Real-time audio transceiver utilizing 802.11b wireless technology","authors":"D. Jakubisin, M. Davis, C. Roberts, I. Howitt","doi":"10.1109/SECON.2007.342989","DOIUrl":"https://doi.org/10.1109/SECON.2007.342989","url":null,"abstract":"This paper describes the design and testing of a device that employs pre-built IEEE 802.11b wireless cards in a real-time audio application. IEEE 802.11b WiFi cards have been used for high data rate applications where latency is not of primary concern. The main goal was to investigate if IEEE 802.11b would be capable of handling the type of load created by audio transmission. The application for this specific device is a wireless guitar transmitter/receiver for real time transmission between a guitar and an amplifier. For testing and analysis purposes, two embedded boards interfaced to IEEE 802.11b Compact Flash cards were connected in an ad hoc network. A 16 bit, 44.1 kHz mono signal was selected in order to ensure the quality of the audio output. Buffering was implemented at both the transmitter and receiver for reliability with careful selection of the buffer length to ensure no perceivable latency. Both the wireless card configuration and packet headers were primary issues in operating IEEE 802.11b in a real-time scenario. Timing results and the overall system performance will be presented in this work.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129743149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342921
Y. Khalil, A. Kumar, Adel Said Elmaghraby, J. Graham
In this work the authors used the OPNET software simulation tool to simulate different possible cases of the resilient information systems and its performance. To demonstrate the performance variation different performance metrics at multiple layer of the compunctions protocol have been collect. The model was configured to use real life traffic traces and generated traffic to reflect activities of remote data storage sites over long distance. Preliminary results demonstrate the feasibility of this approach. Further model refinements and alternative scenarios are under consideration.
{"title":"Performance modeling of resilient information system for remote data storage","authors":"Y. Khalil, A. Kumar, Adel Said Elmaghraby, J. Graham","doi":"10.1109/SECON.2007.342921","DOIUrl":"https://doi.org/10.1109/SECON.2007.342921","url":null,"abstract":"In this work the authors used the OPNET software simulation tool to simulate different possible cases of the resilient information systems and its performance. To demonstrate the performance variation different performance metrics at multiple layer of the compunctions protocol have been collect. The model was configured to use real life traffic traces and generated traffic to reflect activities of remote data storage sites over long distance. Preliminary results demonstrate the feasibility of this approach. Further model refinements and alternative scenarios are under consideration.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130787224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2007-03-22DOI: 10.1109/SECON.2007.342929
E. Sheybani, G. Javidi
One of the goals of the National Cancer Institute (NCI) cancer control program to reach more than 80% of the eligible women in mammography screening by the year 2000 yet remains as a challenge. That is primarily due to 1) the fact that examination process is a complex and lengthy one and 2) it is not available to the majority of women who live in remote and urban sites. This problem can be solved using ad hoc networking technologies and signal processing algorithms. Software modules can help detect true negatives (TN), while marking true positives (TP) for further investigation. This reduces the load on network and radiologists by a tremendous amount. Ad hoc networking equipment makes clinic-lab connection more accessible and image enhancement algorithms readily available to the radiologists. In this research automatic robust computer assisted diagnostic (CAD) methods for mass detection in breast cancer have been associated with region of interest (ROI) compression for efficient transmission over ad hoc networks. This telemammography system for remote computer-aided breast cancer detection and diagnosis has the advantage of better reach of women for cancer screening and at the same time provides the diagnosis with higher efficiency, better accuracy, and lower cost.
{"title":"Telemammography across an ad hoc network","authors":"E. Sheybani, G. Javidi","doi":"10.1109/SECON.2007.342929","DOIUrl":"https://doi.org/10.1109/SECON.2007.342929","url":null,"abstract":"One of the goals of the National Cancer Institute (NCI) cancer control program to reach more than 80% of the eligible women in mammography screening by the year 2000 yet remains as a challenge. That is primarily due to 1) the fact that examination process is a complex and lengthy one and 2) it is not available to the majority of women who live in remote and urban sites. This problem can be solved using ad hoc networking technologies and signal processing algorithms. Software modules can help detect true negatives (TN), while marking true positives (TP) for further investigation. This reduces the load on network and radiologists by a tremendous amount. Ad hoc networking equipment makes clinic-lab connection more accessible and image enhancement algorithms readily available to the radiologists. In this research automatic robust computer assisted diagnostic (CAD) methods for mass detection in breast cancer have been associated with region of interest (ROI) compression for efficient transmission over ad hoc networks. This telemammography system for remote computer-aided breast cancer detection and diagnosis has the advantage of better reach of women for cancer screening and at the same time provides the diagnosis with higher efficiency, better accuracy, and lower cost.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}