首页 > 最新文献

International journal of sensor networks and data communications最新文献

英文 中文
Impact of Frame Loss Aspects of Mobile Phone Networks on Forensic Voice Comparison 手机网络帧丢失方面对法医语音比对的影响
Pub Date : 2015-11-30 DOI: 10.4172/2090-4886.1000131
Balamurali B. T. Nair, Esam A. S. Alzqhoul, B. Guillemin
The analysis of mobile phone speech recordings can play an important role in criminal trials. However it may be erroneously assumed that all mobile phone technologies, such as the Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA), are similar in their potential impact on the speech signal. In fact these technologies differ significantly in their design and internal operation. This study investigates the impact of an important aspect of these networks, namely Frame Loss (FL), on the results of a forensic voice comparison undertaken using a Bayesian likelihood ratio framework. For both networks, whenever a frame is lost or irrecoverably corrupted, it is synthetically replaced at the receiving end using a history of past good speech frames. Sophisticated mechanisms have been put in place to minimize any resulting artefacts in the recovered speech. In terms of accuracy, FL with GSMcoded speech is shown to worsen same-speaker comparisons, but improve different-speaker comparisons. In terms of precision, FL negatively impacts both sets of comparisons. With CDMA-coded speech, FL is shown to negatively impact the accuracy of both same- and different-speaker comparisons. However, surprisingly, FL is shown to improve the precision of both sets.
手机语音记录的分析在刑事审判中具有重要的作用。然而,人们可能会错误地认为,所有的移动电话技术,如全球移动通信系统(GSM)和码分多址(CDMA),在对语音信号的潜在影响方面是相似的。事实上,这些技术在设计和内部操作上有很大的不同。本研究调查了这些网络的一个重要方面,即帧丢失(FL)对使用贝叶斯似然比框架进行的法医语音比较结果的影响。对于这两种网络,每当一帧丢失或不可恢复地损坏时,它就会在接收端使用过去良好语音帧的历史来综合替换。复杂的机制已经到位,以尽量减少任何由此产生的伪音在恢复的语音。在准确性方面,使用gsm编码语音的FL会使同一说话者的比较变差,但会提高不同说话者的比较。就精度而言,FL对两组比较都有负面影响。对于cdma编码的语音,FL被证明会对相同和不同说话者比较的准确性产生负面影响。然而,令人惊讶的是,FL被证明可以提高这两个集合的精度。
{"title":"Impact of Frame Loss Aspects of Mobile Phone Networks on Forensic Voice Comparison","authors":"Balamurali B. T. Nair, Esam A. S. Alzqhoul, B. Guillemin","doi":"10.4172/2090-4886.1000131","DOIUrl":"https://doi.org/10.4172/2090-4886.1000131","url":null,"abstract":"The analysis of mobile phone speech recordings can play an important role in criminal trials. However it may be erroneously assumed that all mobile phone technologies, such as the Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA), are similar in their potential impact on the speech signal. In fact these technologies differ significantly in their design and internal operation. This study investigates the impact of an important aspect of these networks, namely Frame Loss (FL), on the results of a forensic voice comparison undertaken using a Bayesian likelihood ratio framework. For both networks, whenever a frame is lost or irrecoverably corrupted, it is synthetically replaced at the receiving end using a history of past good speech frames. Sophisticated mechanisms have been put in place to minimize any resulting artefacts in the recovered speech. In terms of accuracy, FL with GSMcoded speech is shown to worsen same-speaker comparisons, but improve different-speaker comparisons. In terms of precision, FL negatively impacts both sets of comparisons. With CDMA-coded speech, FL is shown to negatively impact the accuracy of both same- and different-speaker comparisons. However, surprisingly, FL is shown to improve the precision of both sets.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic Approach to Scheduling Divisible Load on Network ofProcessors 处理器网络上可分负载调度的概率方法
Pub Date : 2015-11-27 DOI: 10.4172/2090-4886.1000130
Manar Arafat, S. Bataineh, Issa M. Khalil
Divisible Load Theory (DLT) is a very efficient tool to schedule arbitrarily divisible load on a set of network processors. Most of previous work using DLT assumes that the processors' speeds and links' speeds are time- invariant. Closed form solution was derived for the system under the assumption that the processors' speed s and the links' speeds stay the same during the task execution time. This assumption is not practical as most of distributed systems used today have an autonomous control. In this paper we consider a distributed system (Grid) where the availability of the processors varies and follows a certain distribution function. A closed form solution for the finish time is derived. The solution considers all system parameters such as links' speed, number of processors, number of resources (sites), and availability of the processors and how much of power they can contribute. The result is shown and it measures the variation of execution time against the availability of processors.
可分负载理论(DLT)是一种非常有效的工具,可以在一组网络处理器上调度任意可分负载。以前使用DLT的大多数工作都假设处理器的速度和链路的速度是时不变的。在任务执行过程中,假设处理器的速度和链路的速度保持不变,导出了系统的闭形式解。这种假设是不切实际的,因为目前使用的大多数分布式系统都有自主控制。在本文中,我们考虑一个分布式系统(网格),其中处理器的可用性是变化的,并遵循一定的分布函数。导出了完成时间的封闭形式解。该解决方案考虑了所有系统参数,例如链接的速度、处理器的数量、资源(站点)的数量、处理器的可用性以及它们可以贡献多少功率。显示结果,并根据处理器的可用性度量执行时间的变化。
{"title":"Probabilistic Approach to Scheduling Divisible Load on Network ofProcessors","authors":"Manar Arafat, S. Bataineh, Issa M. Khalil","doi":"10.4172/2090-4886.1000130","DOIUrl":"https://doi.org/10.4172/2090-4886.1000130","url":null,"abstract":"Divisible Load Theory (DLT) is a very efficient tool to schedule arbitrarily divisible load on a set of network processors. Most of previous work using DLT assumes that the processors' speeds and links' speeds are time- invariant. Closed form solution was derived for the system under the assumption that the processors' speed s and the links' speeds stay the same during the task execution time. This assumption is not practical as most of distributed systems used today have an autonomous control. In this paper we consider a distributed system (Grid) where the availability of the processors varies and follows a certain distribution function. A closed form solution for the finish time is derived. The solution considers all system parameters such as links' speed, number of processors, number of resources (sites), and availability of the processors and how much of power they can contribute. The result is shown and it measures the variation of execution time against the availability of processors.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of Traps in Special Doped Optical Fiber Radiation Sensors via GlowCurve Analysis 基于glow曲线分析的特殊掺杂光纤辐射传感器陷阱研究
Pub Date : 2015-11-10 DOI: 10.4172/2090-4886.1000128
M. Ghomeishi, G. Mahdiraji, P. Jahanshahi, F. Adikan, D. Bradley
Thermoluminescence dosimeters (TLDs) are widely used, serving the needs of various radiation applications. In recent times optical fibers have been introduced as alternatives to more conventional phosphor-based TLD systems, with many efforts being carried out to improve their thermoluminescence (TL) yield. While there have been extensive studies of many of the various TLD characteristics of optical fibers, including TL response, linearity, reproducibility, repeatability, sensitivity and fading, far more limited studies have concerned dependence on the type of TL activator used in optical fibers, promoting the TL mechanism. Present study focuses on TLD glow curves analysis for five different doped optical fibers that have been subjected to photon and electron irradiation. Trap parameters such as activation energy and frequency factors have been obtained from second order kinetics analysis, based on computerized glow curve deconvolution. An interesting observation is that co-doped fibers typically leads to enhanced TL characteristics, pointing to a need for optimization of the choice and levels in use of co-dopants.
热释光剂量计(tld)应用广泛,可满足各种辐射应用的需要。近年来,光纤作为传统的磷基TLD系统的替代品被引入,人们正在努力提高其热释光(TL)产率。虽然人们对光纤的各种TLD特性进行了广泛的研究,包括TL响应、线性、再现性、可重复性、灵敏度和衰落,但对光纤中使用的TL激发剂类型的依赖性、对TL机制的促进作用的研究却非常有限。研究了五种不同掺杂光纤在光子和电子辐照下的TLD发光曲线。基于计算机辉光曲线反褶积的二阶动力学分析得到了活化能和频率因子等陷阱参数。一个有趣的观察是,共掺杂光纤通常会导致增强的TL特性,这表明需要优化共掺杂剂的选择和使用水平。
{"title":"Study of Traps in Special Doped Optical Fiber Radiation Sensors via GlowCurve Analysis","authors":"M. Ghomeishi, G. Mahdiraji, P. Jahanshahi, F. Adikan, D. Bradley","doi":"10.4172/2090-4886.1000128","DOIUrl":"https://doi.org/10.4172/2090-4886.1000128","url":null,"abstract":"Thermoluminescence dosimeters (TLDs) are widely used, serving the needs of various radiation applications. In recent times optical fibers have been introduced as alternatives to more conventional phosphor-based TLD systems, with many efforts being carried out to improve their thermoluminescence (TL) yield. While there have been extensive studies of many of the various TLD characteristics of optical fibers, including TL response, linearity, reproducibility, repeatability, sensitivity and fading, far more limited studies have concerned dependence on the type of TL activator used in optical fibers, promoting the TL mechanism. Present study focuses on TLD glow curves analysis for five different doped optical fibers that have been subjected to photon and electron irradiation. Trap parameters such as activation energy and frequency factors have been obtained from second order kinetics analysis, based on computerized glow curve deconvolution. An interesting observation is that co-doped fibers typically leads to enhanced TL characteristics, pointing to a need for optimization of the choice and levels in use of co-dopants.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000128","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Estimating Node Density for Redundant Sensors in Wireless SensorNetwork 无线传感器网络中冗余传感器节点密度估计
Pub Date : 2015-11-06 DOI: 10.4172/2090-4886.1000127
Dhruvi Sharma, K. Kavitha, R. Gururaj
The lifetime of a sensor network depends on the judicious utilization of the resource-constrained nodes. Practices like data aggregation, sleep scheduling play a major role in conserving the node’s energy. But in most cases, we observe a disparity in energy consumption rates among different sensors. This disparity results from higher utilization of a small set of deployed sensors in the field leaving these sensors drained out of power. To overcome this problem, it is often required to deploy redundant sensors to act as replacements for a faulty node. Secondly, the sensor network technology, being an application oriented technology, experiences variance in network parameters from application to application because of the various dynamics in nature. It is not often viable to go for a theoretically determined sensor distribution technique. Thus, it is often required to place sensors by studying the geographical constraints. These have proven to be highly valuable in designing energy efficient routing schemes anThe lifetime of a sensor network depends on the judicious utilization of the resource-constrained nodes. Practices like data aggregation, sleep scheduling play a major role in conserving the node’s energy. But in most cases, we observe a disparity in energy consumption rates among different sensors. This disparity results from higher utilization of a small set of deployed sensors in the field leaving these sensors drained out of power. To overcome this problem, it is often required to deploy redundant sensors to act as replacements for a faulty node. Secondly, the sensor network technology, being an application oriented technology, experiences variance in network parameters from application to application because of the various dynamics in nature. It is not often viable to go for a theoretically determined sensor distribution technique. Thus, it is often required to place sensors by studying the geographical constraints. These have proven to be highly valuable in designing energy efficient routing schemes and network topologies for sensor networks. In this paper we propose a scheme to decide how the distribution of available redundant sensor nodes should take place around sensor nodes. The scheme gives the flexibility to determine sensor positions based on application and geographical constraints. We propose to use the probability estimates of the utilization of a sensor in a given deployment to achieve desired network lifetimes. We also show how in some cases we can leverage the relative position from source(s) and sink be used for the same.d network topologies for sensor networks. In this paper we propose a scheme to decide how the distribution of available redundant sensor nodes should take place around sensor nodes. The scheme gives the flexibility to determine sensor positions based on application and geographical constraints. We propose to use the probability estimates of the utilization of a sensor in a given deployment to achieve desir
传感器网络的生存期取决于对资源受限节点的合理利用。数据聚合、睡眠调度等做法在节约节点能量方面发挥了重要作用。但在大多数情况下,我们观察到不同传感器之间的能耗率存在差异。这种差异是由于在现场部署的一小组传感器的利用率较高,导致这些传感器耗尽了电力。为了克服这个问题,通常需要部署冗余传感器来替代故障节点。其次,传感器网络技术作为一种面向应用的技术,由于其本身的各种动态特性,在不同的应用中,其网络参数也会发生变化。采用理论上确定的传感器分布技术通常是不可行的。因此,通常需要通过研究地理限制条件来放置传感器。这些在设计节能路由方案中具有很高的价值。传感器网络的寿命取决于对资源受限节点的合理利用。数据聚合、睡眠调度等做法在节约节点能量方面发挥了重要作用。但在大多数情况下,我们观察到不同传感器之间的能耗率存在差异。这种差异是由于在现场部署的一小组传感器的利用率较高,导致这些传感器耗尽了电力。为了克服这个问题,通常需要部署冗余传感器来替代故障节点。其次,传感器网络技术作为一种面向应用的技术,由于其本身的各种动态特性,在不同的应用中,其网络参数也会发生变化。采用理论上确定的传感器分布技术通常是不可行的。因此,通常需要通过研究地理限制条件来放置传感器。这些已被证明在设计节能路由方案和传感器网络拓扑结构方面具有很高的价值。在本文中,我们提出了一种方案来决定可用冗余传感器节点的分布应该如何发生在传感器节点周围。该方案提供了基于应用和地理限制确定传感器位置的灵活性。我们建议在给定部署中使用传感器利用率的概率估计来实现期望的网络寿命。我们还展示了在某些情况下如何利用源和接收器的相对位置。传感器网络的D网络拓扑。在本文中,我们提出了一种方案来决定可用冗余传感器节点的分布应该如何发生在传感器节点周围。该方案提供了基于应用和地理限制确定传感器位置的灵活性。我们建议在给定部署中使用传感器利用率的概率估计来实现期望的网络寿命。我们还展示了在某些情况下如何利用源和接收器的相对位置。
{"title":"Estimating Node Density for Redundant Sensors in Wireless SensorNetwork","authors":"Dhruvi Sharma, K. Kavitha, R. Gururaj","doi":"10.4172/2090-4886.1000127","DOIUrl":"https://doi.org/10.4172/2090-4886.1000127","url":null,"abstract":"The lifetime of a sensor network depends on the judicious utilization of the resource-constrained nodes. Practices like data aggregation, sleep scheduling play a major role in conserving the node’s energy. But in most cases, we observe a disparity in energy consumption rates among different sensors. This disparity results from higher utilization of a small set of deployed sensors in the field leaving these sensors drained out of power. To overcome this problem, it is often required to deploy redundant sensors to act as replacements for a faulty node. Secondly, the sensor network technology, being an application oriented technology, experiences variance in network parameters from application to application because of the various dynamics in nature. It is not often viable to go for a theoretically determined sensor distribution technique. Thus, it is often required to place sensors by studying the geographical constraints. These have proven to be highly valuable in designing energy efficient routing schemes anThe lifetime of a sensor network depends on the judicious utilization of the resource-constrained nodes. Practices like data aggregation, sleep scheduling play a major role in conserving the node’s energy. But in most cases, we observe a disparity in energy consumption rates among different sensors. This disparity results from higher utilization of a small set of deployed sensors in the field leaving these sensors drained out of power. To overcome this problem, it is often required to deploy redundant sensors to act as replacements for a faulty node. Secondly, the sensor network technology, being an application oriented technology, experiences variance in network parameters from application to application because of the various dynamics in nature. It is not often viable to go for a theoretically determined sensor distribution technique. Thus, it is often required to place sensors by studying the geographical constraints. These have proven to be highly valuable in designing energy efficient routing schemes and network topologies for sensor networks. In this paper we propose a scheme to decide how the distribution of available redundant sensor nodes should take place around sensor nodes. The scheme gives the flexibility to determine sensor positions based on application and geographical constraints. We propose to use the probability estimates of the utilization of a sensor in a given deployment to achieve desired network lifetimes. We also show how in some cases we can leverage the relative position from source(s) and sink be used for the same.d network topologies for sensor networks. In this paper we propose a scheme to decide how the distribution of available redundant sensor nodes should take place around sensor nodes. The scheme gives the flexibility to determine sensor positions based on application and geographical constraints. We propose to use the probability estimates of the utilization of a sensor in a given deployment to achieve desir","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000127","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trace Gas Sensor Based on Quartz-Enhanced Photo Acoustic Spectroscopy 基于石英增强光声光谱的微量气体传感器
Pub Date : 2015-10-16 DOI: 10.4172/2090-4886.1000E106
Yufei Ma
Photo acoustic spectroscopy (PAS) is a widely used method for trace gas sensing. It is based on photo acoustic effect which was discovered by Bell in 1880’s. When the laser power is absorbed by the medium, the absorbed energy can be transformed into heat energy by non-radiative processes. If the laser is modulated, the heat and the pressure wave generated by the heat will also be modulated. This process will produce acoustic wave. Microphone based PAS detection is employed for many years for gas sensing.
光声光谱(PAS)是一种广泛应用于痕量气体传感的方法。它是基于贝尔在19世纪80年代发现的光声效应。当激光功率被介质吸收时,吸收的能量可以通过非辐射过程转化为热能。如果对激光进行调制,则热量和由热量产生的压力波也将被调制。这个过程会产生声波。基于麦克风的PAS检测已被用于气体传感多年。
{"title":"Trace Gas Sensor Based on Quartz-Enhanced Photo Acoustic Spectroscopy","authors":"Yufei Ma","doi":"10.4172/2090-4886.1000E106","DOIUrl":"https://doi.org/10.4172/2090-4886.1000E106","url":null,"abstract":"Photo acoustic spectroscopy (PAS) is a widely used method for trace gas sensing. It is based on photo acoustic effect which was discovered by Bell in 1880’s. When the laser power is absorbed by the medium, the absorbed energy can be transformed into heat energy by non-radiative processes. If the laser is modulated, the heat and the pressure wave generated by the heat will also be modulated. This process will produce acoustic wave. Microphone based PAS detection is employed for many years for gas sensing.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000E106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70966511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extending the Functionality of Pymote: Low Level Protocols and Simulation Result Analysis Pymote功能扩展:底层协议与仿真结果分析
Pub Date : 2015-10-16 DOI: 10.4172/2090-4886.1000125
F. Shahzad
Wireless sensor networks (WSNs) are utilized in various applications and are providing the backbone for the new pervasive Internet, or Internet of Things. The development of a reliable and robust large-scale WSN system requires that the design concepts are checked and optimized before they are implemented and tested for a specific hardware platform. Simulation provides a cost effective and feasible method of examining the correctness and scalability of the system before deployment. In this work, we study the performance of Pymote, a high level Python library for event based simulation of distributed algorithms in wireless ad-hoc networks. We extended the Pymote framework allowing it to simulate packet level performance. The extension includes radio propagation, energy consumption, mobility and other models. The extended framework also provides interactive plotting, data collection and logging facilities for improved analysis and evaluation of the simulated system.
无线传感器网络(wsn)用于各种应用,并为新的普及互联网或物联网提供骨干。开发一个可靠、健壮的大规模WSN系统,需要对设计概念进行检查和优化,然后再针对特定的硬件平台进行实施和测试。仿真提供了一种在部署前检验系统正确性和可扩展性的经济有效且可行的方法。在这项工作中,我们研究了Pymote的性能,Pymote是一个高级Python库,用于无线自组织网络中基于事件的分布式算法模拟。我们扩展了Pymote框架,允许它模拟数据包级别的性能。扩展包括无线电传播,能源消耗,移动性和其他模型。扩展框架还提供了交互式绘图、数据收集和记录设施,以改进模拟系统的分析和评估。
{"title":"Extending the Functionality of Pymote: Low Level Protocols and Simulation Result Analysis","authors":"F. Shahzad","doi":"10.4172/2090-4886.1000125","DOIUrl":"https://doi.org/10.4172/2090-4886.1000125","url":null,"abstract":"Wireless sensor networks (WSNs) are utilized in various applications and are providing the backbone for the new pervasive Internet, or Internet of Things. The development of a reliable and robust large-scale WSN system requires that the design concepts are checked and optimized before they are implemented and tested for a specific hardware platform. Simulation provides a cost effective and feasible method of examining the correctness and scalability of the system before deployment. In this work, we study the performance of Pymote, a high level Python library for event based simulation of distributed algorithms in wireless ad-hoc networks. We extended the Pymote framework allowing it to simulate packet level performance. The extension includes radio propagation, energy consumption, mobility and other models. The extended framework also provides interactive plotting, data collection and logging facilities for improved analysis and evaluation of the simulated system.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000125","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
WSNs: From dummy sensing to everywhere WSNs:从虚拟感知到无处不在
Pub Date : 2015-10-08 DOI: 10.4172/2090-4886.C1.003
R. Ramadan
W the rapid development in Internet technology and convergence in communications, the overall quality of ubiquitous communication has improved significantly. IPv6-based next-generation wireless mobile communications will need an effective mobility management protocol to support ubiquitous network access by providing seamless handover. This is especially true with invention of portable mobile devices that can be connected almost anywhere at any time. However, the recent explosion in the usage of mobile devices has also generated several issues in terms of performance and quality of service. With the ever increasing number of mobile user, mobile users demand high quality performance, best quality of services and seamless connections that support real-time application which are audio and video streaming. Seamless is referred to users that are free to roam around different networks and at the same time stay connected without any disturbance to the ongoing session during the process of handover from one network to another. The handover process between these networks spawns long delay or latency, high packet loss, and fewer throughputs which may degrade the performance of real-time applications during the handover process. Therefore, the challenging issues of wireless network in real-time application are seamless connection and data packet load. These will be the focus of this presentation. This presentation will provide a methodology assessment of seamless connection and diminution of data packet load.
{"title":"WSNs: From dummy sensing to everywhere","authors":"R. Ramadan","doi":"10.4172/2090-4886.C1.003","DOIUrl":"https://doi.org/10.4172/2090-4886.C1.003","url":null,"abstract":"W the rapid development in Internet technology and convergence in communications, the overall quality of ubiquitous communication has improved significantly. IPv6-based next-generation wireless mobile communications will need an effective mobility management protocol to support ubiquitous network access by providing seamless handover. This is especially true with invention of portable mobile devices that can be connected almost anywhere at any time. However, the recent explosion in the usage of mobile devices has also generated several issues in terms of performance and quality of service. With the ever increasing number of mobile user, mobile users demand high quality performance, best quality of services and seamless connections that support real-time application which are audio and video streaming. Seamless is referred to users that are free to roam around different networks and at the same time stay connected without any disturbance to the ongoing session during the process of handover from one network to another. The handover process between these networks spawns long delay or latency, high packet loss, and fewer throughputs which may degrade the performance of real-time applications during the handover process. Therefore, the challenging issues of wireless network in real-time application are seamless connection and data packet load. These will be the focus of this presentation. This presentation will provide a methodology assessment of seamless connection and diminution of data packet load.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70967163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Health risks of wireless communication: What do we know, what can we do now, and what should we find out? 无线通信的健康风险:我们知道什么,我们现在能做什么,我们应该发现什么?
Pub Date : 2015-10-07 DOI: 10.4172/2090-4886.C1.001
D. Davis
The integration of physical systems with networked sensing, computation networks, and embedded control with actuation has led to the emergence of a new generation of engineered systems, the Cyber-Physical Systems (CPS). Such systems emphasize the link between cyber space and physical environment (i.e., time, space, and energy). CPS represents the next generation of complex engineering systems. They are large scale dynamic systems that offer significant processing power while interacting across communication networks.
{"title":"Health risks of wireless communication: What do we know, what can we do now, and what should we find out?","authors":"D. Davis","doi":"10.4172/2090-4886.C1.001","DOIUrl":"https://doi.org/10.4172/2090-4886.C1.001","url":null,"abstract":"The integration of physical systems with networked sensing, computation networks, and embedded control with actuation has led to the emergence of a new generation of engineered systems, the Cyber-Physical Systems (CPS). Such systems emphasize the link between cyber space and physical environment (i.e., time, space, and energy). CPS represents the next generation of complex engineering systems. They are large scale dynamic systems that offer significant processing power while interacting across communication networks.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70966590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel cache-mediator with wireless routers for multicore systems to achieve energy-efficient scalable performance 一种新型的多核系统无线路由器缓存中介器,可实现高能效的可扩展性能
Pub Date : 2015-10-07 DOI: 10.4172/2090-4886.C1.002
Abu Asaduzzaman
{"title":"A novel cache-mediator with wireless routers for multicore systems to achieve energy-efficient scalable performance","authors":"Abu Asaduzzaman","doi":"10.4172/2090-4886.C1.002","DOIUrl":"https://doi.org/10.4172/2090-4886.C1.002","url":null,"abstract":"","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70966754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Data Encryption and Transmission Based on Personal ECG Signals 基于个人心电信号的数据加密与传输
Pub Date : 2015-10-05 DOI: 10.4172/2090-4886.1000124
Ching-Kun Chen, Chun-Liang Lin, Shyan-Lung Lin, C. Chiang
ECG signal vary from person to person, making it difficult to be imitated and duplicated. Biometric identification based on ECG is therefore a useful application based on this feature. Synchronization of chaotic systems provides a rich mechanism which is noise-like and virtually impossible to guess or predict. This study intends to combine our previously proposed information encryption/decryption system with chaotic synchronization circuits to create private key masking. To implement the proposed secure communication system, a pair of Lorenz-based synchronized circuits is developed by using operational amplifiers, resistors, capacitors and multipliers. The verification presented involves numerical simulation and hardware implementation to demonstrate feasibility of the proposed method. High quality randomness in ECG signals results in a widely expanded key space, making it an ideal key generator for personalized data encryption. The experiments demonstrate the use of this approach in encrypting texts and images via secure communications.
心电信号因人而异,难以被模仿和复制。因此,基于心电的生物特征识别是基于这一特征的一种有用的应用。混沌系统的同步提供了一种丰富的机制,它是类噪声的,几乎不可能猜测或预测。本研究拟将我们先前提出的资讯加解密系统与混沌同步电路相结合,以建立私钥掩蔽。为了实现所提出的安全通信系统,采用运算放大器、电阻、电容和乘法器开发了一对基于洛伦兹的同步电路。通过数值仿真和硬件实现验证了该方法的可行性。心电信号的高质量随机性使其具有广泛的密钥空间,是个性化数据加密的理想密钥发生器。实验证明了该方法在通过安全通信加密文本和图像中的应用。
{"title":"Data Encryption and Transmission Based on Personal ECG Signals","authors":"Ching-Kun Chen, Chun-Liang Lin, Shyan-Lung Lin, C. Chiang","doi":"10.4172/2090-4886.1000124","DOIUrl":"https://doi.org/10.4172/2090-4886.1000124","url":null,"abstract":"ECG signal vary from person to person, making it difficult to be imitated and duplicated. Biometric identification based on ECG is therefore a useful application based on this feature. Synchronization of chaotic systems provides a rich mechanism which is noise-like and virtually impossible to guess or predict. This study intends to combine our previously proposed information encryption/decryption system with chaotic synchronization circuits to create private key masking. To implement the proposed secure communication system, a pair of Lorenz-based synchronized circuits is developed by using operational amplifiers, resistors, capacitors and multipliers. The verification presented involves numerical simulation and hardware implementation to demonstrate feasibility of the proposed method. High quality randomness in ECG signals results in a widely expanded key space, making it an ideal key generator for personalized data encryption. The experiments demonstrate the use of this approach in encrypting texts and images via secure communications.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000124","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
International journal of sensor networks and data communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1