Recent Trends in Networks and Communications -  Natarajan Meghanathan,  Selma Boumerdassi,  Nabendu Chaki,  Dhinaharan Nagamalai

Recent Trends in Networks and Communications (eBook)

International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, 2010. Proceedings
eBook Download: PDF
2010 | 1. Auflage
742 Seiten
Springer-Verlag
978-3-642-14493-6 (ISBN)
Systemvoraussetzungen
103,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book constitutes the proceedings of the Second International Conference on Networks and Communications, NeCoM 2010, the Second International Conference on Wireless and Mobile Networks,WiMoN 2010, and the Second International Conference on Web and Semantic Technology, WeST 2010, held in Chennai, India, in July 2010.

Preface 5
Organization 7
Table of Contents 12
The Second International Conference on Networks and Communications (NeCoM 2010) 19
Improving TCP Performance over Wireless Networks Using Cross Layer 19
Introduction 19
Related WorK 20
TCP New Reno and CLAMP 20
The Proposed Protocol (L$^2$ CLAMP- TCP) 20
L$^2$CLAMP Architecture 20
Algorithm 22
Performance Evaluation 23
Analysis by Varying Queue Delay 23
Throughput Analysis by Varying Packet Size 25
Analysis by Varying Simulation Time 26
Conclusions and Future Work 27
References 28
Improving Tracking Performance of FxLMS Algorithm Based Active Noise Control Systems 29
Introduction 29
Secondary Path Effects 30
FxLMS Algorithm 32
Wavelet Thresholding 32
Hard Thresholding Algorithm 33
Soft Thresholding Algorithm 33
Proposed Method 33
Simulation Results 36
Conclusions 37
References 37
Source and System Features for Text Independent Speaker Recognition Using GMM Speaker Models 39
Introduction 40
Feature Based on Cepstrum 40
PLP, MF-PLP and Pitch Extraction 40
Development of GMM Training Models 41
Speaker Identification Based on Proposed Features 42
Results and Discussion 43
Statistical Analysis on Features 46
Conclusions 47
References 47
Optimization of ASIC Design Cycle Time 49
Introduction 49
Methods of Optimization 50
Hardware- Based Method 50
Re-usability Method 50
Abstraction-Based Method 51
Assertion-Based Method 51
Co-verification-Based Method 52
Modeling or Model-Based Design 53
Why Modeling or Model-Based Design? 53
Case-Study 54
Implementation and Results 55
Traditional Verification Environment Using System Verilog 55
Transaction-Level Modeling Using VMM-1.2 55
Modeling Using System Verilog and Matlab 56
Conclusion 57
References 57
Optimal Solution for RFID Load Balancing 59
Introduction 59
Proposal 61
Agent Based Approach for RFID Middleware 62
Algorithm 62
Algorithm for Allocation of Tags 62
Algorithm for Turning off Redundant Readers 64
Wake-Up Criteria 65
Evaluation and Results 65
Conclusion 67
References 67
Fault Management in Grid Using Multi-agents 68
Introduction 68
Related Work 69
Architecture and Design 70
Head Agent 70
Back-Up Agent 71
Member Agent 71
Proxy or Member Representative Agent 71
Timer1 Agent 71
Timer2 Agent 72
Timer3 Agent 72
Ping Agent 72
Agent Repository 72
Implementation 72
Results and Discussions 73
Conclusion 75
Future Works 75
References 76
Minimizing Response Time in an Autonomic Computing System Using Proportional Control 78
Introduction 78
System Background 80
Modeling and System Identification 80
Controller Design 81
Implementation 81
Results 83
Conclusions 83
References 84
Elucidation of Upcoming Traffic Problems in Cloud Computing 86
Introduction 86
The Network Based Measurement 87
Current State of Cloud Computing Services 88
Networking Vendors Are Forced to Change Their Equipments: The Efforts Going On ….. 89
Existing Solutions and Associated Problems 90
VPN (Virtual Private Network) 90
Use of Geographical Distribution Services 91
Differential Services(DS), QoS Protocols(MPLS, RSVP), Sampling Packets and High Speed Edge Routers –– A Proposed Solution to Traffic Problems 91
Use of Differential Services 92
Use of Qos Protocols 92
Use of High Speed Edge Routers 94
Sampling Cloud Data 95
Conclusion 95
References 96
Scenario Based Analysis of Localization of Sensor Nodes Using HMM 98
Introduction 98
Related Work 99
Contributed Work 99
Hidden Markov Model 99
Random Walk Mobility 101
Random Waypoint Mobility 101
Reference Point Group Mobility 101
Semi-markov Smooth Mobility 102
Performance Metrics 102
Performance Evaluation 102
Conclusions 107
References 107
Network Security and Networking Protocols 108
Introduction 108
Introduction to Networking 109
Network Security, Modern Network Security Threats 109
Risk Management – A Game of Security 109
Securing Networking Devices 110
Authentication, Authorization and Accounting 110
Implementing Firewall Technologies 111
Implementing Intrusion Prevention System 111
Securing Local Area Networks 111
Implementing Virtual Area Networks 111
Network Protocols 112
Definition 112
Internet Protocols 112
Routing Protocols 113
How Network Protocols Are Implemented 113
OSI Layers and Their Protocols 113
Conclusions 114
References 115
A Dynamic Grid Based Route-Driven ECDH Scheme for Heterogeneous Sensor Networks 116
Introduction 116
The ECDH Based Key Management Scheme 117
Dynamic Grid Based Coordinate Route Driven Scheme 118
Performance Metrics 120
Energy Comparison of Uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes 120
Energy Comparison of Non-uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes 120
Throughput Comparison Uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes 122
Throughput Comparison for Non-uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes 122
Network Life Time for Different Routing Techniques 122
Conclusion 123
References 123
Novel Resource Allocation Strategy Using Network Metrics in GRID 125
Introduction 125
Need for Grid Monitoring 125
Network Monitoring 126
Resource Monitoring 127
Resource Monitoring vs Network Monitoring 128
Research Issues 129
References 130
Energy Efficient Routing Protocol for Wireless Sensor and Actor Networks 132
Introduction 132
Realted Work 133
Static Actors in WSAN Area 133
Mobile Actors in WSAN Area 134
System Model and Assumptions 134
Voronoi Diagram 135
The Procedure 135
Initialization Phase 136
Event Detection and Reporting Phase 136
Actor Coordination and Reaction 138
Simulation and Results 138
Performance Metrics 138
Simulation Environment 138
Results and Analysis 139
Conclusion 140
References 140
A Novel Visual Cryptographic Technique through Grey Level Inversion (VCTGLI) 142
Introduction 142
(n, n) Visual Cryptography 142
(k, n) Visual Cryptography 143
Related Works 143
The Technique 145
Proof of Decoding 146
Illustrative Example 147
Performance Analysis 148
Conclusion 150
References 150
A Frequency Spectral Feature Modeling for Hidden Markov Model Based Automated Speech Recognition 152
Introduction 152
Hidden Markov Modeling 153
Mel Spectrum Approach 155
Spectral Decomposition Approach 157
Mapping Approach 160
Simulation Observation 160
Conclusion 161
References 161
A Novel Trust Management Scheme Using Fuzzy Logic for a Pervasive Environment 162
Introduction 162
Related Works 163
Proposed Work 163
Global Data Store 163
Local Data Store 164
Credential Matching 164
Trust Negotiation 164
Trust Computation 165
Updating Trust Values 166
Security Issues 166
Malicious Nodes 166
Selfish Nodes 167
Group of Nodes 167
Hacking at the Network and the Database Layer 168
Performance Evaluation 168
Conclusion 169
References 170
Reducing the Size of the Test Suite by Genetic Algorithm and Concept Analysis 171
Introduction 171
Problem Statement 172
Related Work 172
Proposed System 172
Genetic Algorithm 173
An Overview of Genetic Algorithms 173
Representation 173
Genetic Algorithms Operators 174
Genetic Algorithm for Test Suite Reduction 174
Genetic Algorithm for Lattice 175
Frame Work for Test Suite Minimization 175
ConceptualGA 176
Performance Analysis 176
Conclusion and Future Work 178
References 179
AODV-DS with Dominant Pruning in Mobile Ad Hoc Networks 180
Introduction 180
Dominating Sets in AODV 182
AODV-DS 183
Simulation Results 183
Conclusion 187
References 187
DoS Attack Inference Using Traffic Wave Analysis 189
Introduction 189
Related Work 190
Need for Wavelets 190
Proposed Method 191
Continuous Wavelet Transform 191
Scaling and Translation 192
Morlet Wavelet 192
Spline Wavelet 193
Daubechies Wavelet 193
Implementation and Results 194
Energy Distribution 194
Performance Comparison 195
Conclusion and Future Work 196
References 197
Designing 3rd Generation Long-Haul Optical Backbone Networks through a Cost-Conscious Regeneration-Aware RWA Scheme 198
Introduction 198
System Model 199
Proposed Approach 200
Proposed Algorithm 200
Routing 201
Wavelength Assignment by Optimal Allocation of Regenerators 202
Final Positioning of Regenerators 203
Time-Complexity Analysis 204
Simulation Results 204
Conclusions 207
References 207
An Automated and Full-Proof Attendance Marking Scheme (TATTEND) Using Three Integrated Technologies 208
Introduction 208
Related Works 210
Proposed System 212
Flowcharts 212
Simulations 215
Significance 215
Constraints 216
Applications 216
Conclusions and Future Work 216
References 216
Agent Based Adaptive Multi-constrained Multicast Routing with QoS Guarantees in MANETs 218
Introduction 218
Related Works 219
Proposed Work 220
Network Environment 221
QoS Aware Multi-constrained Routing Model 222
Route Discovery Process 223
Adaptive Multi Path Routing Mechanism 224
Broken Link Maintenance 225
Multicast Routing Scheme Using Agents 226
Simulation 227
Simulation Model 227
Simulation Procedure 227
Analysis of Results 228
Conclusions 229
References 230
FPGA Implementation of High Speed Pulse Shaping Filter for SDR Applications 232
Introduction 232
Pulse Shaping Filters 233
Raised Cosine Filter 234
Proposed RRC Design and Simulation 235
Matlab Code 235
Hardware Implementation Results and Discussions 238
Conclusion 240
References 240
Feature Selection and Classification of Intrusions Using Genetic Algorithm and Neural Networks 241
Introduction 241
Existing Methods 242
Dataset Description 243
System Design 244
Feature Selection Using Genetic Algorithm 244
Data Pre-processing 246
Neural Network Classification 247
Results 248
Using Neural Network 248
Using Genetic Algorithm with Neural Networks 249
Conclusion 250
References 251
An Algorithm for Designing Controllers 253
Introduction 253
Control System Design Problem 254
Guidelines for Designing a Stable, Useful System 255
Some Heuristics for Designing the Closed-Loop Transfer Function 255
Design Problem 256
Algorithm for Computing Controllers for SISO System 256
Conclusions 260
References 260
Decision Support with RFID for Health Care 261
Introduction 261
The Scenario 262
Adaptive Knowledge-Based System Framework 262
Modified Adaptive Knowledge-Based Framework for Tracking Ancillaries 264
Discussion 266
References 267
Second International Conference on Wireless and Mobile Networks (WiMoN 2010) 268
An Algorithm to Determine Multicast Meshes with Maximum Lifetime for Mobile Ad Hoc Networks 268
Introduction 268
Algorithm to Determine Stable-Mobile-Mesh 269
Description of Algorithm $OptMeshTrans$ 270
Proof of Correctness of Algorithm $OptMeshTrans$ 272
Simulations 273
Average Mesh Lifetime 273
Average Number of Edges Per Mesh 274
Average Hop Count Per Source-Receiver Path 275
Conclusions and Future Work 276
References 277
Distributed Weight Based Clustering with Efficient Channel Access to Improve Quality of Service in Mobile Ad-Hoc Networks (DWCA) 278
Introduction 278
Clustering in MANETs 279
Related Work 280
Highest-Degree Heuristic 280
Lowest-ID Heuristic 280
Node-Weight Heuristic 280
Limitations of Existing Algorithm 280
Our Algorithm 281
Modifications over Existing Algorithms 281
The Design Approach 281
Description of Algorithm 282
Implementation and Performance Evaluation 284
Transmitting a Hello Packet to the Nodes 284
Conclusion 286
References 286
WACA: A New Weighted Adaptive Clustering Algorithm for MANET 288
Introduction 288
Related Works 289
Lowest-ID Algorithm 289
Highest-Connectivity Clustering Algorithm 290
Weighted Clustering Algorithm (WCA) 291
Enhanced Weighted Clustering Algorithm (EWCA) 291
Weighted Adaptive Clustering Algorithm (WACA) 293
Assumptions 293
Data Dictionary 293
Weight Function Calculation for the Proposed Algorithm 294
The Logic Behind 295
Simulation Experiment and Results 298
Performance Analysis 300
Conclusion 300
References 301
A Topology and Context Aware Query Distribution System in Middleware for Wireless Sensor Networks 302
Introduction 302
Basic Concepts 303
The Publish/Subscribe Paradigm 303
Distributed Query Processing in WSN 303
Context Awareness 304
The Proposed Architecture 304
Message Processor 305
A Simple Example 306
Building the Topography Database 306
Query Splitting 306
Query Distribution 307
Adaptive Query Propagation 309
Evaluation 310
Evaluation Setup 310
Results 310
Related Work 311
Conclusions and Future Work 312
References 312
On-Demand Table-Driven Topo-Aware Routing Protocol for Wireless Mesh Networks 314
Introduction 314
Cluster Formation 315
Cluster Formation at Mesh Router Level 315
Cluster Formation at MC Level 315
Performance Metrics for Routing Protocols 317
ETX (Expected Transmission Count) 317
ETT (Expected Transmission Time) 317
Proposed Rouitng Protocol 318
Neighbor Discovery 318
Route Discovery 319
Routing Maintenance 320
Simulation and Results 321
Simulation Environment 321
Simulation Results 321
Conclusion 322
References 322
An Efficient Quality of Service Scheduling Strategy for IEEE 802.16 Broadband Wireless Access Systems 324
Introduction 324
QoS Features of IEEE 802.16 327
Proposed Scheduling Algorithm 327
Simulation Model and Result Analysis 330
Simulation Environment and Parameters 330
Simulation Result and Discussions 330
Conclusion 332
References 333
Comparison of VoIP Performance over WiMAX, WLAN and WiMAX-WLAN Integrated Network Using OPNET 334
Introduction 334
Voice over IP 336
Simulation Environment 338
Simulation Results and Discussion 340
Conclusion 342
References 343
A Generalized Trust Framework for Mobile Ad Hoc Networks 344
Introduction 344
Related Works 345
Proposed Model 346
Simulations and Performance Analysis 350
Test 1: Few Black Holes as Neighbors over DSR Protocol 350
Flooding Attacks over AODV 351
Conclusion 352
References 352
Adaptive Routing Techniques in Disruption Tolerant Networks 354
Introduction 354
DTN Architecture 355
Routing in a Delay Tolerant Network 355
Example: Connecting a Remote Village 355
DTN Routing Issues 356
Knowledge 357
Routing Strategies for DTN 359
Unicast Routing in DTN 359
Anycast Routing in DTN 359
Delay-Tolerant Broadcasting 360
Multicasting Routing in DTN 360
Multicast Routing Algorithms 360
Mobility Pattern Based Routing Scheme 362
Mobility Profile Based Routing 362
Redundancy-Based Routing 363
Spray and Wait Scheme 363
Inter-domain Routing Schemes 364
Conclusion 365
References 365
Adaptive Valid Period Based Concurrency Control without Locking in Mobile Environments 367
Introduction 367
Related Work 368
Mobile Database Environment 368
Performance Limitations of Existing Scheme 369
Proposed Concurrency Control Scheme 370
Proposed Scheme Features 370
Proposed Client (MH) Algorithm 371
Proposed Server (FH) Algorithm 372
PerformanceMetrics 373
Advantages of Proposed Scheme 374
Conclusion 375
References 375
An Associativity Based Energy Aware Clustering Technique for Mobile Ad Hoc Networks 377
Introduction 377
Related Work 378
Neighboring Time as the Metric of Node Stability 379
Adjacent Cluster Heads 379
Problem with Weight Based Clustering Technique 379
Associativity Based Energy Aware Clustering Algorithm 380
Stability 380
Remaining Energy 381
Degree 381
Algorithm Description 381
Simulation 383
Performance Metrics 384
Conclusion 385
References 386
Frequency Domain Equalisation for OFDMA System in Multipath Fading Channels 387
Introduction 387
OFDMA System 388
System Model 389
Multiple Rate Spreading 389
Transmitted Signal 390
Multipath Channel Model 391
Received Signal 391
Channel Estimation and Equalisation 392
Simulation 393
Conclusion 394
References 394
Energy Aware Data Sharing in Mobile Ad Hoc Networks 396
Introduction 396
Issues Related to Data Replication in MANET 397
Related Work 398
Proposed Model 398
Pro_Active Replication Algorithm 399
Re_active Replication Algorithm 400
Simulation Set Up and Results 402
Conclusion and Future Work 403
References 404
Security Enhancement in WEP Mobility 406
Introduction 406
Security in Ad Hoc Network 407
Wired Equivalent Privacy Protocol 408
Security Approach 409
Self Monitoring Approach 410
Authentication 412
Construction of Updated Certificate Repositories 412
Simulation Results 414
Conclusion 416
References 416
TCP – AP and LRED over Single and Multiple TCP Flows in Multihop Wireless Channel 418
Introduction 418
TCP’S Challenges in AD-HOC Networks 419
Channel Errors 420
Mobility 420
Asymmetry 420
Lossy Channels 420
Routing Failures 421
Problems and Related Studies 421
Improving TCP Performance 422
Distributed Link RED (LRED) 422
Adaptive Pacing 423
Simulation Model and Results 424
Simulation Scenario I 424
Simulation Scenario II 424
Simulation Scenario III 425
Analysis of Simulation Results 425
Conclusion 427
References 427
A Secure Prioritized Trust Based Multi-path Routing Protocol for Ad Hoc Networks 429
Introduction 429
Related Work 430
Secure Prioritized Trust Based Multipath Routing 431
Multiple Path Initialization 431
Priority Level Slicing Model 434
Route Utilization 435
Route Maintenance 435
Performance Evaluation 435
Simulation 436
Results 436
Conclusion 437
References 438
Reducing Handoff Latency in IEEE 802.11b with the Help of Neighbor Graph Using Carrier to Interference Ratio 439
Introduction 439
Handover Process 441
Scanning 441
Authentication 441
Re-association 441
Related Works 442
Proposed Method 443
Selective Channel Scanning 445
Pre Authentication 445
Experimental Results 446
Conclusion and Future Work 447
References 447
To Alleviate Congestion Using Hybrid Sink for Delay Sensitive Applications in Wireless Sensor Networks 449
Introduction 449
Related Work 450
Proposed Work 451
Wireless Sensor Network Model 451
Algorithm for Data Collection 451
Moving Scheme 452
Simulation Scenario and Metrics 453
Simulation Result and Analysis 453
Conclusions and Future Work 455
References 455
Comparison of Cooperative Caching Strategies in Mobile Ad-Hoc Network (MANET) 457
Introduction 457
Cooperative Caching Strategies 458
Comparison of Cooperative Caching Strategies 462
Conclusion 463
References 464
Framework for Probabilistic Routing in Dense MANETs 465
Introduction 465
MANET Routing Protocols 466
Proposed Routing Scheme 467
Neighborhood Vector Construction 467
Route Discovery 468
Simulation Setup 469
Results and Analysis 470
Conclusions 473
References 473
Lightweight Management Framework (LMF) for a Heterogeneous Wireless Network for Landslide Detection 475
Introduction 475
Related Work 476
Service Architecture for Landslide Monitoring 477
Lightweight Management Framework (LMF) 478
Cluster Member 479
Cluster Heads 481
Sensor Network Gateways (SNG) 481
Data Management Center (DMC) 484
Deployment and Validation 485
Sink Node Congestion 486
Interference 486
Packet Loss in VSAT 487
Validation 487
Conclusion 488
References 489
Dasarathy Model Based Fusion Framework for Fire Detection Application in WSN 490
Introduction 490
Proposed Fusion Framework 491
Sensing Module 491
Prefusion Module 491
Fusion Module 493
Post Fusion Module 495
Simulation Results 496
Conclusion 497
References 498
Localization Based on Signal Strength Using Kalman Approach 499
Introduction 499
Proposed Localization Algorithm 500
Distance Estimation Phase 500
Co-ordinate Estimation Phase 502
Simulation Results 503
Conclusion 506
References 507
Second International Conference on Web and Semantic Technology (WeST 2010) 508
Reliable Data Replication Middleware for Next Generation Web Services 508
Introduction 508
Related Works 509
Proposed System 510
Interceptor Module 512
Publish/Subscribe-Replication Module 512
Multicast Module 513
Security Module 513
Performance Analysis 514
Conclusions 516
References 516
An Algorithmic Framework for Collaborative Interest Group Construction 518
Introduction 518
Determination of the Interest Similarity Relations 519
The Interest Vector 520
Similarity Scores between Researchers 520
Assessing Expertise: Why It Matters? 520
Algorithm for Construction of Collaborative Research Interest Group 521
Case Study 522
Interest Vector Calculations 523
Similarity Score Calculation 525
Conclusion 526
References 526
Survey on Federated Identity Management Systems 527
Introduction 527
Federated Identity Management Standards 527
Federated Identity Management and Web Services 527
Security Requirements 528
Analysis 529
What Is It? 529
How Is It Used? 529
Why Is It Necessary? 529
How Does It Work? 530
Who Is Using It? 530
What Are the Challenges? 530
Single Sign-On 530
Authentication 531
Authorization 531
Accounting 531
Advantages of AAA 532
Flexible User Authentication Methods 532
Flexible User Privileges 532
Wi-Fi Visitor Access 532
Multi-vendor WLAN Support 532
Fast and Easy to Deploy 532
Centralized Administration Center 532
Detailed Usage Reports 532
Scalable, Future-Proof Solution 533
RADIUS and AAA 533
Lightweight Directory Access Protocol 534
RADIUS V/S LDAP 534
References 535
Automating Reuse of Semantic Repositories in the Context of Semantic Web 536
Introduction 536
Ontologies – Semantic Repository 536
Nature of Semantic Repositories 537
Technique for Ontology Reuse 537
Ontology Discovery 537
Selection of Suitable Ontologies for Reuse 537
Integration of Ontologies 538
Evaluation of Ontology 538
Framework for Automatic Reuse of Semantic Repositories 538
Basic Framework 538
Semantic Kernel 539
Implementation Overview 539
Input Processing 540
Global Query Processing 540
Issues and Challenges 540
Conclusions 541
References 541
Discovering Models from Event-Based Data Basis on a Survey of Issues and Approaches 542
Introduction 542
Background 543
Classification of Model Discovery Problem 545
Protocol Model Discovery 546
Data Model Discovery 546
Behavioral Model Discovery 546
Different Approaches for Model Discovery 546
Graph Based Process Discovery Technique 546
Event Based Process Discovery Technique 547
Concurrent Behavior Discovery Technique 547
Protocol Discovery Tools 548
Comparison of Different Process Mining Tools 549
Conclusion 549
References 550
Prediction of Learning Disabilities in School Age Children Using Decision Tree 551
Introduction 551
Learning Disability 552
Decision Tree 553
Classification by Decision Tree 553
Methodology Used for Making the Decision Tree 555
Attribute List 555
Attribute Selection Method by Gain Ratio 555
Classification 556
Extraction of Rules from Tree 557
Result Analysis 558
Comparison of Results 559
Conclusion and Future Research 559
References 560
Co-occurrence Based Place Name Disambiguation and Its Application to Retrieval of Geological Text 561
Introduction 561
Related Work 562
Proposed System 562
Co-occurrence Based Name Disambiguation 563
Query Expansion Using Co-occurrence Graph 565
Algorithm: Co-occurrence Based Query Expansion 565
Results and Discussion 567
Conclusion 569
References 569
A Formal Method for Detecting Semantic Conflicts in Protocols between Services with Different Ontologies 571
Introduction 571
Protocol and Conflict 572
Formal Description of the Protocol 573
Example of Protocol 573
Notion of Mismatch between Two Ontologies 574
Graph Model of Ontology 575
Overview of the Method 575
Structural Algorithm to Check the Semantic Consistency 576
Working Example 576
Proof of Correctness 578
Related Works 579
Conclusion 580
References 580
Test Suite Diminuition Using GRE Heuristic with Selective Redundancy Approach 581
Introduction 581
Problem Statement 582
Related Work 582
Proposed System 582
Methodology and Solution 583
Greedy, Selectively Redundant and Essential Algorithm 584
Performance Analysis 587
Representative Test Size 587
Fault Detection Capability 587
Conclusion and Future Work 588
References 589
First International Workshop on Ad Hoc, Sensor and Ubiquitous Computing (ASUC 2010) 590
Mobility Monitoring by Using RSSI in Wireless Sensor Networks 590
Introduction 590
Related Work 591
RSSI: Received Signal Strength Indicator 591
Experimentation 592
Application 1 592
Application 2 594
Conclusion 597
References 597
Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering 599
Introduction 599
NGN-IMS Architecture 600
Related Work 602
To Retrieve Multiple Fees at One Platform 602
Easy Integration with Third Party Feeds and User Personalization 603
Value Added Services with Web Aggregators 603
End Users Benefits 603
Operator Advantages 604
Contributions and Functional Description 604
Architectural Descriptions 605
Implementation Issues 606
Conclusion 608
References 608
An Adaptive Framework for Wireless Sensor Network Application Development 610
Introduction 610
Related Work 611
Proposed System Architecture of AFWA 612
Functional Design Decomposition of AFWA 613
GUI 614
Mote Module and System Components Repository 615
XML Interfaces and Files 615
Build Module 616
Programmer 616
Demonstrative Use of AFWA for Network Communication 616
Conclusions and Future Work 617
References 618
A Comparison of the Efficiencies of Different Wireless Sensor Network Algorithms with Respect to Time 620
Introduction 620
Analysis of Different WSN Routing Algorithms 621
Flooding 621
Gossiping Algorithm 623
Clustering Algorithm 624
Directed Diffusion 625
Sensor Protocols for Information via Negotiation (SPIN) 628
Results and Discussion 632
Limitation of Mathematical Analysis 634
Conclusion 635
References 635
Internal Map of the Nanostack 6LoWPAN Stack 637
Introduction 637
Stack Architecture 638
Main Data Structure Used in the Stack 638
Dispatcher of Packets and Stack Architecture 639
MACLayer 643
Packets in BUFFER UP Direction 643
Packets in BUFFER DOWN Direction 643
cIPV6Layer 644
Exception Messages 644
Packets in BUFFER UP Direction 646
Packets in BUFFER DOWN Direction 647
Mesh Layer 647
Packets in BUFFER UP Direction 648
Packets in BUFFER DOWN Direction 648
Higher Layers 649
cUDP Layer 649
Application Layer 649
Discussion and Conclusions 649
References 651
Prolonging Network Lifetime Using Ant Colony Optimization Algorithm on LEACH Protocol for Wireless Sensor Networks 652
Introduction 652
Data Transmission 652
Proposed ACO Approach for LEACH 654
Algorithm 656
Related Work 656
Simulation Results 657
Conclusion 658
References 658
Energy Efficient Mobile Wireless Sensor Network Routing Protocol 660
Introduction 660
Related Work 661
Energy Efficient Mobile Wireless Sensor Network Routing Protocol 662
Calculation of Surplus Energy 662
Formation of Fusion Node 663
Data Announcement 663
Data Forwarding 664
Pseudo Code to Implement IntEr Precinct Routing in E$^2$MWSNRP 666
Simulation Environment and Evaluation Methodology 666
Conclusion 667
References 668
Dynamic Service Discovery as an Optimization Problem in Wireless Sensor Networks 669
Introduction 669
The Rationale for Neighborhood and Service Discovery 671
Proximal Neighborhood Discovery Algorithm 672
Optimal Service Provider Discovery Algorithm 673
OSD Algorithm Based on Particle Swarm Optimization 673
Simulation 677
Implementation 677
Simulation Results 678
Conclusion and Future Work 679
References 680
A New Approach for Workflow Tasks Scheduling in Distributed Heterogeneous Environment 681
Introduction 681
Related Work 682
Scheduling System Model 683
LCPR Algorithm 684
Leveling Phase 684
Cost Assignment Phase 684
Prioritization Phase 685
Resource Allocation Phase 686
Implementation Environment 686
Performance Analysis and Results 687
Conclusion and Future Work 688
References 688
A Range Based Localization Algorithm Using Autonomous Speed Mobile Sink (MOBISPEED) in Distributed Wireless Sensor Networks 690
Introduction 690
Related Work 691
Objectives and Requirements 692
Proposed Scheme 692
Location Estimation Algorithm 695
Assumptions and System Environments 695
Location Calculation 695
Beacon Points and Information Base in Mobile Sink 696
Performance Evaluation 696
Conclusion 698
References 698
First International Workshop on VLSI (VLSI 2010) 700
Development of Controllability Observability Aided Combinational ATPG with Fault Reduction 700
Introduction 700
Reduced Fault Set 701
Controllability Observability 703
Controllability Observability Aided ATPG for Reduced Fault Set 706
Results 708
Conclusion 709
References 709
Implementation of ADPLL with 0.6µm CMOS Process for SOC Applications 711
Introduction 711
Architecture Overview 712
Circuit Design 713
Phase/Frequency Detector 713
Digitally Controlled Oscillator 715
Experimental Results 717
Conclusions 718
References 719
Fault Diagnosis of Analog Circuits Utilizing Reconfigurable Computing System 720
Introduction 720
Fault Diagnosis of Analog Circuits 721
Reconfigurable Computing System 722
Field Programmable Gate Arrays 722
Approach 724
System Modules 725
Analog Circuit Simulation 725
Fault Dictionary Storage 726
Reconfiguration Using FPGAs 727
FPGA Implementation 727
Conclusion 728
References 728
A Low Voltage High Performance OTA in 0.18 Micron with High Linearity 730
Introduction 730
Review on Bulk-Driven MOS 731
Proposed OTA 732
The Amplifier Core 732
High-Swing Super-Wilson Current Mirror 733
Proposed OTA 735
Simulation Results 736
Conclusion 738
References 738
Author Index 740

Erscheint lt. Verlag 1.1.2010
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Mathematik / Informatik Informatik Netzwerke
Informatik Software Entwicklung User Interfaces (HCI)
Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen Hardware
ISBN-10 3-642-14493-4 / 3642144934
ISBN-13 978-3-642-14493-6 / 9783642144936
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 18,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Eine praxisorientierte Einführung mit Anwendungen in Oracle, SQL …

von Edwin Schicker

eBook Download (2017)
Springer Vieweg (Verlag)
34,99
Unlock the power of deep learning for swift and enhanced results

von Giuseppe Ciaburro

eBook Download (2024)
Packt Publishing (Verlag)
35,99