Vol.6 No.4 December, 2010
Performance Evaluation of
Wireless Sensor Networks for Mobile Event and Mobile Sink
(281-292)
Tao Yang, Makoto Ikeda,
Leonard Barolli, Fatos Xhafa, and Arjan Durresi
Extending lifetime and energy
efficiency are important objectives and challenges in Wireless Sensor
Networks (WSNs). In large scale WSNs, when the nodes are near to the
sink they consume much more energy than the nodes far from the sink. In
our previous work, we considered that the sink node was stationary and
only event node was moving in the observation field. In this work, we
consider both cases when the sink node and event node are moving. For
the simulations, we use TwoRayGround and Shadowing radio models, lattice
topology and AODV protocol. We compare the simulation results for the
cases when the sink node and event node are mobile and stationary. The
simulation results have shown that the goodput of TwoRayGround is better
than Shadowing in case of mobile event, but the depletion of Shadowing
is better than TwoRayGround in case of mobile event. The goodput in case
of mobile sink is better than stationary sink when the transmission rate
is lower than 10pps. For TwoRayGround radio model, the depletion in case
of mobile sink is better than stationary sink when the number of nodes
is increased.
Fault Tolerant Small-World Cellular Neural Networks for Intermitted
Faults
(293-304)
Katsuyoshi Matsumoto, Minoru Uehara, and
Hideki Mori
A Cellular Neural Network (CNN) is a
neural network model linked only to neighborhoods and which is suitable
for image processing, such as noise reduction and edge detection. A
Small World Cellular Neural Network (SWCNN) is an extended CNN to which
has been added a small world link, which is a global short-cut. The
SWCNN has better performance than the CNN. One of the weaknesses of the
SWCNN has low fault tolerance. If the the neuron is failed, the SWCNN
shows lower fault tolerance than the CNN. Previously, we proposed TMR
and Reliability Counter (RC) for fault tolerance the SWCNN. In this
paper, we propose the Stateful Reliability Counter (Stateful RC) method
to improve tolerance. The Stateful RC has a failure state of the last
histrory. The Stateful RC for TMR has higher fault tolerant than TMR and
RC in the low repaire rate.
Performance Analysis of
ROADMs at Peak Traffic in
All Optical Network
(305-313)
T.S. Indumath, K. Rajaiah, T. Srinivas,
and V. Rajappa
Reconfigurable Optical Add / Drop Multiplexer is a
subsystem of All Optical Networks. In this paper we analyze the routing
performance of ROADMs at peak traffic using Pascal distribution model.
To evaluate wavelength routing capability of ROADMs of various
architectures in dynamic optical network, a theoretical routing power
model is considered. With simulation results, the routing power and
blocking probability have been evaluated to achieve better performance
and flexibility.
Fingerprint
Image Processing and Fuzzy Vault Implementation
(314-338)
Nandita Bhattacharjee and Chien Eao Lee
Accuracy and reliability are two terms that are vital in a biometric
system, which must also tolerate the fuzziness of the biometric
characteristics to a certain degree. In this paper, we propose and
implement fingerprint image enhancement as a preliminary stage to
increase the accuracy and reliability of minutiae extraction process for
fuzzy vault implementation. In this pre-processing stage, we attempt to
recover and enhance the corrupted and noisy region by employing
filtering technique. The enhanced image is finally transformed to its
skeleton equivalent, preserving the ridges and valleys connectivity for
minutiae extraction process. Rutovitz Crossing Number (CN) algorithm is
then applied to extract the candidate minutiae which will then undergo a
series of minutiae filtering processes to determine the validity of the
extracted raw minutiae as true minutia. The implementations of the
minutiae filtering processes are able to identify and eliminate the
predefined spurious minutiae. As we are focusing on extracting accurate
minutiae for the purpose of fuzzy vault implementation, we also take
into consideration the quantization of the minutiae, which is an
important factor in fuzzy vault locking and unlocking procedures. We
then perform the fingerprint fuzzy vault cryptography processes based on
the extracted minutiae, where a secret key is generated, encoded and
then decoded. Experiments have been conducted for the fingerprint image
processing stage and fuzzy vault implementation stage. We obtained a
Goodness Index (GI) of 0.55 for the image processing stage, which
indicates that our implementation is performing well comparing to other
methods. As for the fuzzy vault implementation, we managed to achieve
promising False Acceptance Rate (FAR) and False Rejection Rate (FRR) for
polynomial degrees ranging from 8 to 13.
Enriching the Design and Prototyping Loop: a Set
of Tools to Support the Creation of Activity-Based Pervasive
Applications
(339-360)
Pascal Bruegger, Agnes
Lisowska, Denis Lalanne, and Beat Hirsbrunner
This paper proposes a complete approach
to support the modelling, testing and prototyping of pervasive
applications. It describes a set of tools aimed at supporting designers
in the conceptualisation of their application and in the software
development stage, and proposes a method for checking the validity of
their design. For each step of the development life-cycle (design,
prototyping and evaluation), we position the proposed approach with
respect to related tools and methods. We also present a pervasive
application implemented and evaluated using the proposed approach and
tools, which facilitates further discussion of the benefits and
disadvantages of using the proposed framework. We conclude with
propositions for improvements to our comprehensive modelling,
prototyping and testing framework for pervasive applications.
Back
to JMM Online Front Page |