Recent Trends in Networks and Communications - International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, 2010. Proceedings

von: Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai

Springer-Verlag, 2010

ISBN: 9783642144936 , 742 Seiten

Format: PDF, OL

Kopierschutz: DRM

Windows PC,Mac OSX für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 103,79 EUR

Mehr zum Inhalt

Recent Trends in Networks and Communications - International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, 2010. Proceedings


 

Preface

5

Organization

7

Table of Contents

12

The Second International Conference on Networks and Communications (NeCoM 2010)

19

Improving TCP Performance over Wireless Networks Using Cross Layer

19

Introduction

19

Related WorK

20

TCP New Reno and CLAMP

20

The Proposed Protocol (L$^2$ CLAMP- TCP)

20

L$^2$CLAMP Architecture

20

Algorithm

22

Performance Evaluation

23

Analysis by Varying Queue Delay

23

Throughput Analysis by Varying Packet Size

25

Analysis by Varying Simulation Time

26

Conclusions and Future Work

27

References

28

Improving Tracking Performance of FxLMS Algorithm Based Active Noise Control Systems

29

Introduction

29

Secondary Path Effects

30

FxLMS Algorithm

32

Wavelet Thresholding

32

Hard Thresholding Algorithm

33

Soft Thresholding Algorithm

33

Proposed Method

33

Simulation Results

36

Conclusions

37

References

37

Source and System Features for Text Independent Speaker Recognition Using GMM Speaker Models

39

Introduction

40

Feature Based on Cepstrum

40

PLP, MF-PLP and Pitch Extraction

40

Development of GMM Training Models

41

Speaker Identification Based on Proposed Features

42

Results and Discussion

43

Statistical Analysis on Features

46

Conclusions

47

References

47

Optimization of ASIC Design Cycle Time

49

Introduction

49

Methods of Optimization

50

Hardware- Based Method

50

Re-usability Method

50

Abstraction-Based Method

51

Assertion-Based Method

51

Co-verification-Based Method

52

Modeling or Model-Based Design

53

Why Modeling or Model-Based Design?

53

Case-Study

54

Implementation and Results

55

Traditional Verification Environment Using System Verilog

55

Transaction-Level Modeling Using VMM-1.2

55

Modeling Using System Verilog and Matlab

56

Conclusion

57

References

57

Optimal Solution for RFID Load Balancing

59

Introduction

59

Proposal

61

Agent Based Approach for RFID Middleware

62

Algorithm

62

Algorithm for Allocation of Tags

62

Algorithm for Turning off Redundant Readers

64

Wake-Up Criteria

65

Evaluation and Results

65

Conclusion

67

References

67

Fault Management in Grid Using Multi-agents

68

Introduction

68

Related Work

69

Architecture and Design

70

Head Agent

70

Back-Up Agent

71

Member Agent

71

Proxy or Member Representative Agent

71

Timer1 Agent

71

Timer2 Agent

72

Timer3 Agent

72

Ping Agent

72

Agent Repository

72

Implementation

72

Results and Discussions

73

Conclusion

75

Future Works

75

References

76

Minimizing Response Time in an Autonomic Computing System Using Proportional Control

78

Introduction

78

System Background

80

Modeling and System Identification

80

Controller Design

81

Implementation

81

Results

83

Conclusions

83

References

84

Elucidation of Upcoming Traffic Problems in Cloud Computing

86

Introduction

86

The Network Based Measurement

87

Current State of Cloud Computing Services

88

Networking Vendors Are Forced to Change Their Equipments: The Efforts Going On …..

89

Existing Solutions and Associated Problems

90

VPN (Virtual Private Network)

90

Use of Geographical Distribution Services

91

Differential Services(DS), QoS Protocols(MPLS, RSVP), Sampling Packets and High Speed Edge Routers –– A Proposed Solution to Traffic Problems

91

Use of Differential Services

92

Use of Qos Protocols

92

Use of High Speed Edge Routers

94

Sampling Cloud Data

95

Conclusion

95

References

96

Scenario Based Analysis of Localization of Sensor Nodes Using HMM

98

Introduction

98

Related Work

99

Contributed Work

99

Hidden Markov Model

99

Random Walk Mobility

101

Random Waypoint Mobility

101

Reference Point Group Mobility

101

Semi-markov Smooth Mobility

102

Performance Metrics

102

Performance Evaluation

102

Conclusions

107

References

107

Network Security and Networking Protocols

108

Introduction

108

Introduction to Networking

109

Network Security, Modern Network Security Threats

109

Risk Management – A Game of Security

109

Securing Networking Devices

110

Authentication, Authorization and Accounting

110

Implementing Firewall Technologies

111

Implementing Intrusion Prevention System

111

Securing Local Area Networks

111

Implementing Virtual Area Networks

111

Network Protocols

112

Definition

112

Internet Protocols

112

Routing Protocols

113

How Network Protocols Are Implemented

113

OSI Layers and Their Protocols

113

Conclusions

114

References

115

A Dynamic Grid Based Route-Driven ECDH Scheme for Heterogeneous Sensor Networks

116

Introduction

116

The ECDH Based Key Management Scheme

117

Dynamic Grid Based Coordinate Route Driven Scheme

118

Performance Metrics

120

Energy Comparison of Uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes

120

Energy Comparison of Non-uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes

120

Throughput Comparison Uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes

122

Throughput Comparison for Non-uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes

122

Network Life Time for Different Routing Techniques

122

Conclusion

123

References

123

Novel Resource Allocation Strategy Using Network Metrics in GRID

125

Introduction

125

Need for Grid Monitoring

125

Network Monitoring

126

Resource Monitoring

127

Resource Monitoring vs Network Monitoring

128

Research Issues

129

References

130

Energy Efficient Routing Protocol for Wireless Sensor and Actor Networks

132

Introduction

132

Realted Work

133

Static Actors in WSAN Area

133

Mobile Actors in WSAN Area

134

System Model and Assumptions

134

Voronoi Diagram

135

The Procedure

135

Initialization Phase

136

Event Detection and Reporting Phase

136

Actor Coordination and Reaction

138

Simulation and Results

138

Performance Metrics

138

Simulation Environment

138

Results and Analysis

139

Conclusion

140

References

140

A Novel Visual Cryptographic Technique through Grey Level Inversion (VCTGLI)

142

Introduction

142

(n, n) Visual Cryptography

142

(k, n) Visual Cryptography

143

Related Works

143

The Technique

145

Proof of Decoding

146

Illustrative Example

147

Performance Analysis

148

Conclusion

150

References

150

A Frequency Spectral Feature Modeling for Hidden Markov Model Based Automated Speech Recognition

152

Introduction

152

Hidden Markov Modeling

153

Mel Spectrum Approach

155

Spectral Decomposition Approach

157

Mapping Approach

160

Simulation Observation

160

Conclusion

161

References

161

A Novel Trust Management Scheme Using Fuzzy Logic for a Pervasive Environment

162

Introduction

162

Related Works

163

Proposed Work

163

Global Data Store

163

Local Data Store

164

Credential Matching

164

Trust Negotiation

164

Trust Computation

165

Updating Trust Values

166

Security Issues

166

Malicious Nodes

166

Selfish Nodes

167

Group of Nodes

167

Hacking at the Network and the Database Layer

168

Performance Evaluation

168

Conclusion

169

References

170

Reducing the Size of the Test Suite by Genetic Algorithm and Concept Analysis

171

Introduction

171

Problem Statement

172

Related Work

172

Proposed System

172

Genetic Algorithm

173

An Overview of Genetic Algorithms

173

Representation

173

Genetic Algorithms Operators

174

Genetic Algorithm for Test Suite Reduction

174

Genetic Algorithm for Lattice

175

Frame Work for Test Suite Minimization

175

ConceptualGA

176

Performance Analysis

176

Conclusion and Future Work

178

References

179

AODV-DS with Dominant Pruning in Mobile Ad Hoc Networks

180

Introduction

180

Dominating Sets in AODV

182

AODV-DS

183

Simulation Results

183

Conclusion

187

References

187

DoS Attack Inference Using Traffic Wave Analysis

189

Introduction

189

Related Work

190

Need for Wavelets

190

Proposed Method

191

Continuous Wavelet Transform

191

Scaling and Translation

192

Morlet Wavelet

192

Spline Wavelet

193

Daubechies Wavelet

193

Implementation and Results

194

Energy Distribution

194

Performance Comparison

195

Conclusion and Future Work

196

References

197

Designing 3rd Generation Long-Haul Optical Backbone Networks through a Cost-Conscious Regeneration-Aware RWA Scheme

198

Introduction

198

System Model

199

Proposed Approach

200

Proposed Algorithm

200

Routing

201

Wavelength Assignment by Optimal Allocation of Regenerators

202

Final Positioning of Regenerators

203

Time-Complexity Analysis

204

Simulation Results

204

Conclusions

207

References

207

An Automated and Full-Proof Attendance Marking Scheme (TATTEND) Using Three Integrated Technologies

208

Introduction

208

Related Works

210

Proposed System

212

Flowcharts

212

Simulations

215

Significance

215

Constraints

216

Applications

216

Conclusions and Future Work

216

References

216

Agent Based Adaptive Multi-constrained Multicast Routing with QoS Guarantees in MANETs

218

Introduction

218

Related Works

219

Proposed Work

220

Network Environment

221

QoS Aware Multi-constrained Routing Model

222

Route Discovery Process

223

Adaptive Multi Path Routing Mechanism

224

Broken Link Maintenance

225

Multicast Routing Scheme Using Agents

226

Simulation

227

Simulation Model

227

Simulation Procedure

227

Analysis of Results

228

Conclusions

229

References

230

FPGA Implementation of High Speed Pulse Shaping Filter for SDR Applications

232

Introduction

232

Pulse Shaping Filters

233

Raised Cosine Filter

234

Proposed RRC Design and Simulation

235

Matlab Code

235

Hardware Implementation Results and Discussions

238

Conclusion

240

References

240

Feature Selection and Classification of Intrusions Using Genetic Algorithm and Neural Networks

241

Introduction

241

Existing Methods

242

Dataset Description

243

System Design

244

Feature Selection Using Genetic Algorithm

244

Data Pre-processing

246

Neural Network Classification

247

Results

248

Using Neural Network

248

Using Genetic Algorithm with Neural Networks

249

Conclusion

250

References

251

An Algorithm for Designing Controllers

253

Introduction

253

Control System Design Problem

254

Guidelines for Designing a Stable, Useful System

255

Some Heuristics for Designing the Closed-Loop Transfer Function

255

Design Problem

256

Algorithm for Computing Controllers for SISO System

256

Conclusions

260

References

260

Decision Support with RFID for Health Care

261

Introduction

261

The Scenario

262

Adaptive Knowledge-Based System Framework

262

Modified Adaptive Knowledge-Based Framework for Tracking Ancillaries

264

Discussion

266

References

267

Second International Conference on Wireless and Mobile Networks (WiMoN 2010)

268

An Algorithm to Determine Multicast Meshes with Maximum Lifetime for Mobile Ad Hoc Networks

268

Introduction

268

Algorithm to Determine Stable-Mobile-Mesh

269

Description of Algorithm $OptMeshTrans$

270

Proof of Correctness of Algorithm $OptMeshTrans$

272

Simulations

273

Average Mesh Lifetime

273

Average Number of Edges Per Mesh

274

Average Hop Count Per Source-Receiver Path

275

Conclusions and Future Work

276

References

277

Distributed Weight Based Clustering with Efficient Channel Access to Improve Quality of Service in Mobile Ad-Hoc Networks (DWCA)

278

Introduction

278

Clustering in MANETs

279

Related Work

280

Highest-Degree Heuristic

280

Lowest-ID Heuristic

280

Node-Weight Heuristic

280

Limitations of Existing Algorithm

280

Our Algorithm

281

Modifications over Existing Algorithms

281

The Design Approach

281

Description of Algorithm

282

Implementation and Performance Evaluation

284

Transmitting a Hello Packet to the Nodes

284

Conclusion

286

References

286

WACA: A New Weighted Adaptive Clustering Algorithm for MANET

288

Introduction

288

Related Works

289

Lowest-ID Algorithm

289

Highest-Connectivity Clustering Algorithm

290

Weighted Clustering Algorithm (WCA)

291

Enhanced Weighted Clustering Algorithm (EWCA)

291

Weighted Adaptive Clustering Algorithm (WACA)

293

Assumptions

293

Data Dictionary

293

Weight Function Calculation for the Proposed Algorithm

294

The Logic Behind

295

Simulation Experiment and Results

298

Performance Analysis

300

Conclusion

300

References

301

A Topology and Context Aware Query Distribution System in Middleware for Wireless Sensor Networks

302

Introduction

302

Basic Concepts

303

The Publish/Subscribe Paradigm

303

Distributed Query Processing in WSN

303

Context Awareness

304

The Proposed Architecture

304

Message Processor

305

A Simple Example

306

Building the Topography Database

306

Query Splitting

306

Query Distribution

307

Adaptive Query Propagation

309

Evaluation

310

Evaluation Setup

310

Results

310

Related Work

311

Conclusions and Future Work

312

References

312

On-Demand Table-Driven Topo-Aware Routing Protocol for Wireless Mesh Networks

314

Introduction

314

Cluster Formation

315

Cluster Formation at Mesh Router Level

315

Cluster Formation at MC Level

315

Performance Metrics for Routing Protocols

317

ETX (Expected Transmission Count)

317

ETT (Expected Transmission Time)

317

Proposed Rouitng Protocol

318

Neighbor Discovery

318

Route Discovery

319

Routing Maintenance

320

Simulation and Results

321

Simulation Environment

321

Simulation Results

321

Conclusion

322

References

322

An Efficient Quality of Service Scheduling Strategy for IEEE 802.16 Broadband Wireless Access Systems

324

Introduction

324

QoS Features of IEEE 802.16

327

Proposed Scheduling Algorithm

327

Simulation Model and Result Analysis

330

Simulation Environment and Parameters

330

Simulation Result and Discussions

330

Conclusion

332

References

333

Comparison of VoIP Performance over WiMAX, WLAN and WiMAX-WLAN Integrated Network Using OPNET

334

Introduction

334

Voice over IP

336

Simulation Environment

338

Simulation Results and Discussion

340

Conclusion

342

References

343

A Generalized Trust Framework for Mobile Ad Hoc Networks

344

Introduction

344

Related Works

345

Proposed Model

346

Simulations and Performance Analysis

350

Test 1: Few Black Holes as Neighbors over DSR Protocol

350

Flooding Attacks over AODV

351

Conclusion

352

References

352

Adaptive Routing Techniques in Disruption Tolerant Networks

354

Introduction

354

DTN Architecture

355

Routing in a Delay Tolerant Network

355

Example: Connecting a Remote Village

355

DTN Routing Issues

356

Knowledge

357

Routing Strategies for DTN

359

Unicast Routing in DTN

359

Anycast Routing in DTN

359

Delay-Tolerant Broadcasting

360

Multicasting Routing in DTN

360

Multicast Routing Algorithms

360

Mobility Pattern Based Routing Scheme

362

Mobility Profile Based Routing

362

Redundancy-Based Routing

363

Spray and Wait Scheme

363

Inter-domain Routing Schemes

364

Conclusion

365

References

365

Adaptive Valid Period Based Concurrency Control without Locking in Mobile Environments

367

Introduction

367

Related Work

368

Mobile Database Environment

368

Performance Limitations of Existing Scheme

369

Proposed Concurrency Control Scheme

370

Proposed Scheme Features

370

Proposed Client (MH) Algorithm

371

Proposed Server (FH) Algorithm

372

PerformanceMetrics

373

Advantages of Proposed Scheme

374

Conclusion

375

References

375

An Associativity Based Energy Aware Clustering Technique for Mobile Ad Hoc Networks

377

Introduction

377

Related Work

378

Neighboring Time as the Metric of Node Stability

379

Adjacent Cluster Heads

379

Problem with Weight Based Clustering Technique

379

Associativity Based Energy Aware Clustering Algorithm

380

Stability

380

Remaining Energy

381

Degree

381

Algorithm Description

381

Simulation

383

Performance Metrics

384

Conclusion

385

References

386

Frequency Domain Equalisation for OFDMA System in Multipath Fading Channels

387

Introduction

387

OFDMA System

388

System Model

389

Multiple Rate Spreading

389

Transmitted Signal

390

Multipath Channel Model

391

Received Signal

391

Channel Estimation and Equalisation

392

Simulation

393

Conclusion

394

References

394

Energy Aware Data Sharing in Mobile Ad Hoc Networks

396

Introduction

396

Issues Related to Data Replication in MANET

397

Related Work

398

Proposed Model

398

Pro_Active Replication Algorithm

399

Re_active Replication Algorithm

400

Simulation Set Up and Results

402

Conclusion and Future Work

403

References

404

Security Enhancement in WEP Mobility

406

Introduction

406

Security in Ad Hoc Network

407

Wired Equivalent Privacy Protocol

408

Security Approach

409

Self Monitoring Approach

410

Authentication

412

Construction of Updated Certificate Repositories

412

Simulation Results

414

Conclusion

416

References

416

TCP – AP and LRED over Single and Multiple TCP Flows in Multihop Wireless Channel

418

Introduction

418

TCP’S Challenges in AD-HOC Networks

419

Channel Errors

420

Mobility

420

Asymmetry

420

Lossy Channels

420

Routing Failures

421

Problems and Related Studies

421

Improving TCP Performance

422

Distributed Link RED (LRED)

422

Adaptive Pacing

423

Simulation Model and Results

424

Simulation Scenario I

424

Simulation Scenario II

424

Simulation Scenario III

425

Analysis of Simulation Results

425

Conclusion

427

References

427

A Secure Prioritized Trust Based Multi-path Routing Protocol for Ad Hoc Networks

429

Introduction

429

Related Work

430

Secure Prioritized Trust Based Multipath Routing

431

Multiple Path Initialization

431

Priority Level Slicing Model

434

Route Utilization

435

Route Maintenance

435

Performance Evaluation

435

Simulation

436

Results

436

Conclusion

437

References

438

Reducing Handoff Latency in IEEE 802.11b with the Help of Neighbor Graph Using Carrier to Interference Ratio

439

Introduction

439

Handover Process

441

Scanning

441

Authentication

441

Re-association

441

Related Works

442

Proposed Method

443

Selective Channel Scanning

445

Pre Authentication

445

Experimental Results

446

Conclusion and Future Work

447

References

447

To Alleviate Congestion Using Hybrid Sink for Delay Sensitive Applications in Wireless Sensor Networks

449

Introduction

449

Related Work

450

Proposed Work

451

Wireless Sensor Network Model

451

Algorithm for Data Collection

451

Moving Scheme

452

Simulation Scenario and Metrics

453

Simulation Result and Analysis

453

Conclusions and Future Work

455

References

455

Comparison of Cooperative Caching Strategies in Mobile Ad-Hoc Network (MANET)

457

Introduction

457

Cooperative Caching Strategies

458

Comparison of Cooperative Caching Strategies

462

Conclusion

463

References

464

Framework for Probabilistic Routing in Dense MANETs

465

Introduction

465

MANET Routing Protocols

466

Proposed Routing Scheme

467

Neighborhood Vector Construction

467

Route Discovery

468

Simulation Setup

469

Results and Analysis

470

Conclusions

473

References

473

Lightweight Management Framework (LMF) for a Heterogeneous Wireless Network for Landslide Detection

475

Introduction

475

Related Work

476

Service Architecture for Landslide Monitoring

477

Lightweight Management Framework (LMF)

478

Cluster Member

479

Cluster Heads

481

Sensor Network Gateways (SNG)

481

Data Management Center (DMC)

484

Deployment and Validation

485

Sink Node Congestion

486

Interference

486

Packet Loss in VSAT

487

Validation

487

Conclusion

488

References

489

Dasarathy Model Based Fusion Framework for Fire Detection Application in WSN

490

Introduction

490

Proposed Fusion Framework

491

Sensing Module

491

Prefusion Module

491

Fusion Module

493

Post Fusion Module

495

Simulation Results

496

Conclusion

497

References

498

Localization Based on Signal Strength Using Kalman Approach

499

Introduction

499

Proposed Localization Algorithm

500

Distance Estimation Phase

500

Co-ordinate Estimation Phase

502

Simulation Results

503

Conclusion

506

References

507

Second International Conference on Web and Semantic Technology (WeST 2010)

508

Reliable Data Replication Middleware for Next Generation Web Services

508

Introduction

508

Related Works

509

Proposed System

510

Interceptor Module

512

Publish/Subscribe-Replication Module

512

Multicast Module

513

Security Module

513

Performance Analysis

514

Conclusions

516

References

516

An Algorithmic Framework for Collaborative Interest Group Construction

518

Introduction

518

Determination of the Interest Similarity Relations

519

The Interest Vector

520

Similarity Scores between Researchers

520

Assessing Expertise: Why It Matters?

520

Algorithm for Construction of Collaborative Research Interest Group

521

Case Study

522

Interest Vector Calculations

523

Similarity Score Calculation

525

Conclusion

526

References

526

Survey on Federated Identity Management Systems

527

Introduction

527

Federated Identity Management Standards

527

Federated Identity Management and Web Services

527

Security Requirements

528

Analysis

529

What Is It?

529

How Is It Used?

529

Why Is It Necessary?

529

How Does It Work?

530

Who Is Using It?

530

What Are the Challenges?

530

Single Sign-On

530

Authentication

531

Authorization

531

Accounting

531

Advantages of AAA

532

Flexible User Authentication Methods

532

Flexible User Privileges

532

Wi-Fi Visitor Access

532

Multi-vendor WLAN Support

532

Fast and Easy to Deploy

532

Centralized Administration Center

532

Detailed Usage Reports

532

Scalable, Future-Proof Solution

533

RADIUS and AAA

533

Lightweight Directory Access Protocol

534

RADIUS V/S LDAP

534

References

535

Automating Reuse of Semantic Repositories in the Context of Semantic Web

536

Introduction

536

Ontologies – Semantic Repository

536

Nature of Semantic Repositories

537

Technique for Ontology Reuse

537

Ontology Discovery

537

Selection of Suitable Ontologies for Reuse

537

Integration of Ontologies

538

Evaluation of Ontology

538

Framework for Automatic Reuse of Semantic Repositories

538

Basic Framework

538

Semantic Kernel

539

Implementation Overview

539

Input Processing

540

Global Query Processing

540

Issues and Challenges

540

Conclusions

541

References

541

Discovering Models from Event-Based Data Basis on a Survey of Issues and Approaches

542

Introduction

542

Background

543

Classification of Model Discovery Problem

545

Protocol Model Discovery

546

Data Model Discovery

546

Behavioral Model Discovery

546

Different Approaches for Model Discovery

546

Graph Based Process Discovery Technique

546

Event Based Process Discovery Technique

547

Concurrent Behavior Discovery Technique

547

Protocol Discovery Tools

548

Comparison of Different Process Mining Tools

549

Conclusion

549

References

550

Prediction of Learning Disabilities in School Age Children Using Decision Tree

551

Introduction

551

Learning Disability

552

Decision Tree

553

Classification by Decision Tree

553

Methodology Used for Making the Decision Tree

555

Attribute List

555

Attribute Selection Method by Gain Ratio

555

Classification

556

Extraction of Rules from Tree

557

Result Analysis

558

Comparison of Results

559

Conclusion and Future Research

559

References

560

Co-occurrence Based Place Name Disambiguation and Its Application to Retrieval of Geological Text

561

Introduction

561

Related Work

562

Proposed System

562

Co-occurrence Based Name Disambiguation

563

Query Expansion Using Co-occurrence Graph

565

Algorithm: Co-occurrence Based Query Expansion

565

Results and Discussion

567

Conclusion

569

References

569

A Formal Method for Detecting Semantic Conflicts in Protocols between Services with Different Ontologies

571

Introduction

571

Protocol and Conflict

572

Formal Description of the Protocol

573

Example of Protocol

573

Notion of Mismatch between Two Ontologies

574

Graph Model of Ontology

575

Overview of the Method

575

Structural Algorithm to Check the Semantic Consistency

576

Working Example

576

Proof of Correctness

578

Related Works

579

Conclusion

580

References

580

Test Suite Diminuition Using GRE Heuristic with Selective Redundancy Approach

581

Introduction

581

Problem Statement

582

Related Work

582

Proposed System

582

Methodology and Solution

583

Greedy, Selectively Redundant and Essential Algorithm

584

Performance Analysis

587

Representative Test Size

587

Fault Detection Capability

587

Conclusion and Future Work

588

References

589

First International Workshop on Ad Hoc, Sensor and Ubiquitous Computing (ASUC 2010)

590

Mobility Monitoring by Using RSSI in Wireless Sensor Networks

590

Introduction

590

Related Work

591

RSSI: Received Signal Strength Indicator

591

Experimentation

592

Application 1

592

Application 2

594

Conclusion

597

References

597

Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering

599

Introduction

599

NGN-IMS Architecture

600

Related Work

602

To Retrieve Multiple Fees at One Platform

602

Easy Integration with Third Party Feeds and User Personalization

603

Value Added Services with Web Aggregators

603

End Users Benefits

603

Operator Advantages

604

Contributions and Functional Description

604

Architectural Descriptions

605

Implementation Issues

606

Conclusion

608

References

608

An Adaptive Framework for Wireless Sensor Network Application Development

610

Introduction

610

Related Work

611

Proposed System Architecture of AFWA

612

Functional Design Decomposition of AFWA

613

GUI

614

Mote Module and System Components Repository

615

XML Interfaces and Files

615

Build Module

616

Programmer

616

Demonstrative Use of AFWA for Network Communication

616

Conclusions and Future Work

617

References

618

A Comparison of the Efficiencies of Different Wireless Sensor Network Algorithms with Respect to Time

620

Introduction

620

Analysis of Different WSN Routing Algorithms

621

Flooding

621

Gossiping Algorithm

623

Clustering Algorithm

624

Directed Diffusion

625

Sensor Protocols for Information via Negotiation (SPIN)

628

Results and Discussion

632

Limitation of Mathematical Analysis

634

Conclusion

635

References

635

Internal Map of the Nanostack 6LoWPAN Stack

637

Introduction

637

Stack Architecture

638

Main Data Structure Used in the Stack

638

Dispatcher of Packets and Stack Architecture

639

MACLayer

643

Packets in BUFFER UP Direction

643

Packets in BUFFER DOWN Direction

643

cIPV6Layer

644

Exception Messages

644

Packets in BUFFER UP Direction

646

Packets in BUFFER DOWN Direction

647

Mesh Layer

647

Packets in BUFFER UP Direction

648

Packets in BUFFER DOWN Direction

648

Higher Layers

649

cUDP Layer

649

Application Layer

649

Discussion and Conclusions

649

References

651

Prolonging Network Lifetime Using Ant Colony Optimization Algorithm on LEACH Protocol for Wireless Sensor Networks

652

Introduction

652

Data Transmission

652

Proposed ACO Approach for LEACH

654

Algorithm

656

Related Work

656

Simulation Results

657

Conclusion

658

References

658

Energy Efficient Mobile Wireless Sensor Network Routing Protocol

660

Introduction

660

Related Work

661

Energy Efficient Mobile Wireless Sensor Network Routing Protocol

662

Calculation of Surplus Energy

662

Formation of Fusion Node

663

Data Announcement

663

Data Forwarding

664

Pseudo Code to Implement IntEr Precinct Routing in E$^2$MWSNRP

666

Simulation Environment and Evaluation Methodology

666

Conclusion

667

References

668

Dynamic Service Discovery as an Optimization Problem in Wireless Sensor Networks

669

Introduction

669

The Rationale for Neighborhood and Service Discovery

671

Proximal Neighborhood Discovery Algorithm

672

Optimal Service Provider Discovery Algorithm

673

OSD Algorithm Based on Particle Swarm Optimization

673

Simulation

677

Implementation

677

Simulation Results

678

Conclusion and Future Work

679

References

680

A New Approach for Workflow Tasks Scheduling in Distributed Heterogeneous Environment

681

Introduction

681

Related Work

682

Scheduling System Model

683

LCPR Algorithm

684

Leveling Phase

684

Cost Assignment Phase

684

Prioritization Phase

685

Resource Allocation Phase

686

Implementation Environment

686

Performance Analysis and Results

687

Conclusion and Future Work

688

References

688

A Range Based Localization Algorithm Using Autonomous Speed Mobile Sink (MOBISPEED) in Distributed Wireless Sensor Networks

690

Introduction

690

Related Work

691

Objectives and Requirements

692

Proposed Scheme

692

Location Estimation Algorithm

695

Assumptions and System Environments

695

Location Calculation

695

Beacon Points and Information Base in Mobile Sink

696

Performance Evaluation

696

Conclusion

698

References

698

First International Workshop on VLSI (VLSI 2010)

700

Development of Controllability Observability Aided Combinational ATPG with Fault Reduction

700

Introduction

700

Reduced Fault Set

701

Controllability Observability

703

Controllability Observability Aided ATPG for Reduced Fault Set

706

Results

708

Conclusion

709

References

709

Implementation of ADPLL with 0.6µm CMOS Process for SOC Applications

711

Introduction

711

Architecture Overview

712

Circuit Design

713

Phase/Frequency Detector

713

Digitally Controlled Oscillator

715

Experimental Results

717

Conclusions

718

References

719

Fault Diagnosis of Analog Circuits Utilizing Reconfigurable Computing System

720

Introduction

720

Fault Diagnosis of Analog Circuits

721

Reconfigurable Computing System

722

Field Programmable Gate Arrays

722

Approach

724

System Modules

725

Analog Circuit Simulation

725

Fault Dictionary Storage

726

Reconfiguration Using FPGAs

727

FPGA Implementation

727

Conclusion

728

References

728

A Low Voltage High Performance OTA in 0.18 Micron with High Linearity

730

Introduction

730

Review on Bulk-Driven MOS

731

Proposed OTA

732

The Amplifier Core

732

High-Swing Super-Wilson Current Mirror

733

Proposed OTA

735

Simulation Results

736

Conclusion

738

References

738

Author Index

740