The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2008 4th International Conference on Information and Automation for Sustainability. Sustainable Development through Effective Man-machine Co-existence (ICIAFS)
This paper investigates the application of centralized multi-sensor data fusion (CMSDF) technique to enhance the process fault detection. Adaptive Unscented Kalman Filter (AUKF) is used to estimate the process faults of the simulated continuous stirred tank reactor (CSTR) benchmark. Currently there exist two commonly used centralized multi-sensor data fusion methods for Kalman filter including centralized...
This paper investigates the application of data fusion technique to enhance the sensor fault detection and diagnosis. The extended Kalman filter (EKF) is used to fuse the process measurement sensor data. The usual approach in the classical EKF implementation, however, is based on the constant diagonal matrices for the process and measurement covariance. This inflexible constant covariance set-up which...
One of the most important challenges in mobile ad hoc networks is to use an efficient and dynamic routing protocol, as the nodes can move randomly, which requires the routing protocol to respond quickly to the network topology change. In this paper, a new hybrid routing protocol, based on a reactive AODV routing, is introduced. It follows the proactive approach for some special nodes in some interval...
Ad hoc networks are collection of mobile nodes which communicate using wireless media without any fixed infrastructure. Each mobile host acts both as a network router and an end point as packets are forwarded over multiple hops. Node mobility being the distinguishing feature of the mobile ad hoc network, makes routing an important challenge. Hence, Quality of Service (QoS) is not easily achieved in...
Clustering techniques can increase utilization of energy and scalability for wireless sensor networks (WSNs). This paper proposes an novel overall energy-balanced routing protocol (OEBR). In order to solve the problem of unbalanced energy consumption in the clustering techniques, selecting part nodes with more residual energy as tentative cluster heads, via compute similitude (distance) form a tentative...
Bluetooth is a high end wireless technology designed for short range communications with high means of integrity. The application of Bluetooth technology for remote monitoring and control is an evolving concept in automation. However, in these applications, the controller which is controlled via Bluetooth technology or the sensor which transmits the sensed values via Bluetooth technology is application-specific...
This paper presents a case study of the application of security metrics to a computer network. A detailed survey is conducted on existing security metric schemes. The Mean Time to Compromise (MTTC) metric and VEA-bility metric are selected for this study. The input data for both metrics are obtained from a network security tool. The results are used to determine the security level of the network using...
Bluetooth is a widely available technology in today's mobile phones. It enables devices to communicate wirelessly without being in the line of site of other devices. Regrettably, similar to the majority of the technologies that exists today, Bluetooth has its own shortcoming, it is that it's limited by range and applicable only between two Bluetooth enabled mobile phones at a time. Based on the current...
We propose a Zigbee technology based wireless vehicle identification and driver authentication system consisting of a central database of authorized vehicles, Zigbee RF Vehicle tags, RF tag Reader and RF tag Writer. Zigbee is based on IEEE 802.15.4 standard for Wireless Personal Area Networks (WPANs) that is being used in many commercial and research applications today where it has become an attractive...
The self-organizational ability of ad-hoc Wireless Sensor Networks (WSNs) have led them to be the most popular choice in ubiquitous computing. Clustering sensor nodes and organizing them hierarchically have proven to be an effective method to provide better data aggregation and scalability for the sensor network while conserving limited energy. In this paper we provide a comprehensive analysis of...
Integration of communication networks has been accelerated and is recognized as an important evolution plan of the existing networks such as WLAN (wireless local area network) and WiBro (wireless broadband Internet) networks. For the network integration, vertical handoff plays an important role to provide seamless connectivity between different networks. Mobile node (MN) performs the vertical handoff...
IEEE 802.11 WLAN (wireless local area network) provides high data rate up to 55 Mbps, but WLAN lacks supporting latency sensitive applications, e.g., VoIP (voice over IP), for mobile stations (STAs) to perform handoff between service ranges of multiple access points (APs). In order to provide seamless connectivity, the STAs trigger MAC (medium access control) layer handoff to the optimal AP but they...
The database correlation method (DCM) is a network based positioning technology which has shown superior in terms of accuracy. DCM is based on a pre-measured database of a location dependent variable such as received signal strength (RSS). Even though the technique has good potential, the practical difficulty in forming the database (fingerprints) using field measurements has become the major challenge...
Wireless sensor networks are an emerging area of interest among embedded and wireless research groups around the globe. It is envisioned that these low power computers will become the enabling technology in pervasive computing and bring about the next paradigm shift in computing. We present a new type of MAC protocol that is applicable to a special type of mobile wireless sensor network. In this network,...
Estimation of the location of a Mobile Station accurately is a key requirement to effectively provide a wide range of Location Based Services over mobile networks. Hence developing cellular positioning techniques has been a key research problem, with numerous localization solutions been proposed. These include technologies such as Cell ID, angle and time of arrival methods, statistical methods and...
In this paper EOG signal processing and developing a low cost signal interface for wheelchair with high accuracy and reliability for severely disabled people is presented. Here the signal processing is done on a microcontroller which reduces the cost drastically rather than using a computer. Eye movement is detected by processing EOG signal, and associates the eye movement to motion commands of the...
ERP system selection is one of the most important steps in an ERP implementation program and is critical to the system success. Due to inherent complexity of ERP systems, diversity of available alternatives in the market and limitation in resources selecting an appropriate ERP project is a risky, difficult and time-consuming task for the organizations. Although ERP system selection has been investigated...
There are several centralized approaches to discover automobile congestion. Centralized approaches have significant problems. Decentralized approaches like vehicular ad hoc networks (VANET) play a major role in discovering congestion and disseminating congestion information. No of vehicles that have got stuck in congestion is a valuable parameter for drivers to anticipate the state of the congestion...
Expression based non verbal communication accounts for a significant amount of the information exchange in human communication. In order to recreate facial expressions artificially for conveying an exact message it is necessary to make them as natural as possible since human beings posses a remarkable ability to recognize the emotion from an expression. In this paper we try to analyze facial expressions...
Testing of wireless sensor network protocols can be tedious for large networks when mobility is added. Mainly because these networks involve a large number of nodes scattered in an ad-hoc configuration. Although there are several publicly available static sensor network testbeds, testbeds where mobility is facilitated are very rare. One of the main objectives of this work is to provide a general hardware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.