Suchen und Finden
Mehr zum Inhalt
Recent Trends in Networks and Communications - International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, 2010. Proceedings
Preface
5
Organization
7
Table of Contents
12
The Second International Conference on Networks and Communications (NeCoM 2010)
19
Improving TCP Performance over Wireless Networks Using Cross Layer
19
Introduction
19
Related WorK
20
TCP New Reno and CLAMP
20
The Proposed Protocol (L$^2$ CLAMP- TCP)
20
L$^2$CLAMP Architecture
20
Algorithm
22
Performance Evaluation
23
Analysis by Varying Queue Delay
23
Throughput Analysis by Varying Packet Size
25
Analysis by Varying Simulation Time
26
Conclusions and Future Work
27
References
28
Improving Tracking Performance of FxLMS Algorithm Based Active Noise Control Systems
29
Introduction
29
Secondary Path Effects
30
FxLMS Algorithm
32
Wavelet Thresholding
32
Hard Thresholding Algorithm
33
Soft Thresholding Algorithm
33
Proposed Method
33
Simulation Results
36
Conclusions
37
References
37
Source and System Features for Text Independent Speaker Recognition Using GMM Speaker Models
39
Introduction
40
Feature Based on Cepstrum
40
PLP, MF-PLP and Pitch Extraction
40
Development of GMM Training Models
41
Speaker Identification Based on Proposed Features
42
Results and Discussion
43
Statistical Analysis on Features
46
Conclusions
47
References
47
Optimization of ASIC Design Cycle Time
49
Introduction
49
Methods of Optimization
50
Hardware- Based Method
50
Re-usability Method
50
Abstraction-Based Method
51
Assertion-Based Method
51
Co-verification-Based Method
52
Modeling or Model-Based Design
53
Why Modeling or Model-Based Design?
53
Case-Study
54
Implementation and Results
55
Traditional Verification Environment Using System Verilog
55
Transaction-Level Modeling Using VMM-1.2
55
Modeling Using System Verilog and Matlab
56
Conclusion
57
References
57
Optimal Solution for RFID Load Balancing
59
Introduction
59
Proposal
61
Agent Based Approach for RFID Middleware
62
Algorithm
62
Algorithm for Allocation of Tags
62
Algorithm for Turning off Redundant Readers
64
Wake-Up Criteria
65
Evaluation and Results
65
Conclusion
67
References
67
Fault Management in Grid Using Multi-agents
68
Introduction
68
Related Work
69
Architecture and Design
70
Head Agent
70
Back-Up Agent
71
Member Agent
71
Proxy or Member Representative Agent
71
Timer1 Agent
71
Timer2 Agent
72
Timer3 Agent
72
Ping Agent
72
Agent Repository
72
Implementation
72
Results and Discussions
73
Conclusion
75
Future Works
75
References
76
Minimizing Response Time in an Autonomic Computing System Using Proportional Control
78
Introduction
78
System Background
80
Modeling and System Identification
80
Controller Design
81
Implementation
81
Results
83
Conclusions
83
References
84
Elucidation of Upcoming Traffic Problems in Cloud Computing
86
Introduction
86
The Network Based Measurement
87
Current State of Cloud Computing Services
88
Networking Vendors Are Forced to Change Their Equipments: The Efforts Going On …..
89
Existing Solutions and Associated Problems
90
VPN (Virtual Private Network)
90
Use of Geographical Distribution Services
91
Differential Services(DS), QoS Protocols(MPLS, RSVP), Sampling Packets and High Speed Edge Routers –– A Proposed Solution to Traffic Problems
91
Use of Differential Services
92
Use of Qos Protocols
92
Use of High Speed Edge Routers
94
Sampling Cloud Data
95
Conclusion
95
References
96
Scenario Based Analysis of Localization of Sensor Nodes Using HMM
98
Introduction
98
Related Work
99
Contributed Work
99
Hidden Markov Model
99
Random Walk Mobility
101
Random Waypoint Mobility
101
Reference Point Group Mobility
101
Semi-markov Smooth Mobility
102
Performance Metrics
102
Performance Evaluation
102
Conclusions
107
References
107
Network Security and Networking Protocols
108
Introduction
108
Introduction to Networking
109
Network Security, Modern Network Security Threats
109
Risk Management – A Game of Security
109
Securing Networking Devices
110
Authentication, Authorization and Accounting
110
Implementing Firewall Technologies
111
Implementing Intrusion Prevention System
111
Securing Local Area Networks
111
Implementing Virtual Area Networks
111
Network Protocols
112
Definition
112
Internet Protocols
112
Routing Protocols
113
How Network Protocols Are Implemented
113
OSI Layers and Their Protocols
113
Conclusions
114
References
115
A Dynamic Grid Based Route-Driven ECDH Scheme for Heterogeneous Sensor Networks
116
Introduction
116
The ECDH Based Key Management Scheme
117
Dynamic Grid Based Coordinate Route Driven Scheme
118
Performance Metrics
120
Energy Comparison of Uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes
120
Energy Comparison of Non-uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes
120
Throughput Comparison Uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes
122
Throughput Comparison for Non-uniform Grid-Based Coordinate Route Driven Scheme for Dynamic Sensor Nodes
122
Network Life Time for Different Routing Techniques
122
Conclusion
123
References
123
Novel Resource Allocation Strategy Using Network Metrics in GRID
125
Introduction
125
Need for Grid Monitoring
125
Network Monitoring
126
Resource Monitoring
127
Resource Monitoring vs Network Monitoring
128
Research Issues
129
References
130
Energy Efficient Routing Protocol for Wireless Sensor and Actor Networks
132
Introduction
132
Realted Work
133
Static Actors in WSAN Area
133
Mobile Actors in WSAN Area
134
System Model and Assumptions
134
Voronoi Diagram
135
The Procedure
135
Initialization Phase
136
Event Detection and Reporting Phase
136
Actor Coordination and Reaction
138
Simulation and Results
138
Performance Metrics
138
Simulation Environment
138
Results and Analysis
139
Conclusion
140
References
140
A Novel Visual Cryptographic Technique through Grey Level Inversion (VCTGLI)
142
Introduction
142
(n, n) Visual Cryptography
142
(k, n) Visual Cryptography
143
Related Works
143
The Technique
145
Proof of Decoding
146
Illustrative Example
147
Performance Analysis
148
Conclusion
150
References
150
A Frequency Spectral Feature Modeling for Hidden Markov Model Based Automated Speech Recognition
152
Introduction
152
Hidden Markov Modeling
153
Mel Spectrum Approach
155
Spectral Decomposition Approach
157
Mapping Approach
160
Simulation Observation
160
Conclusion
161
References
161
A Novel Trust Management Scheme Using Fuzzy Logic for a Pervasive Environment
162
Introduction
162
Related Works
163
Proposed Work
163
Global Data Store
163
Local Data Store
164
Credential Matching
164
Trust Negotiation
164
Trust Computation
165
Updating Trust Values
166
Security Issues
166
Malicious Nodes
166
Selfish Nodes
167
Group of Nodes
167
Hacking at the Network and the Database Layer
168
Performance Evaluation
168
Conclusion
169
References
170
Reducing the Size of the Test Suite by Genetic Algorithm and Concept Analysis
171
Introduction
171
Problem Statement
172
Related Work
172
Proposed System
172
Genetic Algorithm
173
An Overview of Genetic Algorithms
173
Representation
173
Genetic Algorithms Operators
174
Genetic Algorithm for Test Suite Reduction
174
Genetic Algorithm for Lattice
175
Frame Work for Test Suite Minimization
175
ConceptualGA
176
Performance Analysis
176
Conclusion and Future Work
178
References
179
AODV-DS with Dominant Pruning in Mobile Ad Hoc Networks
180
Introduction
180
Dominating Sets in AODV
182
AODV-DS
183
Simulation Results
183
Conclusion
187
References
187
DoS Attack Inference Using Traffic Wave Analysis
189
Introduction
189
Related Work
190
Need for Wavelets
190
Proposed Method
191
Continuous Wavelet Transform
191
Scaling and Translation
192
Morlet Wavelet
192
Spline Wavelet
193
Daubechies Wavelet
193
Implementation and Results
194
Energy Distribution
194
Performance Comparison
195
Conclusion and Future Work
196
References
197
Designing 3rd Generation Long-Haul Optical Backbone Networks through a Cost-Conscious Regeneration-Aware RWA Scheme
198
Introduction
198
System Model
199
Proposed Approach
200
Proposed Algorithm
200
Routing
201
Wavelength Assignment by Optimal Allocation of Regenerators
202
Final Positioning of Regenerators
203
Time-Complexity Analysis
204
Simulation Results
204
Conclusions
207
References
207
An Automated and Full-Proof Attendance Marking Scheme (TATTEND) Using Three Integrated Technologies
208
Introduction
208
Related Works
210
Proposed System
212
Flowcharts
212
Simulations
215
Significance
215
Constraints
216
Applications
216
Conclusions and Future Work
216
References
216
Agent Based Adaptive Multi-constrained Multicast Routing with QoS Guarantees in MANETs
218
Introduction
218
Related Works
219
Proposed Work
220
Network Environment
221
QoS Aware Multi-constrained Routing Model
222
Route Discovery Process
223
Adaptive Multi Path Routing Mechanism
224
Broken Link Maintenance
225
Multicast Routing Scheme Using Agents
226
Simulation
227
Simulation Model
227
Simulation Procedure
227
Analysis of Results
228
Conclusions
229
References
230
FPGA Implementation of High Speed Pulse Shaping Filter for SDR Applications
232
Introduction
232
Pulse Shaping Filters
233
Raised Cosine Filter
234
Proposed RRC Design and Simulation
235
Matlab Code
235
Hardware Implementation Results and Discussions
238
Conclusion
240
References
240
Feature Selection and Classification of Intrusions Using Genetic Algorithm and Neural Networks
241
Introduction
241
Existing Methods
242
Dataset Description
243
System Design
244
Feature Selection Using Genetic Algorithm
244
Data Pre-processing
246
Neural Network Classification
247
Results
248
Using Neural Network
248
Using Genetic Algorithm with Neural Networks
249
Conclusion
250
References
251
An Algorithm for Designing Controllers
253
Introduction
253
Control System Design Problem
254
Guidelines for Designing a Stable, Useful System
255
Some Heuristics for Designing the Closed-Loop Transfer Function
255
Design Problem
256
Algorithm for Computing Controllers for SISO System
256
Conclusions
260
References
260
Decision Support with RFID for Health Care
261
Introduction
261
The Scenario
262
Adaptive Knowledge-Based System Framework
262
Modified Adaptive Knowledge-Based Framework for Tracking Ancillaries
264
Discussion
266
References
267
Second International Conference on Wireless and Mobile Networks (WiMoN 2010)
268
An Algorithm to Determine Multicast Meshes with Maximum Lifetime for Mobile Ad Hoc Networks
268
Introduction
268
Algorithm to Determine Stable-Mobile-Mesh
269
Description of Algorithm $OptMeshTrans$
270
Proof of Correctness of Algorithm $OptMeshTrans$
272
Simulations
273
Average Mesh Lifetime
273
Average Number of Edges Per Mesh
274
Average Hop Count Per Source-Receiver Path
275
Conclusions and Future Work
276
References
277
Distributed Weight Based Clustering with Efficient Channel Access to Improve Quality of Service in Mobile Ad-Hoc Networks (DWCA)
278
Introduction
278
Clustering in MANETs
279
Related Work
280
Highest-Degree Heuristic
280
Lowest-ID Heuristic
280
Node-Weight Heuristic
280
Limitations of Existing Algorithm
280
Our Algorithm
281
Modifications over Existing Algorithms
281
The Design Approach
281
Description of Algorithm
282
Implementation and Performance Evaluation
284
Transmitting a Hello Packet to the Nodes
284
Conclusion
286
References
286
WACA: A New Weighted Adaptive Clustering Algorithm for MANET
288
Introduction
288
Related Works
289
Lowest-ID Algorithm
289
Highest-Connectivity Clustering Algorithm
290
Weighted Clustering Algorithm (WCA)
291
Enhanced Weighted Clustering Algorithm (EWCA)
291
Weighted Adaptive Clustering Algorithm (WACA)
293
Assumptions
293
Data Dictionary
293
Weight Function Calculation for the Proposed Algorithm
294
The Logic Behind
295
Simulation Experiment and Results
298
Performance Analysis
300
Conclusion
300
References
301
A Topology and Context Aware Query Distribution System in Middleware for Wireless Sensor Networks
302
Introduction
302
Basic Concepts
303
The Publish/Subscribe Paradigm
303
Distributed Query Processing in WSN
303
Context Awareness
304
The Proposed Architecture
304
Message Processor
305
A Simple Example
306
Building the Topography Database
306
Query Splitting
306
Query Distribution
307
Adaptive Query Propagation
309
Evaluation
310
Evaluation Setup
310
Results
310
Related Work
311
Conclusions and Future Work
312
References
312
On-Demand Table-Driven Topo-Aware Routing Protocol for Wireless Mesh Networks
314
Introduction
314
Cluster Formation
315
Cluster Formation at Mesh Router Level
315
Cluster Formation at MC Level
315
Performance Metrics for Routing Protocols
317
ETX (Expected Transmission Count)
317
ETT (Expected Transmission Time)
317
Proposed Rouitng Protocol
318
Neighbor Discovery
318
Route Discovery
319
Routing Maintenance
320
Simulation and Results
321
Simulation Environment
321
Simulation Results
321
Conclusion
322
References
322
An Efficient Quality of Service Scheduling Strategy for IEEE 802.16 Broadband Wireless Access Systems
324
Introduction
324
QoS Features of IEEE 802.16
327
Proposed Scheduling Algorithm
327
Simulation Model and Result Analysis
330
Simulation Environment and Parameters
330
Simulation Result and Discussions
330
Conclusion
332
References
333
Comparison of VoIP Performance over WiMAX, WLAN and WiMAX-WLAN Integrated Network Using OPNET
334
Introduction
334
Voice over IP
336
Simulation Environment
338
Simulation Results and Discussion
340
Conclusion
342
References
343
A Generalized Trust Framework for Mobile Ad Hoc Networks
344
Introduction
344
Related Works
345
Proposed Model
346
Simulations and Performance Analysis
350
Test 1: Few Black Holes as Neighbors over DSR Protocol
350
Flooding Attacks over AODV
351
Conclusion
352
References
352
Adaptive Routing Techniques in Disruption Tolerant Networks
354
Introduction
354
DTN Architecture
355
Routing in a Delay Tolerant Network
355
Example: Connecting a Remote Village
355
DTN Routing Issues
356
Knowledge
357
Routing Strategies for DTN
359
Unicast Routing in DTN
359
Anycast Routing in DTN
359
Delay-Tolerant Broadcasting
360
Multicasting Routing in DTN
360
Multicast Routing Algorithms
360
Mobility Pattern Based Routing Scheme
362
Mobility Profile Based Routing
362
Redundancy-Based Routing
363
Spray and Wait Scheme
363
Inter-domain Routing Schemes
364
Conclusion
365
References
365
Adaptive Valid Period Based Concurrency Control without Locking in Mobile Environments
367
Introduction
367
Related Work
368
Mobile Database Environment
368
Performance Limitations of Existing Scheme
369
Proposed Concurrency Control Scheme
370
Proposed Scheme Features
370
Proposed Client (MH) Algorithm
371
Proposed Server (FH) Algorithm
372
PerformanceMetrics
373
Advantages of Proposed Scheme
374
Conclusion
375
References
375
An Associativity Based Energy Aware Clustering Technique for Mobile Ad Hoc Networks
377
Introduction
377
Related Work
378
Neighboring Time as the Metric of Node Stability
379
Adjacent Cluster Heads
379
Problem with Weight Based Clustering Technique
379
Associativity Based Energy Aware Clustering Algorithm
380
Stability
380
Remaining Energy
381
Degree
381
Algorithm Description
381
Simulation
383
Performance Metrics
384
Conclusion
385
References
386
Frequency Domain Equalisation for OFDMA System in Multipath Fading Channels
387
Introduction
387
OFDMA System
388
System Model
389
Multiple Rate Spreading
389
Transmitted Signal
390
Multipath Channel Model
391
Received Signal
391
Channel Estimation and Equalisation
392
Simulation
393
Conclusion
394
References
394
Energy Aware Data Sharing in Mobile Ad Hoc Networks
396
Introduction
396
Issues Related to Data Replication in MANET
397
Related Work
398
Proposed Model
398
Pro_Active Replication Algorithm
399
Re_active Replication Algorithm
400
Simulation Set Up and Results
402
Conclusion and Future Work
403
References
404
Security Enhancement in WEP Mobility
406
Introduction
406
Security in Ad Hoc Network
407
Wired Equivalent Privacy Protocol
408
Security Approach
409
Self Monitoring Approach
410
Authentication
412
Construction of Updated Certificate Repositories
412
Simulation Results
414
Conclusion
416
References
416
TCP – AP and LRED over Single and Multiple TCP Flows in Multihop Wireless Channel
418
Introduction
418
TCP’S Challenges in AD-HOC Networks
419
Channel Errors
420
Mobility
420
Asymmetry
420
Lossy Channels
420
Routing Failures
421
Problems and Related Studies
421
Improving TCP Performance
422
Distributed Link RED (LRED)
422
Adaptive Pacing
423
Simulation Model and Results
424
Simulation Scenario I
424
Simulation Scenario II
424
Simulation Scenario III
425
Analysis of Simulation Results
425
Conclusion
427
References
427
A Secure Prioritized Trust Based Multi-path Routing Protocol for Ad Hoc Networks
429
Introduction
429
Related Work
430
Secure Prioritized Trust Based Multipath Routing
431
Multiple Path Initialization
431
Priority Level Slicing Model
434
Route Utilization
435
Route Maintenance
435
Performance Evaluation
435
Simulation
436
Results
436
Conclusion
437
References
438
Reducing Handoff Latency in IEEE 802.11b with the Help of Neighbor Graph Using Carrier to Interference Ratio
439
Introduction
439
Handover Process
441
Scanning
441
Authentication
441
Re-association
441
Related Works
442
Proposed Method
443
Selective Channel Scanning
445
Pre Authentication
445
Experimental Results
446
Conclusion and Future Work
447
References
447
To Alleviate Congestion Using Hybrid Sink for Delay Sensitive Applications in Wireless Sensor Networks
449
Introduction
449
Related Work
450
Proposed Work
451
Wireless Sensor Network Model
451
Algorithm for Data Collection
451
Moving Scheme
452
Simulation Scenario and Metrics
453
Simulation Result and Analysis
453
Conclusions and Future Work
455
References
455
Comparison of Cooperative Caching Strategies in Mobile Ad-Hoc Network (MANET)
457
Introduction
457
Cooperative Caching Strategies
458
Comparison of Cooperative Caching Strategies
462
Conclusion
463
References
464
Framework for Probabilistic Routing in Dense MANETs
465
Introduction
465
MANET Routing Protocols
466
Proposed Routing Scheme
467
Neighborhood Vector Construction
467
Route Discovery
468
Simulation Setup
469
Results and Analysis
470
Conclusions
473
References
473
Lightweight Management Framework (LMF) for a Heterogeneous Wireless Network for Landslide Detection
475
Introduction
475
Related Work
476
Service Architecture for Landslide Monitoring
477
Lightweight Management Framework (LMF)
478
Cluster Member
479
Cluster Heads
481
Sensor Network Gateways (SNG)
481
Data Management Center (DMC)
484
Deployment and Validation
485
Sink Node Congestion
486
Interference
486
Packet Loss in VSAT
487
Validation
487
Conclusion
488
References
489
Dasarathy Model Based Fusion Framework for Fire Detection Application in WSN
490
Introduction
490
Proposed Fusion Framework
491
Sensing Module
491
Prefusion Module
491
Fusion Module
493
Post Fusion Module
495
Simulation Results
496
Conclusion
497
References
498
Localization Based on Signal Strength Using Kalman Approach
499
Introduction
499
Proposed Localization Algorithm
500
Distance Estimation Phase
500
Co-ordinate Estimation Phase
502
Simulation Results
503
Conclusion
506
References
507
Second International Conference on Web and Semantic Technology (WeST 2010)
508
Reliable Data Replication Middleware for Next Generation Web Services
508
Introduction
508
Related Works
509
Proposed System
510
Interceptor Module
512
Publish/Subscribe-Replication Module
512
Multicast Module
513
Security Module
513
Performance Analysis
514
Conclusions
516
References
516
An Algorithmic Framework for Collaborative Interest Group Construction
518
Introduction
518
Determination of the Interest Similarity Relations
519
The Interest Vector
520
Similarity Scores between Researchers
520
Assessing Expertise: Why It Matters?
520
Algorithm for Construction of Collaborative Research Interest Group
521
Case Study
522
Interest Vector Calculations
523
Similarity Score Calculation
525
Conclusion
526
References
526
Survey on Federated Identity Management Systems
527
Introduction
527
Federated Identity Management Standards
527
Federated Identity Management and Web Services
527
Security Requirements
528
Analysis
529
What Is It?
529
How Is It Used?
529
Why Is It Necessary?
529
How Does It Work?
530
Who Is Using It?
530
What Are the Challenges?
530
Single Sign-On
530
Authentication
531
Authorization
531
Accounting
531
Advantages of AAA
532
Flexible User Authentication Methods
532
Flexible User Privileges
532
Wi-Fi Visitor Access
532
Multi-vendor WLAN Support
532
Fast and Easy to Deploy
532
Centralized Administration Center
532
Detailed Usage Reports
532
Scalable, Future-Proof Solution
533
RADIUS and AAA
533
Lightweight Directory Access Protocol
534
RADIUS V/S LDAP
534
References
535
Automating Reuse of Semantic Repositories in the Context of Semantic Web
536
Introduction
536
Ontologies – Semantic Repository
536
Nature of Semantic Repositories
537
Technique for Ontology Reuse
537
Ontology Discovery
537
Selection of Suitable Ontologies for Reuse
537
Integration of Ontologies
538
Evaluation of Ontology
538
Framework for Automatic Reuse of Semantic Repositories
538
Basic Framework
538
Semantic Kernel
539
Implementation Overview
539
Input Processing
540
Global Query Processing
540
Issues and Challenges
540
Conclusions
541
References
541
Discovering Models from Event-Based Data Basis on a Survey of Issues and Approaches
542
Introduction
542
Background
543
Classification of Model Discovery Problem
545
Protocol Model Discovery
546
Data Model Discovery
546
Behavioral Model Discovery
546
Different Approaches for Model Discovery
546
Graph Based Process Discovery Technique
546
Event Based Process Discovery Technique
547
Concurrent Behavior Discovery Technique
547
Protocol Discovery Tools
548
Comparison of Different Process Mining Tools
549
Conclusion
549
References
550
Prediction of Learning Disabilities in School Age Children Using Decision Tree
551
Introduction
551
Learning Disability
552
Decision Tree
553
Classification by Decision Tree
553
Methodology Used for Making the Decision Tree
555
Attribute List
555
Attribute Selection Method by Gain Ratio
555
Classification
556
Extraction of Rules from Tree
557
Result Analysis
558
Comparison of Results
559
Conclusion and Future Research
559
References
560
Co-occurrence Based Place Name Disambiguation and Its Application to Retrieval of Geological Text
561
Introduction
561
Related Work
562
Proposed System
562
Co-occurrence Based Name Disambiguation
563
Query Expansion Using Co-occurrence Graph
565
Algorithm: Co-occurrence Based Query Expansion
565
Results and Discussion
567
Conclusion
569
References
569
A Formal Method for Detecting Semantic Conflicts in Protocols between Services with Different Ontologies
571
Introduction
571
Protocol and Conflict
572
Formal Description of the Protocol
573
Example of Protocol
573
Notion of Mismatch between Two Ontologies
574
Graph Model of Ontology
575
Overview of the Method
575
Structural Algorithm to Check the Semantic Consistency
576
Working Example
576
Proof of Correctness
578
Related Works
579
Conclusion
580
References
580
Test Suite Diminuition Using GRE Heuristic with Selective Redundancy Approach
581
Introduction
581
Problem Statement
582
Related Work
582
Proposed System
582
Methodology and Solution
583
Greedy, Selectively Redundant and Essential Algorithm
584
Performance Analysis
587
Representative Test Size
587
Fault Detection Capability
587
Conclusion and Future Work
588
References
589
First International Workshop on Ad Hoc, Sensor and Ubiquitous Computing (ASUC 2010)
590
Mobility Monitoring by Using RSSI in Wireless Sensor Networks
590
Introduction
590
Related Work
591
RSSI: Received Signal Strength Indicator
591
Experimentation
592
Application 1
592
Application 2
594
Conclusion
597
References
597
Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering
599
Introduction
599
NGN-IMS Architecture
600
Related Work
602
To Retrieve Multiple Fees at One Platform
602
Easy Integration with Third Party Feeds and User Personalization
603
Value Added Services with Web Aggregators
603
End Users Benefits
603
Operator Advantages
604
Contributions and Functional Description
604
Architectural Descriptions
605
Implementation Issues
606
Conclusion
608
References
608
An Adaptive Framework for Wireless Sensor Network Application Development
610
Introduction
610
Related Work
611
Proposed System Architecture of AFWA
612
Functional Design Decomposition of AFWA
613
GUI
614
Mote Module and System Components Repository
615
XML Interfaces and Files
615
Build Module
616
Programmer
616
Demonstrative Use of AFWA for Network Communication
616
Conclusions and Future Work
617
References
618
A Comparison of the Efficiencies of Different Wireless Sensor Network Algorithms with Respect to Time
620
Introduction
620
Analysis of Different WSN Routing Algorithms
621
Flooding
621
Gossiping Algorithm
623
Clustering Algorithm
624
Directed Diffusion
625
Sensor Protocols for Information via Negotiation (SPIN)
628
Results and Discussion
632
Limitation of Mathematical Analysis
634
Conclusion
635
References
635
Internal Map of the Nanostack 6LoWPAN Stack
637
Introduction
637
Stack Architecture
638
Main Data Structure Used in the Stack
638
Dispatcher of Packets and Stack Architecture
639
MACLayer
643
Packets in BUFFER UP Direction
643
Packets in BUFFER DOWN Direction
643
cIPV6Layer
644
Exception Messages
644
Packets in BUFFER UP Direction
646
Packets in BUFFER DOWN Direction
647
Mesh Layer
647
Packets in BUFFER UP Direction
648
Packets in BUFFER DOWN Direction
648
Higher Layers
649
cUDP Layer
649
Application Layer
649
Discussion and Conclusions
649
References
651
Prolonging Network Lifetime Using Ant Colony Optimization Algorithm on LEACH Protocol for Wireless Sensor Networks
652
Introduction
652
Data Transmission
652
Proposed ACO Approach for LEACH
654
Algorithm
656
Related Work
656
Simulation Results
657
Conclusion
658
References
658
Energy Efficient Mobile Wireless Sensor Network Routing Protocol
660
Introduction
660
Related Work
661
Energy Efficient Mobile Wireless Sensor Network Routing Protocol
662
Calculation of Surplus Energy
662
Formation of Fusion Node
663
Data Announcement
663
Data Forwarding
664
Pseudo Code to Implement IntEr Precinct Routing in E$^2$MWSNRP
666
Simulation Environment and Evaluation Methodology
666
Conclusion
667
References
668
Dynamic Service Discovery as an Optimization Problem in Wireless Sensor Networks
669
Introduction
669
The Rationale for Neighborhood and Service Discovery
671
Proximal Neighborhood Discovery Algorithm
672
Optimal Service Provider Discovery Algorithm
673
OSD Algorithm Based on Particle Swarm Optimization
673
Simulation
677
Implementation
677
Simulation Results
678
Conclusion and Future Work
679
References
680
A New Approach for Workflow Tasks Scheduling in Distributed Heterogeneous Environment
681
Introduction
681
Related Work
682
Scheduling System Model
683
LCPR Algorithm
684
Leveling Phase
684
Cost Assignment Phase
684
Prioritization Phase
685
Resource Allocation Phase
686
Implementation Environment
686
Performance Analysis and Results
687
Conclusion and Future Work
688
References
688
A Range Based Localization Algorithm Using Autonomous Speed Mobile Sink (MOBISPEED) in Distributed Wireless Sensor Networks
690
Introduction
690
Related Work
691
Objectives and Requirements
692
Proposed Scheme
692
Location Estimation Algorithm
695
Assumptions and System Environments
695
Location Calculation
695
Beacon Points and Information Base in Mobile Sink
696
Performance Evaluation
696
Conclusion
698
References
698
First International Workshop on VLSI (VLSI 2010)
700
Development of Controllability Observability Aided Combinational ATPG with Fault Reduction
700
Introduction
700
Reduced Fault Set
701
Controllability Observability
703
Controllability Observability Aided ATPG for Reduced Fault Set
706
Results
708
Conclusion
709
References
709
Implementation of ADPLL with 0.6µm CMOS Process for SOC Applications
711
Introduction
711
Architecture Overview
712
Circuit Design
713
Phase/Frequency Detector
713
Digitally Controlled Oscillator
715
Experimental Results
717
Conclusions
718
References
719
Fault Diagnosis of Analog Circuits Utilizing Reconfigurable Computing System
720
Introduction
720
Fault Diagnosis of Analog Circuits
721
Reconfigurable Computing System
722
Field Programmable Gate Arrays
722
Approach
724
System Modules
725
Analog Circuit Simulation
725
Fault Dictionary Storage
726
Reconfiguration Using FPGAs
727
FPGA Implementation
727
Conclusion
728
References
728
A Low Voltage High Performance OTA in 0.18 Micron with High Linearity
730
Introduction
730
Review on Bulk-Driven MOS
731
Proposed OTA
732
The Amplifier Core
732
High-Swing Super-Wilson Current Mirror
733
Proposed OTA
735
Simulation Results
736
Conclusion
738
References
738
Author Index
740
Alle Preise verstehen sich inklusive der gesetzlichen MwSt.