Wireless Sensor Networks (WSN) has several
limitations, which may not support information communication
because of energy constraints. Information sensed by the sensor
nodes in WSN is scalar, which can’t be used in some of the
applications involving video surveillance like traffic monitoring,
defense applications, seashore monitoring, etc. To overcome
these limitations, Wireless Multimedia Sensor Networks
(WMSN) which consists of video sensors can be used for such
applications. As WMSN supports sensing of videos, the amount
of data to be transmitted wirelessly in multihop communication
raises a challenge. To overcome this issue, this paper proposes an
agent based video fusion in Wireless Multimedia Sensor
Networks. The video sensors transmit sensed videos to the
respective cluster head node. Cluster head node exploits the
spatial and temporal redundancy using multi sensor video fusion
using wavelet transform. Fused video is in turn transmitted to
sink node using multi-hop communication. To evaluate the
performance of the proposed scheme, this work is simulated
using MATLAB.
Wireless Sensor networks are dense networks, which consist of small low cost
sensors having severely constrained computational and energy resources, which operate in
an adhoc environment. Sensor network combines the aspects of distributed sensing,
computing and communication. Despite the numerous applications of sensor networks in
various fields there are various issues which need to be explored and resolved such as
resource constraints, routing, coverage, security, information collection and gathering etc.
In this paper we aim to provide the detailed overview of the wireless sensor technologies and
issues related to them, such as advancement of sensor technology, architecture, applications,
issues and the work done in the field of routing, coverage and security.
This document discusses research challenges in real-time multimedia monitoring in large-scale wireless multimedia sensor networks. It describes how these networks enable new monitoring applications but face challenges due to limited computational and energy resources. The document outlines solutions needed at the MAC, network, and transport layers to efficiently deliver visual data while meeting requirements for steady data flows and delay-bounded delivery. It also discusses challenges in areas like multimedia coding, in-network processing, energy harvesting, and cross-layer optimization across the protocol stack.
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensorsidescitation
Recently due to progress in Complementary Metal
Oxide Semiconductor (CM OS) technology, Wireless
Multimedia Sensor Networks (WMSNs) become focus of
research in a broader range of applications. In this survey
paper different WMSNs applications, research & design
challenges are outlined. In addition to this, different available
commercial multimedia sensors are discussed in detail and
compared. Also other then commercial available multimedia
sensors, some experimental multimedia sensor prototypes are
discussed. In addition to this different experimental deployed
test beds for WMSNs are outlined. Also few Wireless Sensor
Networks (WSNs) simulators and emulators are reviewed.
Depending upon the requirement a few physical multimedia
sensors can be integrated or embedded within available
simulators to observe more accurate results or to visualize in
a better way.
This document summarizes sensor networks, including their definition, components, applications, characteristics, architectures, challenges, and security approaches. Sensor networks consist of spatially distributed nodes that monitor environmental conditions and pass data to a central location. The nodes have sensors, microcontrollers, memory, and radios. Applications include area monitoring, healthcare, and environmental monitoring. Challenges include limited energy, computation, and transmission range. PEGASIS is an approach that forms nodes into chains to more efficiently pass data to the base station and minimize energy use. Security is provided using secret key encryption algorithms.
This document surveys the state of research on wireless multimedia sensor networks (WMSNs). It discusses how low-cost hardware like cameras and microphones has enabled the development of networks that can retrieve multimedia content like video and audio streams. The document outlines several applications of WMSNs, from surveillance to healthcare to environmental monitoring. It also discusses challenges in supporting quality of service for multimedia delivery over resource-constrained wireless sensor networks. Open research issues are explored at different layers of the communication protocol stack as well as opportunities for cross-layer optimization and in-network processing of multimedia content.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
Wireless Sensor networks are dense networks, which consist of small low cost
sensors having severely constrained computational and energy resources, which operate in
an adhoc environment. Sensor network combines the aspects of distributed sensing,
computing and communication. Despite the numerous applications of sensor networks in
various fields there are various issues which need to be explored and resolved such as
resource constraints, routing, coverage, security, information collection and gathering etc.
In this paper we aim to provide the detailed overview of the wireless sensor technologies and
issues related to them, such as advancement of sensor technology, architecture, applications,
issues and the work done in the field of routing, coverage and security.
This document discusses research challenges in real-time multimedia monitoring in large-scale wireless multimedia sensor networks. It describes how these networks enable new monitoring applications but face challenges due to limited computational and energy resources. The document outlines solutions needed at the MAC, network, and transport layers to efficiently deliver visual data while meeting requirements for steady data flows and delay-bounded delivery. It also discusses challenges in areas like multimedia coding, in-network processing, energy harvesting, and cross-layer optimization across the protocol stack.
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensorsidescitation
Recently due to progress in Complementary Metal
Oxide Semiconductor (CM OS) technology, Wireless
Multimedia Sensor Networks (WMSNs) become focus of
research in a broader range of applications. In this survey
paper different WMSNs applications, research & design
challenges are outlined. In addition to this, different available
commercial multimedia sensors are discussed in detail and
compared. Also other then commercial available multimedia
sensors, some experimental multimedia sensor prototypes are
discussed. In addition to this different experimental deployed
test beds for WMSNs are outlined. Also few Wireless Sensor
Networks (WSNs) simulators and emulators are reviewed.
Depending upon the requirement a few physical multimedia
sensors can be integrated or embedded within available
simulators to observe more accurate results or to visualize in
a better way.
This document summarizes sensor networks, including their definition, components, applications, characteristics, architectures, challenges, and security approaches. Sensor networks consist of spatially distributed nodes that monitor environmental conditions and pass data to a central location. The nodes have sensors, microcontrollers, memory, and radios. Applications include area monitoring, healthcare, and environmental monitoring. Challenges include limited energy, computation, and transmission range. PEGASIS is an approach that forms nodes into chains to more efficiently pass data to the base station and minimize energy use. Security is provided using secret key encryption algorithms.
This document surveys the state of research on wireless multimedia sensor networks (WMSNs). It discusses how low-cost hardware like cameras and microphones has enabled the development of networks that can retrieve multimedia content like video and audio streams. The document outlines several applications of WMSNs, from surveillance to healthcare to environmental monitoring. It also discusses challenges in supporting quality of service for multimedia delivery over resource-constrained wireless sensor networks. Open research issues are explored at different layers of the communication protocol stack as well as opportunities for cross-layer optimization and in-network processing of multimedia content.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
With the advancements in wireless technology and digital electronics, some tiny devices have started to be used in numerous areas in daily life. These devices are capable of sensing, computation and communicating. They are generally composed of low power radios, several smart sensors and embedded CPUs (Central Processing Units). These devices are used to form wireless sensor network (WSN) which is necessary to provide sensing services and to monitor environmental conditions. In parallel to WSNs, the idea of internet of things (IoT) is developed where IoT can be defined as an interconnection between identifiable devices within the internet connection in sensing and monitoring processes. This paper presents detailed overview of WSNs. It also assesses the technology and characteristics of WSNs. Moreover, it provides a review of WSN applications and IoT applications.
This document summarizes a technical seminar report on wireless sensor networks submitted by two students, Kapil Dev Dwivedi and Shusma Sandey, to their professor Ravi Ranjan Mishra. The 5-page report includes an abstract, introduction to wireless sensor networks covering their technology, history and architecture, sensor technology, features of WSNs, applications of WSNs including environmental monitoring and health monitoring, standardization, and references.
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory SystemRatul Alahy
Incorporating an Intrusion Detection System(IDS) for a wireless sensor network (WSN) is one of the efficient moves to detect early intrusion to protect the integrity of the system. Machine learning Neural networks makes the intrusion detection task in WSN much easier by analyzing the data collected from sensor nodes(temperature, light, sound, and smoke). However, maintaining security and preventing intrusion in such approach remains a challenge. In this paper, we propose a Smart Intrusion Detection System (SIDS) which will be trained and tested using neural network approaches. The SIDS will be evaluated using parameters such as accuracy, timeliness, and trusted neighbor nodes, and the result is obtained for intrusion scenario using neural networks algorithms.
(1) The document proposes an energy efficient protocol for wireless sensor networks (WSNs) that employs replicated data sinks to achieve resiliency against data sink failures and efficient storage and retrieval of sensor data.
(2) It introduces a simple address assignment scheme that partitions the sensor field into cells, with each cell containing one data sink and sensors closest to that sink. This scheme is scalable and resilient against data sink and sensor node failures.
(3) The protocol uses five types of messages and a routing approach based on de Bruijn digraphs to minimize energy consumption during data transmission between sensors and sinks. It aims to maximize the lifetime of the sensor network.
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageIDES Editor
In this paper a new fuzzy based approach for
improving network coverage in wireless mobile sensor
networks is proposed. In the proposed approach firstly
each mobile sensor node determines its neighbors and its
distance from borders and obstacles. According to these
values, fuzzy inference engine calculates the priority of
node for movement. Then according to the priority, in
turn, nodes move away from each other to increase
coverage area in the target field. Simulation results show
that our fuzzy approach can reach higher degree of
coverage against other common approaches like FOA,
VEC and TRI algorithms.
This document provides an overview of wireless sensor networks (WSNs), including their technologies, applications, standards, design features, and evolutions. WSNs enable new applications through spatially distributed sensors that monitor physical conditions and wirelessly transmit data to a central location. They require a balance between communication and processing capabilities given constraints like low power and complexity. The IEEE 802.15.4 standard enables many WSN applications. Performance depends on network size and data type. Sensors are key network components that detect physical properties and convert them to signals. Common sensor types include thermal, electromagnetic, mechanical, and motion sensors. WSNs face unique challenges from ad hoc deployment and constrained node resources.
seminar report on wireless Sensor networkJawhar Ali
This document provides an overview of wireless sensor networks (WSNs) including their technologies, applications, architectures, and trends. It discusses how WSNs enable new applications through low-cost, low-power sensor nodes that can monitor environments. The document outlines several key applications of WSNs such as environmental monitoring, health monitoring, traffic control, and smart buildings. It also describes common WSN architectures including clustered and layered architectures.
This document summarizes a survey on security attacks in wireless sensor networks. It begins with an introduction to wireless sensor networks and their constraints, such as limited energy, memory, and processing power. It then discusses common security requirements for wireless sensor networks like availability, authentication, confidentiality, and integrity. Various types of attacks against wireless sensor networks are described, including denial of service attacks, physical attacks, and link layer attacks that can cause collisions. The challenges of providing security in wireless sensor networks given their constraints and vulnerabilities are also outlined.
This document is a project report submitted by two students, Mohammad Kafee Uddin and Aloukik Mishra, to the Department of Computer Science and Engineering at the Indian School of Mines in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering. The report surveys routing protocols for wireless sensor networks and provides a classification of different routing protocols according to their mode of functioning, participation style of nodes, and network structure.
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
In the modern world, billions of physical sensors are used for various dedications: Environment Monitoring, Healthcare, Education, Defense, Manufacturing, Smart Home, Agriculture Precision and others. Nonetheless, they are frequently utilized by their own applications and thereby snubbing the significant possibilities of sharing the resources in order to ensure the availability and performance of physical sensors. This paper assumes that the immense power of the Cloud can only be fully exploited if it is impeccably integrated into our physical lives. The principal merit of this work is a novel architecture where users can share several types of physical sensors easily and consequently many new services can be provided via a virtualized structure that allows allocation of sensor resources to different users and applications under flexible usage scenarios within which users can easily collect, access, process, visualize, archive, share and search large amounts of sensor data from different applications. Moreover, an implementation has been achieved using Arduino-Atmega328 as hardware platform and Eucalyptus/Open Stack with Orchestra-Juju for Private Sensor Cloud. Then this private Cloud has been connected to some famous public clouds such as Amazon EC2, ThingSpeak, SensorCloud and Pachube. The testing was successful at 80%. The recommendation for future work would be to improve the effectiveness of virtual sensors by applying optimization techniques and other methods.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Torsten Braun presented on developing and evaluating energy-efficient and adaptive protocols for wireless sensor networks. He discussed wireless sensor network applications like environmental and building monitoring. Key application requirements include energy efficiency, low delays, reliability, and adaptivity. He described designing, implementing, and evaluating WSN protocols through simulations and experiments on a wireless sensor network testbed called WISEBED, which is a pan-European federation of over 1000 sensor nodes across 9 testbeds. The testbed infrastructure includes sensor nodes, backbones to connect to a portal, and a portal that acts as a gateway between the internet and the wireless sensor network.
This document provides an introduction to wireless sensor networks. It discusses how wireless sensor networks have emerged from advances in computing, communication, and sensing technologies that have allowed the development of low-cost, low-power sensor nodes. It describes typical applications of wireless sensor networks and highlights some of the key enabling technologies, including hardware components, wireless networking protocols, collaborative signal processing techniques, and the evolution of sensor node designs over time.
RICOCHET is a new wireless mesh networking technology from Texecom that allows wireless security devices to relay signals to and from each other, extending the range and reliability of the system. Each RICOCHET enabled device can receive and repeat wireless transmissions, creating a self-healing network where if one connection is weakened, communications are automatically rerouted through other devices. The scalability and performance of RICOCHET wireless systems is greater than previous technologies.
This document discusses wireless sensor networks and middleware approaches for them. It describes wireless sensor networks as consisting of distributed autonomous sensor nodes that monitor physical environments cooperatively. It outlines common sensor node components and network architectures. It then defines middleware as a software layer that manages complexity and heterogeneity. Key middleware design principles for wireless sensor networks include supporting limited resources, scalability, and data aggregation. The document outlines several middleware approaches, including those based on global behavior, local behavior, virtual machines, databases, and modular programming.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Energy Consumption in chain based routing protocol in wireless sensor networkBADALKUMAR56
This document is a project report submitted for the degree of Bachelor of Technology in Computer Science and Engineering. It discusses measuring the power of a chain-based routing protocol called PEGASIS in wireless sensor networks. PEGASIS aims to increase network lifetime by forming chains among sensor nodes so that each node communicates only with a close neighbor, thereby reducing the amount of energy spent per round. The objectives are to decrease end-to-end delay, increase average energy consumption, and increase the number of alive nodes. The report presents the problem definition, objectives, proposed PEGASIS protocol, methodology using NS2 simulation, results showing improved performance, and conclusions.
This document discusses wireless micro-sensor network models and classifies them according to communication functions, data delivery models, and network dynamics. It describes four data delivery models for sensor networks: continuous, event-driven, observer-initiated, and hybrid. The continuous model involves sensors communicating data continuously at a pre-specified rate. This taxonomy framework can help network designers choose appropriate communication protocols for different sensor network applications. The classifications are meant to aid in defining communication infrastructure and selecting protocol architectures matched to specific application requirements.
This document summarizes a study on existing wireless sensor networks that can be used for structural health monitoring. It discusses three main wireless sensor network platforms: Sensor Andrew Architecture, a structural health monitoring system using smart sensors, and Snowfort, a new wireless sensor network platform designed for infrastructure monitoring. The document outlines the key components, advantages, and limitations of each wireless sensor network platform for structural health monitoring applications.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document provides an introduction and overview of wireless visual sensor networks (WVSNs) and the coverage problem in WVSNs. It begins with defining WVSNs as sensor networks equipped with camera sensors that can send visual data to enable applications in wildlife observation and security surveillance. It then covers the hardware components of WVSNs, applications of WVSNs, how WVSNs differ from traditional wireless sensor networks, sensing models in WVSNs, major design issues in WVSNs including coverage, and principles for enhancing coverage in WVSNs. It concludes by stating that coverage is a central design issue for visual monitoring applications using WVSNs.
Intrusion Detection in A Smart Forest-Fire Early Warning Sensory SystemRatul Alahy
Incorporating an Intrusion Detection System(IDS) for a wireless sensor network (WSN) is one of the efficient moves to detect early intrusion to protect the integrity of the system. Machine learning Neural networks makes the intrusion detection task in WSN much easier by analyzing the data collected from sensor nodes(temperature, light, sound, and smoke). However, maintaining security and preventing intrusion in such approach remains a challenge. In this paper, we propose a Smart Intrusion Detection System (SIDS) which will be trained and tested using neural network approaches. The SIDS will be evaluated using parameters such as accuracy, timeliness, and trusted neighbor nodes, and the result is obtained for intrusion scenario using neural networks algorithms.
(1) The document proposes an energy efficient protocol for wireless sensor networks (WSNs) that employs replicated data sinks to achieve resiliency against data sink failures and efficient storage and retrieval of sensor data.
(2) It introduces a simple address assignment scheme that partitions the sensor field into cells, with each cell containing one data sink and sensors closest to that sink. This scheme is scalable and resilient against data sink and sensor node failures.
(3) The protocol uses five types of messages and a routing approach based on de Bruijn digraphs to minimize energy consumption during data transmission between sensors and sinks. It aims to maximize the lifetime of the sensor network.
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageIDES Editor
In this paper a new fuzzy based approach for
improving network coverage in wireless mobile sensor
networks is proposed. In the proposed approach firstly
each mobile sensor node determines its neighbors and its
distance from borders and obstacles. According to these
values, fuzzy inference engine calculates the priority of
node for movement. Then according to the priority, in
turn, nodes move away from each other to increase
coverage area in the target field. Simulation results show
that our fuzzy approach can reach higher degree of
coverage against other common approaches like FOA,
VEC and TRI algorithms.
This document provides an overview of wireless sensor networks (WSNs), including their technologies, applications, standards, design features, and evolutions. WSNs enable new applications through spatially distributed sensors that monitor physical conditions and wirelessly transmit data to a central location. They require a balance between communication and processing capabilities given constraints like low power and complexity. The IEEE 802.15.4 standard enables many WSN applications. Performance depends on network size and data type. Sensors are key network components that detect physical properties and convert them to signals. Common sensor types include thermal, electromagnetic, mechanical, and motion sensors. WSNs face unique challenges from ad hoc deployment and constrained node resources.
seminar report on wireless Sensor networkJawhar Ali
This document provides an overview of wireless sensor networks (WSNs) including their technologies, applications, architectures, and trends. It discusses how WSNs enable new applications through low-cost, low-power sensor nodes that can monitor environments. The document outlines several key applications of WSNs such as environmental monitoring, health monitoring, traffic control, and smart buildings. It also describes common WSN architectures including clustered and layered architectures.
This document summarizes a survey on security attacks in wireless sensor networks. It begins with an introduction to wireless sensor networks and their constraints, such as limited energy, memory, and processing power. It then discusses common security requirements for wireless sensor networks like availability, authentication, confidentiality, and integrity. Various types of attacks against wireless sensor networks are described, including denial of service attacks, physical attacks, and link layer attacks that can cause collisions. The challenges of providing security in wireless sensor networks given their constraints and vulnerabilities are also outlined.
This document is a project report submitted by two students, Mohammad Kafee Uddin and Aloukik Mishra, to the Department of Computer Science and Engineering at the Indian School of Mines in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering. The report surveys routing protocols for wireless sensor networks and provides a classification of different routing protocols according to their mode of functioning, participation style of nodes, and network structure.
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
In the modern world, billions of physical sensors are used for various dedications: Environment Monitoring, Healthcare, Education, Defense, Manufacturing, Smart Home, Agriculture Precision and others. Nonetheless, they are frequently utilized by their own applications and thereby snubbing the significant possibilities of sharing the resources in order to ensure the availability and performance of physical sensors. This paper assumes that the immense power of the Cloud can only be fully exploited if it is impeccably integrated into our physical lives. The principal merit of this work is a novel architecture where users can share several types of physical sensors easily and consequently many new services can be provided via a virtualized structure that allows allocation of sensor resources to different users and applications under flexible usage scenarios within which users can easily collect, access, process, visualize, archive, share and search large amounts of sensor data from different applications. Moreover, an implementation has been achieved using Arduino-Atmega328 as hardware platform and Eucalyptus/Open Stack with Orchestra-Juju for Private Sensor Cloud. Then this private Cloud has been connected to some famous public clouds such as Amazon EC2, ThingSpeak, SensorCloud and Pachube. The testing was successful at 80%. The recommendation for future work would be to improve the effectiveness of virtual sensors by applying optimization techniques and other methods.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Torsten Braun presented on developing and evaluating energy-efficient and adaptive protocols for wireless sensor networks. He discussed wireless sensor network applications like environmental and building monitoring. Key application requirements include energy efficiency, low delays, reliability, and adaptivity. He described designing, implementing, and evaluating WSN protocols through simulations and experiments on a wireless sensor network testbed called WISEBED, which is a pan-European federation of over 1000 sensor nodes across 9 testbeds. The testbed infrastructure includes sensor nodes, backbones to connect to a portal, and a portal that acts as a gateway between the internet and the wireless sensor network.
This document provides an introduction to wireless sensor networks. It discusses how wireless sensor networks have emerged from advances in computing, communication, and sensing technologies that have allowed the development of low-cost, low-power sensor nodes. It describes typical applications of wireless sensor networks and highlights some of the key enabling technologies, including hardware components, wireless networking protocols, collaborative signal processing techniques, and the evolution of sensor node designs over time.
RICOCHET is a new wireless mesh networking technology from Texecom that allows wireless security devices to relay signals to and from each other, extending the range and reliability of the system. Each RICOCHET enabled device can receive and repeat wireless transmissions, creating a self-healing network where if one connection is weakened, communications are automatically rerouted through other devices. The scalability and performance of RICOCHET wireless systems is greater than previous technologies.
This document discusses wireless sensor networks and middleware approaches for them. It describes wireless sensor networks as consisting of distributed autonomous sensor nodes that monitor physical environments cooperatively. It outlines common sensor node components and network architectures. It then defines middleware as a software layer that manages complexity and heterogeneity. Key middleware design principles for wireless sensor networks include supporting limited resources, scalability, and data aggregation. The document outlines several middleware approaches, including those based on global behavior, local behavior, virtual machines, databases, and modular programming.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
1. The document proposes a new distributed data discovery and dissemination protocol called DiDrip for wireless sensor networks (WSNs) that aims to improve security and performance over existing protocols.
2. Existing protocols primarily use a centralized approach where a single node distributes data, which is not suitable for multiple owners and users, and they do not focus on security.
3. DiDrip allows for a distributed approach where multiple owners can authorize different users simultaneously to access sensor data with different priorities, while improving security.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Energy Consumption in chain based routing protocol in wireless sensor networkBADALKUMAR56
This document is a project report submitted for the degree of Bachelor of Technology in Computer Science and Engineering. It discusses measuring the power of a chain-based routing protocol called PEGASIS in wireless sensor networks. PEGASIS aims to increase network lifetime by forming chains among sensor nodes so that each node communicates only with a close neighbor, thereby reducing the amount of energy spent per round. The objectives are to decrease end-to-end delay, increase average energy consumption, and increase the number of alive nodes. The report presents the problem definition, objectives, proposed PEGASIS protocol, methodology using NS2 simulation, results showing improved performance, and conclusions.
This document discusses wireless micro-sensor network models and classifies them according to communication functions, data delivery models, and network dynamics. It describes four data delivery models for sensor networks: continuous, event-driven, observer-initiated, and hybrid. The continuous model involves sensors communicating data continuously at a pre-specified rate. This taxonomy framework can help network designers choose appropriate communication protocols for different sensor network applications. The classifications are meant to aid in defining communication infrastructure and selecting protocol architectures matched to specific application requirements.
This document summarizes a study on existing wireless sensor networks that can be used for structural health monitoring. It discusses three main wireless sensor network platforms: Sensor Andrew Architecture, a structural health monitoring system using smart sensors, and Snowfort, a new wireless sensor network platform designed for infrastructure monitoring. The document outlines the key components, advantages, and limitations of each wireless sensor network platform for structural health monitoring applications.
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
A cellular network is an asymmetric radio network which is made up of fixed transceivers or
nodes, maintain the signal while the mobile transceiver which is using the network is in the
vicinity of the node. An ad-hoc network is a local area network (LAN) that is built
spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node in the
network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues in cellular, adhoc and sensor network. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas.
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document provides an introduction and overview of wireless visual sensor networks (WVSNs) and the coverage problem in WVSNs. It begins with defining WVSNs as sensor networks equipped with camera sensors that can send visual data to enable applications in wildlife observation and security surveillance. It then covers the hardware components of WVSNs, applications of WVSNs, how WVSNs differ from traditional wireless sensor networks, sensing models in WVSNs, major design issues in WVSNs including coverage, and principles for enhancing coverage in WVSNs. It concludes by stating that coverage is a central design issue for visual monitoring applications using WVSNs.
Video Streaming Compression for Wireless Multimedia Sensor NetworksIOSR Journals
This document discusses video streaming compression for wireless multimedia sensor networks. It proposes a cross-layer system that jointly controls the video encoding rate, transmission rate, and uses an adaptive parity scheme. At the application layer, video is compressed and divided into packets. These packets are encoded at the transport layer and forwarded through the network layer. An active buffer management scheme and adaptive parity check are used to maximize received video quality over lossy wireless links. Simulation results show the proposed techniques can achieve higher throughput by resequencing dropped packets. The goal is to design an efficient system for wireless transmission of compressed video that optimizes video quality.
Desing on wireless intelligent seneor network on cloud computing system for s...csandit
Sensors on (or attached to) mobile phones can enable attractive sensing applications in
different domains such as environmental monitoring, social networking, healthcare, etc. In this
paper we propose a cloud computing system dedicated on smart home applications. We design
the proposed wireless vision sensor network (WVSN) with its algorithm and hardware
implementation. In WVSN, The partial-vision camera strategy is applied to allocate the
computation task between the sensor node and the central server. Then we propose a high
performance segmentation algorithm. Meanwhile, an efficient binary data compression method
is proposed to cope with the result on labeling information. The proposed algorithm can provide
high precision rate for the smart home applications such as the gesture recognition and
humanoid tracking. To realize the physical system, we implement it on the embedded platform
and the central server with their transmission work
Visual sensor networks are networks of smart camera devices that can process and fuse images from multiple viewpoints. They face challenges due to limited resources but enable applications like surveillance. Visual sensor nodes capture images locally and transmit extracted data rather than raw images. Effective processing algorithms are needed to handle large amounts of visual data within the nodes' constraints.
Video content analysis and retrieval system using video storytelling and inde...IJECEIAES
Videos are used often for communicating ideas, concepts, experience, and situations, because of the significant advances made in video communication technology. The social media platforms enhanced the video usage expeditiously. At, present, recognition of a video is done, using the metadata like video title, video descriptions, and video thumbnails. There are situations like video searcher requires only a video clip on a specific topic from a long video. This paper proposes a novel methodology for the analysis of video content and using video storytelling and indexing techniques for the retrieval of the intended video clip from a long duration video. Video storytelling technique is used for video content analysis and to produce a description of the video. The video description thus created is used for preparation of an index using wormhole algorithm, guarantying the search of a keyword of definite length L, within the minimum worst-case time. This video index can be used by video searching algorithm to retrieve the relevant part of the video by virtue of the frequency of the word in the keyword search of the video index. Instead of downloading and transferring a whole video, the user can download or transfer the specifically necessary video clip. The network constraints associated with the transfer of videos are considerably addressed.
Wireless Sensor Networks Are Defined As The Distribution...Amy Alexander
Wireless sensor networks are defined as irregularly distributed sensor nodes with limited resources like power, storage, communication, and processing capabilities. The key security requirements for wireless sensor networks are confidentiality, integrity, authentication, availability, key establishment, trust setup, freshness, and resilience to node capture. Confidentiality provides privacy through encryption. Integrity ensures messages are not altered. Authentication uses keys to authenticate messages between sender and receiver. Availability ensures access to network resources.
Sensor Interface Descriptors - Describing instrument protocols in a standar...Arne Bröring
The document discusses the Sensor Web Enablement (SWE) initiative and the Sensor Interface Descriptor (SID) concept. There is currently a gap between low-level sensor protocols and the higher-level SWE standards. SIDs aim to bridge this gap by allowing sensor protocols to be declaratively described. This would enable sensors to be more easily integrated into the Sensor Web. The SID model extends existing SensorML schemas and defines elements for describing sensor communication protocols, commands, processing steps and metadata mapping in an interoperable way. An implementation of a SID interpreter is also discussed which could translate between sensor protocols and SWE protocols based on SID descriptions.
IRJET- Coverage Hole Avoidance using Fault Node Recovery in Mobile Sensor Net...IRJET Journal
This document presents a fault node recovery algorithm for wireless sensor networks. It proposes combining the Grade Diffusion algorithm with a genetic algorithm to identify and replace faulty sensor nodes. The goal is to replace fewer sensor nodes while reusing existing routing paths, which increases the lifetime of the wireless sensor network and reduces replacement costs. It describes modules for sensor deployment, hole identification when sensors fail, hole healing by moving neighboring sensors, and healing holes when obstacles are present. The algorithm is implemented and evaluated using the Network Simulator NS2 tool. The results show the proposed algorithm increases the number of active sensor nodes and reduces the rate of energy consumption compared to other approaches.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews various techniques for preserving privacy in wireless sensor networks. It discusses the challenges of privacy preservation in WSNs due to their unique characteristics like resource constraints and topological constraints. It then summarizes several key techniques explored in research for preserving data privacy, source location privacy, sink location privacy and network privacy. These techniques include clustering-based approaches, random walk-based approaches and mixing-based approaches. The document concludes that while progress has been made, more research is still needed in areas like peer-to-peer network privacy preservation.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
1. This document reviews privacy preserving techniques in wireless sensor networks. It discusses challenges to privacy in WSNs including data privacy, location privacy, and network privacy.
2. Wireless sensor networks face unique challenges to privacy preservation due to their constrained environment, limited sensor resources, and multi-hop network topology. This makes existing privacy techniques difficult to apply directly to WSNs.
3. The document surveys several techniques that have been proposed for preserving different types of privacy in WSNs, including location privacy, data privacy during aggregation, and preventing traffic analysis attacks on network privacy. More research is still needed to address open problems in privacy for WSNs.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
This document presents a paired key mechanism for providing security in wireless sensor networks. It proposes using a lightweight randomized key table with keys arranged in paired columns for authentication between nodes. The key pairs remain fixed during a session. To establish a secure connection, nodes first exchange their key tables. Then one node acts as the sender/server and encrypts a key from its table to send to the receiver/client node. The client decrypts this and returns the paired key. If this matches what the sender expected, data transmission begins. The results show this method consumes less energy than existing approaches as keys are used only once from the randomized table. It provides security against passive attacks like eavesdropping and active attacks by unauthorized nodes.
Iaetsd extending sensor networks into the cloud using tpss and lbssIaetsd Iaetsd
The document proposes two schemes, TPSS and LBSS, to improve the usefulness of sensory data and reliability of wireless sensor networks (WSNs) integrated with mobile cloud computing (MCC). TPSS uses a time and priority-based approach to selectively transmit sensor data to the cloud based on user requests. LBSS schedules sensor sleep states based on user location histories to optimize energy efficiency while maintaining reliable data collection. The schemes aim to balance useful data collection from WSNs with reliable delivery to mobile cloud users.
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
Optimal sensor deployment is necessary condition in homogeneous and heterogeneous wireless sensor
network. Effective deployment of sensor nodes is a major point of concern as performance and lifetime of any
WSN. Proposed sensor deployment in WSN explore every sensor node sends its data to the nearest sink node
of the WSN. In addition to that system proposes a hexagonal cell based sensor deployment which leads to
optimal sensor deployment for both homogeneous and heterogeneous sensor deployment. Wireless sensor
networks are receiving significant concentration due to their potential applications ranging from surveillance
to tracking domains. In limited communication range, a WSN is divided into several disconnected sub-graphs
under certain conditions. We deploy sensor nodes at random locations so that it improves performance of the
network.This paper aims to study, discuss and analyze various node deployment strategies and coverage
problems for Homogeneous and Heterogeneous WSN.
This document summarizes several papers on crowd-sourced video sharing systems. It discusses issues with sharing redundant videos of the same event which uses significant bandwidth and battery. Approaches proposed include on-demand retrieval where metadata is uploaded and videos fetched only when a query matches. The Movisode system allows spatiotemporal queries and uploads metadata instead of full videos to the server. However, it has disadvantages as video retrieval depends on network strength and may be time consuming. Overall, the document reviews techniques for optimizing video storage, sharing and querying to minimize costs and resources.
This document discusses wireless sensor networks (WSNs) and provides details about their characteristics and technologies. It begins by introducing WSNs and their role in enabling applications like smart grids and the internet of things. It then discusses key aspects of WSNs such as their topology, access network technologies, data aggregation techniques, and self-organizing capabilities. Specific technologies covered include 6LoWPAN for connecting WSNs to IP networks, adaptive flow control for unstable wireless links, and MEMS sensors for miniaturization. The document provides an in-depth overview of WSN technologies and design considerations.
Investigate the Effect of Different Mobility Trajectory on VOD over WIMAXiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to Agent based Video Fusion in Wireless Multimedia Sensor Networks (20)
Teacher’s Accomplishment Level of The Components of an E-Learning Module: A B...RSIS International
This study determined the extent to which teachers in a private institution in La Trinidad, Benguet, Philippines have accomplished the essential components of an E-learning module, and identified the factors that influenced their level of accomplishment of these components. This study used mixed method explanatory sequential design. Total enumeration was used to determine the population of respondents who were full-time tertiary teachers. Out of the thirty-six full-time teachers, twenty-eight teachers responded and answered the self-assessment survey questionnaire for the quantitative phase, while seven of them who were selected using purposive sampling were interviewed for the qualitative part. Descriptive statistics using weighted mean was used to analyze quantitative data while descriptive approach using thematic analysis for the qualitative data. Quantitative descriptive analysis revealed that the teachers’ overall accomplishment level of the criteria for a quality E-learning module is partial/moderate (2.68 overall weighted mean/WM). Specifically, the teachers partially accomplished the following components of the E-learning module: instructional design (2.84 WM); communication, interaction, and collaboration (2.85 WM); student evaluation and assessment (2.89 WM); instructional materials and technologies (2.75 WM); and accessibility (2.66 WM) while slightly accomplished the components: learner support and resources (2.21 WM), and course evaluation (2.24 WM). For the qualitative descriptive inquiry, absence of capacity-building training in making E-learning module; lack of awareness of the school services, learner support, and resources sites; lack of time; lack of systemic approach to developing an online module; non-consistency of instructions; and amotivation and lack of enthusiasm emerged as factors that influence the teachers’ level of accomplishment of the parts of an E-learning module. The results show that the E-learning modules have fallen short of strict quality standards attributable to certain dire circumstances. This study thus recommends that the institution may adopt or develop its online module criteria to guide the teachers as well as the institution in writing or designing their online modules, and may conduct training in E-module design for teachers.
Development Administration and the Challenges of Neo-liberal Reforms in the E...RSIS International
The quest of every nation state is to attract, sustain and fast-track growth and development in all ramifications. The Nigerian state between 1960 and 2020 has experienced an unabated expansion of universities. Ironically, the war against illiteracy is yet to be won, despite the experimentation of different western developmental ideologies in the Nigerian educational system. The study examined the contributions of development administration in the Nigerian educational sector as well as ascertained if the current neo-liberal reform has aided the expansion or retrogression of the educational sector most especially, the university sub-sector in Nigeria. The theoretical framework of the study was anchored on the post-colonial Nigerian state theory. Methodologically, the study strictly utilized the documentary method and data were sourced through the secondary sources and analyzed in content. The study found that the experimentation of western development ideologies in Nigeria actually aided the expansion of the universities but undermined the realization of free, quality and accessible university education for all and sundry. The study recommended among others: the applications of the action plan of Professor Okonjo as regards creating a universal tertiary education for all Nigerians and sustainably financing it.
The Nexus of Street Trading and Juvenile Delinquency: A Study of Chanchaga Lo...RSIS International
I. INTRODUCTION
Globally, the number of working children has been decreasing around the world in recent years, but child labour has continued to be a widespread problem today, especially in developing countries (Paola, Viviana, Flavia & Furio2007). International Programme on Elimination of Child Labour (IPEC 2016) reported that between 2012 to 2016, about 182 million children in the developing world aged 5-14 years were engaged in work. Against this background, governments, international organizations, and non-governmental organizations (NGOs) have focused their efforts on tackling in particular the worst forms of child labour such as forced and bonded labour, which put children in physically and mentally harmful working conditions (Bunnak 2007).
Determination of Bacteriological and Physiochemical Properties of Som-Breiro ...RSIS International
The study seeks to examine the Bacteriological and
physiochemical properties of Sambrero River in Ahoada East
Local Government Area of Rivers State. Three (3) points were
sampled from different locations designated as location (L1)
location (L2) and location (L3) respectively, samples were
collected in 0.1m of Sterile containers and were transported to
the laboratory for immediate analysis. Ten (10) physiochemical,
three (3) heavy metal sand three microbiological parameters
were observed. Data was analyzed using standard methods
(ALPHA, 1998) 20th edition and Ms-Excel version 2013 software.
The result showed little variation in physiochemical parameters
which are in line with World Health Organization (WHO)
standard of potable water but shows much variation in
microbiological parameters which are not in line with WHO
standard, thereby making the water not wholesome and not
potable for consumption except after proper treatment of the
water. The work therefore recommends that members of Ekpena
Community should ensure basic water treatment such as boiling
and chlorination before consumption.
Power and Delay Analysis of Logic Circuits Using Reversible GatesRSIS International
This paper determines the propagation delay and on
chip power consumed by each basic and universal gates and
basic arithmetic functions designed using existing reversible
gates through VHDL. Hence a designer can choose the best
reversible gates to use for any logic circuit design. The paper
does a look up table analysis of truth tables of the reversible
gates to find the occurrence of the AND OR, NAND, NOR and
basic arithmetic functions, useful to build complex combinational
digital logic circuits.
Innovative ICT Solutions and Entrepreneurship Development in Rural Area Such ...RSIS International
The use of internet and information communication
technology (ICT) infrastructures is an essential aspect of
learning, this is why a lot of information on entrepreneurship
career choices are available online. However, the emerging
growth in the use of information and communication
technologies and services towards entrepreneurship development
is a challenge for efficient information dissemination and
learning especially in rural areas. This paper pointed out an area
in which MCIU can use Information and Communication
Technology (ICT) resources/infrastructure it possess for
entrepreneurship development and poverty alleviation in its
community. Thereby, encouraging social and economic growth,
and overcome the gap between urban and rural areas
entrepreneurship development. An online learning platform,
using video may contribute greatly in rural entrepreneurship
development such as MCIU community. Some examples of some
programmes like learning make over, headgear tying, bead
making, cake designing, etc online for a period of 4 to 6weeks
Indigenous Agricultural Knowledge and the Sustenance of Local Livelihood Stra...RSIS International
Natural disasters in most parts of the world have
resorted to many fatalities, forced migration and involuntary
resettlement of the affected population. Lake Nyos Gas Disaster
of 1986 which killed about 1,746 people and led to forced
migration of over 15,000 affected people and the subsequent
resettlement of survivors in resettlement camps in near by
administrative sub-divisions in the North West Region of
Cameroon is one of such natural catastrophies. The paper
evaluates the use of Indigenous Agricultural Knowledge (IAK) in
agriculture and how it has helped to sustain the livelihood of this
environmentally traumatized resettled population. The study
sampled two of these resettlement villages (Buabua and Kimbi)
to access Indigenous Agricultural Knowledge (IAK) and the
sustenance of local livelihood strategies. Field campaigns
including the administration of semi-structured questionnaires
and focus group discussions (FGDs) facilitated the collection of
data on IAK practices and how this knowledge helps in
sustaining local livelihoods. A total of 24 Indigenous Agricultural
Knowledge (IAK) were identified, with 54.16% of them used in
crop cultivation, and 45.83% in livestock farming including the
raising of small ruminants, poultry and piggery production. IAK
shows successful results after being applied as there is increased
crop and livestock yields. The use of IAK in agriculture has led
to sustainable and efficient land use within the study area.
Despite the rising use of IAK and potential benefits in
agriculture and the sustenance of local livelihoods in Buabua and
Kimbi, survivors still express a strong desire to return to the
former disaster zone. The underlying reasons behind this phobia
is mainly small land sizes ranging from 30-50 square metres that
were allocated to households for both crop cultivation and
grazing, and the fact that the limits between grazing and crop
land are not clearly demarcated. Prospects for agricultural
expansion within the area are therefore slim and need to be
addressed
Wireless radio signal drop due to foliage in illuba bore zone ethiopiaRSIS International
The exponential growth in energy utilization &
consumption in cellular network by the user devices and by
telecom equipment has imposed critical problemsbecause of
adaptation of high range frequency in available spectrum (Ultra
High Frequency-UHF) by government and technology.The other
reason for more power consumption is extensive applications of
mobile data services to video streaming, surveillance, internet
surfing and healthcare monitoring.Other important causes of
energy consumption which has been recognized are powerhungry
processors, poor design of power amplifiers etc. Presence
of different species of foliage in hilly area increases signal
attenuation, consequently in order to maintain the threshold
value of signal, the power is increased. The recent researches
predict that the data traffic is being increased by several-fold
every year. Under such predictions, energy expenditure at its
control is a major challenging task for telecom companies and
for research communities. This paper studies the actual signal
intensity drop because of irregular nature of terrestrial pattern
and foliage in Illuba Bore zone, from theoretical perspective as
well as practical point of view.
The Bridging Process: Filipino Teachers’ View on Mother TongueRSIS International
This document summarizes a study on Filipino teachers' views of using mother tongue as the medium of instruction. The study surveyed 35 elementary teachers at a school in the Philippines. It found that the teachers moderately perceived the mother tongue-based approach as effective and efficient in achieving learning goals. Specifically, teachers agreed that using the mother tongue-based approach, objectives are clear and easy to facilitate. They also agreed that learning tasks can be easily covered within allotted time. The study provides insight into teachers' perspectives on implementing the Philippines' language education policy of using mother tongue in early grades.
Optimization of tungsten inert gas welding on 6063 aluminum alloy on taguchi ...RSIS International
In this paper, the Taguchi method is used for the
Optimization of Tungsten Inert Gas Welding on 6063
Aluminum Alloy. The Taguchi method L27 is used to
optimize the pulsed TIG welding process parameters of 6063
aluminum alloy weldments for maximizing the mechanical
properties. Analysis of Variance is used to find the impact of
individual factors. Then the optimal parameters of the TIG
welding process is determined and the experimental results
illustrate the proposed approach.
Investigation of mechanical properties of carbidic ductile cast ironRSIS International
The objective of the present work is to increase the wear resistance for long life of applications. It is found that increase in the carbides in an alloy which resulted in to enhancement in hardness and wear resistance. The wear resistance was evaluated by testing in accordance with ASTE International Committee G-99 Standard. An improved performance of wear resistanceis obtained by increasing the content of chromium in the carbidic ductile cast iron. The results are discussed based on the influence of chromium content on the casting.
Six Sigma Methods and Formulas for Successful Quality ManagementRSIS International
This paper is about the five phases of Six Sigma which are Define, Measure, Analyze, Improve& Control. The methods used in each phase are discussed in detail and the various tests used in Analyze Phase of Six Sigma are given; Six Sigma can be implemented in an organization by using the methods and formulas used in each phase combined with the help of Statistical Software Minitab 18.
Task Performance Analysis in Virtual Cloud EnvironmentRSIS International
Cloud computing based applications are beneficial for
businesses of all sizes and industries as they don’t have to invest
a huge amount on initial setup. This way, businesses can opt for
Cloud services and can implement innovative ideas. But
evaluating the performance of provisioning (e.g. CPU scheduling
and resource allocation) policies in a real Cloud computing
environment for different application techniques is challenging
because clouds show dynamic demands, workloads, supply
patterns, VM sizes, and resources (hardware, software, and
network). User’s requests and services requirements are
heterogeneous and dynamic. Applications models have
unpredictable performance, workloads, and dynamic scaling
requirements. So a demand for a Simulation toolkit for Cloud is
there. Cloudsim is self-contained simulation framework that
provides simulation and modeling of Cloud-based application in
lesser time with lesser efforts. In this paper we tried to simulate
the task performance of a cloudlet using one data center, one
VM. We also developed a Graphical User Interface to
dynamically change the simulation parameters and show
simulation results.
Design and Fabrication of Manually Operated Wood Sawing Machine: Save Electri...RSIS International
In India power cut is big problem also having many
remote places where electricity not reached and that will affect
many small scale business and ongoing work, like Carpentry,
ongoing work got stop because of power cut. To overcome this
problem manually operated economical; conceptual model of a
machine which would be capable of performing different
operation like sawing/cutting and grinding without use of power
i.e. wood working machine is introduced.
In this paper, design concept and fabrication of manually
operated wood sawing/cutting machine is explained. It is
designed and fabricated so portable that it can be move and used
at various places. It is used for sawing/cutting of wood, plywood,
thin metals (<=2mm), and pvc pipes. The material can be cut
without any external energy like fuel or current. As machine uses
no electric power and fuel, this will help to maintain green
environment. The observations show that power required for
pedaling is well below the capacity of an average healthy human
being.
Effect of Surface Treatment on Settlement of Coir Mat Reinforced SandRSIS International
1) The document discusses a study on the effect of surface treatment on the settlement of sand reinforced with coir mats. Coir mats were treated with sodium hydroxide and epoxy resin to make their surface hydrophobic and increase frictional interaction with soil.
2) Model footing tests were conducted by placing treated and untreated coir mats at different depths in sand beds. Settlement reduction factor was calculated to evaluate the performance of mat reinforcement.
3) The results showed that surface treatment of coir mats significantly increased the settlement reduction factor compared to untreated mats. Surface treatment improved the interaction between the reinforcement and soil, leading to reduced settlement under load.
Augmentation of Customer’s Profile Dataset Using Genetic AlgorithmRSIS International
Data is the lifeblood of all type of business. Clean,
accurate and complete data is the prerequisite for the decisionmaking
in business process. Data is one of the most valuable
assets for any organization. It is immensely important that the
business focus on the quality of their data as it can help in
increasing the business performance by improving efficiencies,
streamlining operations and consolidating data sources. Good
quality data helps to improve and simplify processes, eliminate
time-consuming rework and externally to enhance a user’s
experience, further translating it to significant financial and
operational benefits [1] [2]. All organizations/ businesses strive to
retain their existing customers and gain new ones. Accurate data
enables the business to improve the customer experience. Data
augmentation adds value to base data by enhancing information
derived from the existing source. Data augmentation can help
reduce the manual intervention required to develop meaningful
information and insight of business data, as well as significantly
enhance data quality. Hence the business can provide unique
customer experience and deliver above and beyond their
expectations. The Data Augmentation is immensely important as
it helps in improving the overall productivity of the business. It
is also important in making the most accurate and relevant
information available quickly for decision making.
This work focuses on augmentation of the customer
dataset using Genetic Algorithm(GA). These augmented data are
used for the purpose of customer behavioral analysis. The data
set consists of the different factors inherent in each situation of
the customer to understand the market strategy. This behavioral
data is used in the earlier work of analyzing the data [13]. It is
found that collecting a very large amount of such data manually
is a very cumbersome process. It is inferred from the earlier
work [13] that the more number of data may give accurate
result. Hence it is decided to enrich the dataset by using Genetic
Algorithm.
System Development for Verification of General Purpose Input OutputRSIS International
In SoC no. of IP block inside it depends upon specific
application, increase in the Ip block increases no. of digital
control lines causes increase in the size of the chip. GPIO helps
internal IP blocks to share digital control lines using MUX and
avoids additional circuitry. Since design productivity cannot
follow the pace of nanoelectronics technology innovation, it has
been required to develop various design methodologies to
overcome this gap. In system level design, various design
methodologies such as IP reuse, automation of platform
integration and verification process have been proposed. GPIO
configuration register decides in which mode system has to work
GPIO has four modes i.e input, output, functional, interrupt. As
per operation particular mode is selected and the operation get
performed. Devices with pin scarcity like integrated circuits such
as system-on-a-chip, embedded and custom hardware, and
programmable logic devices cannot compromise with size can
perform well without additional digital control line circuitry.
De-noising of Fetal ECG for Fetal Heart Rate Calculation and Variability Anal...RSIS International
Fetal monitoring is the way of checking the condition
of unborn baby during labor and delivery by continuously
monitoring his or her heart rate. A normal fetal heart rate (FHR)
can reassure safe birth of the baby. Fetal monitoring techniques
are broadly classified into invasive and non-invasive techniques.
Non-invasive techniques are involves monitoring the fetus
through mother’s abdominal region. This can be done in all
gestation weeks and during the delivery also. Abdominal ECG
(AECG) is a composite ECG signal containing both mother’s as
well as fetal ECG. This paper presents an efficient technique to
extract FECG from abdominal ECG. A modified Pan Tompkin’s
method is employed for the QRS detection. It involves series of
filters and methods like band pass filter, derivative filter,
squaring, integration and adaptive thresholding. Further heart
rate of fetus and mother is calculated and heart rate variability
analysis is done using detected R-peaks. The algorithm is tested
on 5 different non-invasively recorded abdominal and direct
FECG signals taken from MIT PhysioNet database and the
results are obtained using MATLAB software. The performance
of the QRS detector is evaluated using parameters like
Sensitivity and Positive Prediction.
This document summarizes a study on active vibration control of composite plates using piezoelectric materials. Finite element models of composite beams with integrated piezoelectric layers were developed in ANSYS to simulate displacement feedback and direct velocity feedback control loops. The models were validated by comparing natural frequencies to experimental results. Vibration suppression was then analyzed for different composite layups under free and forced vibration conditions. The results showed that both feedback control methods successfully reduced vibration levels, with direct velocity feedback achieving steady state more quickly. Higher control gains led to greater vibration attenuation in both free and forced vibration cases.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Agent based Video Fusion in Wireless Multimedia Sensor Networks
1. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue VIS, June 2017 | ISSN 2321–2705
www.rsisinternational.org Page 64
Agent based Video Fusion in Wireless Multimedia
Sensor Networks
Bhanu K N 1
, Bhaskar Reddy.T 2
1
Reasearch Scholar, Rayalaseema University, A.P., India,
2
Professor, Dept. of Computer Science & Technology, Sri Krishnadevaraya University, A.P., India
Abstract—Wireless Sensor Networks (WSN) has several
limitations, which may not support information communication
because of energy constraints. Information sensed by the sensor
nodes in WSN is scalar, which can’t be used in some of the
applications involving video surveillance like traffic monitoring,
defense applications, seashore monitoring, etc. To overcome
these limitations, Wireless Multimedia Sensor Networks
(WMSN) which consists of video sensors can be used for such
applications. As WMSN supports sensing of videos, the amount
of data to be transmitted wirelessly in multihop communication
raises a challenge. To overcome this issue, this paper proposes an
agent based video fusion in Wireless Multimedia Sensor
Networks. The video sensors transmit sensed videos to the
respective cluster head node. Cluster head node exploits the
spatial and temporal redundancy using multi sensor video fusion
using wavelet transform. Fused video is in turn transmitted to
sink node using multi-hop communication. To evaluate the
performance of the proposed scheme, this work is simulated
using MATLAB.
Keywords— Wireless Multimedia Sensor Networks (WMSN),
Software Agent, Video Fusion
I. INTRODUCTION
SN comprises of group of sensor nodes that sense scalar
data. Wireless multimedia sensor network (WMSN) is a
network of sensor nodes enabled with multimedia devices such
as microphone and camera that can sense multimedia data and
communicate the same on multi-hop basis. Multimedia
information consists of various forms of information such as
audio, video, still images, scalar data. WMSN enable a wide
range of surveillance applications such as health care
monitoring, assisted living, smart home, infrastructure
monitoring, environment monitoring, precision farming,
vehicle monitoring, sea shore monitoring, etc. The
characteristics of WMSN are: it is distributed in nature due to
the geographical range of deployment, collaborative that
comprises of redundant data, self-organized, application
specific, which requires in-network processing of information.
It is mainly resource constrained as it has limited bandwidth,
memory, power source and computing capabilities.
The availability of low cost CMOS camera enabled sensors has
led to WMSN. The amount of data generated by video sensor
is much higher than all other types of sensors. Video can be
considered as continuous form of image data called as video
frames. Videos collected by video sensors are rich in
information and are of complicated forms. It cannot be
processed by means of recognition, compression, fusion, etc. in
order to meet the requirements of diverse applications. Some of
the constraints of WMSN are: (1) Energy conservation: Battery
change cannot be allowed due to the environment in which,
video sensor nodes have been deployed and its energy
consumption is relatively high when compared to other sensor
nodes. (2) Deployment and coverage: In order to have reliable
monitoring, deployment of video sensor nodes and
optimization of its coverage is very much essential. (3) Real-
time transmission: Video information has high requirements of
delay and synchronization for real-time transmission. Hence
video sensors should be enabled with strong media
transmission capabilities. (4) Storing and searching: Sensor
nodes in WMSN continuously perceive and collect information
from the environment. Information so collected is very huge
for storage as WMSN is memory constrained. Searching for
interested information from the collected massive data is great
challenge due to computing capability constraints.
The information sensed by multimedia sensors, especially the
videos are huge to be transmitted in raw form over the WMSN
as it consumes more energy and the bandwidth in sensor nodes.
Video fusion should be considered in order to overcome this
issue in WMSN.
Agents are software programs, which can be employed for
information fusion to prolong the network lifetime by
identifying the redundancy in information and aggregation. It is
very much essential to use agent technology in WMSN as they
can potentially reduce bandwidth consumption by moving the
data processing elements to the location of the sensed data.
Transmission of raw data would be costly with respect to
energy consumption by the sensor nodes in WMSN. Large
amounts of data are collected by multimedia sensors and the
same must be disseminated to the sink.
A. Related Works
The applications of tiny sensor nodes capable of sensing
the environment it is deployed in, along with the review of
factors influencing the design of these sensor networks,
communication architecture, algorithms and protocols
developed for each layer in the literature is discussed in [1].
Sensor network paradigm to enable delivery of multimedia
content, such as audio and video streams and still images, as
well as scalar data, resulting in distributed, networked systems,
W
2. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue VIS, June 2017 | ISSN 2321–2705
www.rsisinternational.org Page 65
referred to as wireless multimedia sensor networks (WMSNs)
are discussed in [2]. In [3], a method for cooperative video
processing in video sensor networks based on senor
correlations is discussed. Scalable, low-power video sensor
networking technologies is given in [4] and [5]. The suitability
of a feature-level based video fusion technique that overcomes
the drawback of pixel-based fusion techniques for object
detection is explained in [6]. Mobile agent systems employ
migrating codes to facilitate flexible application re-tasking,
local processing, and collaborative signal and information
processing in wireless sensor networks is given in [7]. In [8],
author focuses on the challenges involved in supporting fusion
applications in wireless ad-hoc sensor networks (WASN). In
[9], filtered frames from the captured video are fused into
a single video by using the video fusion technique, which
is based on the quality assessment in spatial domain. The
temporal continuity in an iris video to improve matching
performance using signal-level fusion from multiple frames of
a liris video, to create a single average image is discussed in
[10]. To overcome the limitations in WMSN this work
proposes the agent based video fusion in WMSN.
B. Our Contributions
This work proposes an agent based scheme for video
fusion in WMSN. The proposed scheme works as follows: (1)
Video information sensed periodically by the video sensors is
updated to the video node black board. (2) Cluster head
initiates the clones of video migration agent which is used to
collect the sensed video from the video sensor node and fuse
the video with the previously collected video from the
previous node visited, before returning back to the cluster
head in the assigned path. (3) Cluster head processes all the
videos received from VMA of various paths. A single video
which provides the information of the whole scenario is then
transmitted to the sink node. (4) Sink node interprets the
scenario and takes necessary action.
The rest of the paper is organized as follows: Section II
presents video fusion in WMSN. Section III explains agent
technology for video fusion. Section IV gives details of
simulation model and Section V discusses the results. Finally
Section VI concludes the paper.
II. VIDEO FUSION IN WMSN
This section presents the network environment, Video fusion
scheme at node level and cluster head level.
A. Network Environment
Figure 1 shows the network environment. Video sensor nodes
are randomly deployed in predefined area. Each node has
capability to capture the video periodically. Every node self
organizes to connect in WMSN, which forms the cluster and in
turn communicate to the sink node using multihop
communication. Each video sensor node has full energy at the
time of deployment
Every sensor node is enabled with agent platform. Each
agent has its responsibilities and coordinates with each other
for processing the video and communicates the same with sink
node. Static agents that reside in sensor node assist in
processing and communication. Mobile agents migrate from
one node to the other for transmission of the processed video to
the sink node.
Fig. 1 Network Environment
B. Video Fusion Scheme
WMSN sends the sensed videos to the cluster head
through the intermittent nodes. While transmitting from one
node to the other node in the path, mobile agent gets the video
from the current node and fuses it with the existing video
before migrating to the next node. It continues till it reaches
the cluster head. The videos collected in the cluster head are
fused to integrate to a single video so as to give a complete
view of the scenario, which in turn consumes less energy and
bandwidth while transmitting from cluster head to sink node.
1. Video Fusion at Sensor Node Level
Every videos sensor nodes deployed in WMSN records the
video for the specified interval of time„t‟. Let VS1, VS2, VS3,
………VSn, be video sensor nodes deployed in WMSN. Let F1,
F2, F3…Fn be the video frames of the respective video sensor
nodes as shown in figure 2. Neighbor sensor nodes have highly
correlated data due to the overlapping of field of view of both
the video nodes, which leads to lots of redundancy. Videos
recoded from the sensor nodes have to be transmitted to sink
node using multi-hop communication. As the sensor nodes
have limited energy, the conservation of the sensor node
energy is one of the main objectives, which prolongs the
network lifetime of WMSN. As the neighbor video sensor
nodes have highly correlated data, sending the videos without
eliminating the redundant data consumes lots of energy as well
as suffers with maximum delay. In order to tackle this problem,
the neighboring sensor node video can be compared for their
similar data. To eliminate the redundant video frames, in this
work we propose video fusion in WMSN. Figure 2 gives an
overview of the proposed video fusion scheme.
3. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue VIS, June 2017 | ISSN 2321–2705
www.rsisinternational.org Page 66
Fig. 2 Video Fusion in WMSN
Elimination of redundancy involves two steps, namely within
the frame and between the corresponding frames. Within the
frames the redundancy can be eliminated using lossy image
compression techniques and between the correlated frames
redundancy can be eliminated using the fusion techniques. In
this work, highly correlated frames are fused using the wavelet
based fusion techniques and fused frame is compressed and
transmitted using multi-hop communication. Figure 3 presents
the wavelet based sub band coding for video frame fusion.
Fig 3 Frame Fusion using wavelet transformation
For video frame fusion the corresponding LL, LH, HL and
HH bands are applied with fusion rules. In this work the fusion
rules are averaging of the corresponding values. This process
facilitates the fused video frames.
2. Video Fusion at Cluster Head Node
The following steps are performed in respective cluster head
nodes to perform video fusion. The cluster head node is
selected using leach protocol as given in [11]. Figure 4 shows
the flow of video fusion process in cluster head node.
Extract video frames from individual video and
update the node black board with time of sensing,
node id, and frame sequence number.
Compares the previously sensed videos, if change is
detected in the video then such video can be
considered for the video fusion.
Computation of correlation between the video frames
to be fused. If the temporal correlation is above the
predetermined value then the frames are extracted
from the videos and object displacement vector is
updated in the Video node black board.
Video frames are fused using wavelet based image
fusion. Using the fused video frames the video is
reconstructed.
In cluster head all the videos collected from mobile
agents of different paths are again fused using the
same procedure. The fused video is compressed and
sent to the sink node on predetermined path.
Fig 4 Video Fusion flow diagram
3. Proposed Algorithm
Nomenclature:
4. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue VIS, June 2017 | ISSN 2321–2705
www.rsisinternational.org Page 67
V1f1, V1f2, V1f3 …….V1fn : Video frames of sensor 1, V2f1,
V2f2, V2f3 ……. V2fn : Video frames of sensor 2, Vnf1, Vnf2,
Vnf3 …….Vnfn : Video frames of sensor n, Vcorr : Correlation
of corresponding video frames, th : Threshold, CH : Cluster
Head, DWT: Discrete Wavelet Transformation, FV: Fused
Video
Algorithm 1: Video Fusion
Begin
Step 1: Extraction of video frames
Step 2: Compare correlation between the respective
video frames
Step 3: if (Vcorr > th) then
FV=Video_framefusion(Videoframes)
else
Retain frame
end if
Step 6: Transmit FV to the sink node
End
Begin Video_framefusion
Input Videoframes
Step 1: Apply DWT based video frame fusion
Step 2: Get all the fused frames and reconstruct the video
Output fused video
End Video_framefusion
III. AGENT TECHNOLOGY FOR VIDEO FUSION
The proposed agency comprises of Video Node Agency
(VNA), Cluster Head Agency (CHA) and Video Sink Agency
(VSA).
A. Video Node Agency
Video Node Agency comprises of Video Node Manager
Agent (VNMA), Video Processing Agent (VPA) and Video
Node Black Board (VNBB), which are described below. Figure
5 explains the agent interactions of video node agency.
Fig. 5 Video Node Agency
1. Video Node Manager Agent
It is the static agent that resides in the all the video sensor
nodes, which is responsible for the creation of VPA and
VNBB. This agent facilitates sensing configuration such as
low resolution, medium resolution and high resolution. It
mainly wraps sensing (camera) and software component. It
updates the sensed information to VNBB and also coordinates
the communication between the other static agents, mobile
agents and VNBB. It is also responsible for comparing the
previous video and current video and estimates the temporal
and frequency difference between those two videos and
updates the VNBB.
2. Video Processing Agent
It is the static agent, which gets the information from the
VNBB such as time of sensing, field of view, bits per pixel,
and video. It extracts the video frame and enhances the video
and updates the VNBB. VPA gets the video frames that are
stored in VNBB and fuses. Fused frames are updated in the
VNBB.
3. Video Node Black Board
It is the knowledge base, which can be read and updated by
various static and mobile agents. VNBB data base comprises of
the node id, residual energy, video, field of view, time of
sensing, previous videos, critical videos, non-critical videos,
neighboring node ids, and their location information, network
bandwidth, predetermined path to reach sink node, fused video
and time of fusion, freshness of the video data etc.
B. Cluster Head Agency
Cluster Head Agency consists of Cluster Head Manager
Agent (CHMA), Video Migration Agent (VMA), Cluster
Video Processing Agent (CVPA) and Cluster Head Black
Board (CHBB). Figure 6 explains the agent interactions in
cluster head agency.
Fig. 6 Cluster Head Agency
1. Cluster Head Manager Agent
It is a static agent that resides in all the cluster head sensor
nodes, which is responsible for the creation of CVPA, VMA
5. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue VIS, June 2017 | ISSN 2321–2705
www.rsisinternational.org Page 68
and CHBB. It generates many clones of VMA and sends it
over all the paths in the cluster to collect the videos and fuse it
if correlation is more. It updates the CHBB with the fused and
integrated video. It also helps in transmitting the fused video
to the sink node.
2. Cluster Video Processing Agent
It is a static agent, which gets the videos from VMA. If the
correlations among any of the videos received are more then,
those videos are fused otherwise all the videos are stitched to
provide a single view of the scenario. Transmitting this single
video consumes less energy and bandwidth than sending all
the received videos to the sink node.
3. Video Migration Agent
It is a mobile agent that is initiated by the CHMA in order
to get the sensed videos from the sensor node and move to
next node on the path by fusing the video with the previously
visited node. This process is repeated until it reaches back to
the cluster head node. This agent works in coordination with
CVPA agent.
4. Cluster Node Black Board
It is the knowledge base that comprises of node id, time of
sensing, sequence number, path information, bandwidth, node
location information, node residual energy, previous video
information. It is periodically updated by the information from
every sensor node through VMA.
C. Video Sink Agency
This section presents the various agent components of video
sink agency that facilitate inter-agent communication for video
fusion in WMSN. The video sink agency interactions can be
explained as shown in figure 7.
Fig. 7 Video Sink Agency
1. Video Sink Manager Agent
It is a static agent that resides in the sink node, which is
responsible for the creation of FSA and VSBB. It is also
responsible for computing the path information and facilitating
the route information. It is also responsible for monitoring the
previous information. If the user needs the information at
particular time, this agent is responsible for sending the
request message to all the cluster head for gathering the
information of particular time. It is also responsible for taking
the decisions like the quality of video required to collect from
the WMSN based on the available network resources.
2. Frame Synchronization Agent
It is the static agent that gets the node id, frames sequence
number, time of sensing, etc., from the VSBB. It synchronizes
all the nodes frame for fusing the video. FSA gets the frames
from the VSBB, synchronizes and computes the correlation
between the corresponding frames. The corresponding nodes
which have better correlation are fused for the better analysis.
3. Video Sink Black Board
It is the knowledge base that comprises of node id, time of
sensing, sequence number, path information, bandwidth, node
location information, node residual energy, previous video
information. It is periodically updated by the information from
every cluster head node.
IV. SIMULATION MODEL
The simulation of the proposed model is done using
MATLAB. We discuss a generalized simulation model,
simulation procedure and some of performance parameters.
A. Simulation Inputs
In the simulation model we consider “N” number of nodes
in the area of length “L” and breadth “B”. A network consists
of N static nodes that are randomly placed within a given area.
We find some static and mobile agents between sensor nodes
and sink node.
The transmission of packets is assumed to occur in
discrete time. A node receives all packets heading to it during
receiving interval unless the sender node is in non-active state.
For simplicity, we have considered the channel to be error free.
Table 1: Simulation Inputs
Parameter Notation Value
Length L 5000m
Breadth B 5000m
Number of nodes N 1-20
Transmission range Rx 300m-500m
Sensing Range Sr 5-15 meters
No. of bits per pixel Bits/Pixel 8, 12 and 16 bits
The simulation procedure involves following steps:
Begin
1. Generate sensor network environment.
2. Formation of cluster and selection of cluster head.
3. The sensor node sends video from node to cluster head.
4. Apply the proposed scheme.
5. Compute performance parameters of the system.
End
6. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue VIS, June 2017 | ISSN 2321–2705
www.rsisinternational.org Page 69
B. Performace Parameters
Some of the performances considered to evaluate the proposed
scheme are as follows:
Processing Time: it is the total time required to fuse
and reconstruct the fused video, which is measured in
terms of milliseconds.
Mean Square Error: It is quality measure of
reconstructed video.
Throughput: It is the ratio of total number of packets
received to total number of packets sent.
Network lifetime: It is the amount of time that the
WMSN would be fully operative
Energy Consumption: It is the total energy
consumed for transmission of fused video from
cluster head to sink node.
Delay: It is the total amount of time taken for
transmitting video from source node to sink node.
Delay= Processing Time + Transmission Time
V. RESULTS
A. Energy Consumption based on Communication Range
and Number of Nodes
Figure 8 shows the energy consumption increases as the
the number of nodes increases. As the number of nodes
increases the total of number of videos also increases. Hence
there is increase in the energy consumption. If there is increase
in the communication range number of of nodes within the
cluster head increases hence there is increase in the energy
consumption.
Fig. 8 Number of Nodes V/S Energy Consumption in millijoules
B. Processing Time based on Communication Range and
Number of Nodes
Figure 9 shows the processing time versus the number of
nodes. If there is increase in the number of nodes then there is
increase in the number of video frames to be fused. If the
amount of data increases there is increase in the processing
time.
Fig. 9 Number of Nodes V/S Processing Time in milliseconds
C. Delay based on Communication Range and Number of
Nodes
From the figure 10 we can notice that if there is increase
in the number of nodes, the total amount of data also increases
and there is decrease in the correlation between the frames and
hence it takes more time for the transmission of the data from
the cluster head node to the sink node.
Fig. 10 Number of Nodes V/S Delay in milliseconds
D. Bandwidth required based on Communication Range and
Correlation between Frames
From figure 11 we can notice that as there is increase in
the correlation between the frames of the fused video, the size
of the video decreases and hence it takes less time as well the
bandwidth required for the transmission of the fused video
from the cluster head node to the sink node is reduced.
7. International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue VIS, June 2017 | ISSN 2321–2705
www.rsisinternational.org Page 70
Fig. 11 Correlation between frames V/S Bandwidth required in Mbps
VI. CONCLUSION
Wireless networks have several limitations where huge
amount of data cannot be transmitted using multi-hop
communication. WMSN needs to transmit huge amount of
data as multimedia type of data consists of videos, audios,
images along with scalar data to be transmitted. A software
agent based video fusion scheme for WMSN is proposed in
this work. Videos sensed by the video sensors are collected by
a mobile agent initiated by the cluster head node, which fuses
the present collected video with that of the previously
collected fused video in the assigned path before returning to
the cluster head node. Cluster head processes the videos
received by all the mobile agents and integrates them to send a
single video which can be used to analyze the scenario.
Software agents used in this work for video fusion, processing
and transmission, performed better in conserving the
bandwidth and energy of nodes, thereby conserving the
network lifetime.
REFERENCES
[1]. Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and
Erdal Cayirci, “A Survey on Sensor Networks Georgia Institute of
Technology”, Journal of Computer Networks,Vol 38, Jul 2002.
[2]. Ian F. Akyildiz, Tommaso Melodia, Kaushik R. Chowdhury, “A
survey on wireless multimedia sensor networks”, Science Direct,
Comput. Netw.(2006), doi:10.1016/j.comnet.2006.10.002
[3]. Huadong Mat, Yonghe Liu, “Correlation Based Video Processing
in Video Sensor Networks”, International Conference on Wireless
Networks, Communications and Mobile Computing, IEEE Xplore
2005.
[4]. W. Feng, B. Code, E. Kaiser, M. Shea. and W. Feng. "Panoptes:
scalable low-power video sensor networking technologies." in
Proceedings of thellth ACM international conference on
Multimedia. Berkeley, CA. Nov.2003.
[5]. W. Feng, I. Walpole, W. Feng, and C. Pu, "Moving towards
massivelyscalable video-based sensor networks," in Proceedings of
the Workshopon New Visions for Large-Scale Networks: Research
and Applications.Washington, DC, March 2001.
[6]. Anjali Malviya, S. G. Bhirud, “Feature-Level based Video Fusion
for Object Detection”, IJCSI International Journal of Computer
Science Issues, Vol. 8, Issue 1, January 2011, ISSN (Online):
1694-0814, www.IJCSI.org
[7]. Min Chen, Sergio Gonzalez, Victor C. M. Leung, “Applications
and Design Issues for Mobile Agents in Wireless Sensor
Networks”, IEEE Wireless Communications, December 2007.
[8]. Umakishore Ramachandran, Rajnish Kumar, Matthew Wolenetz,
Brian Cooper, Bikash Agarwalla, JunSuk Shin, Phillip Hutto,
Arnab Paul, “Dynamic Data Fusion for Future Sensor Networks”,
ACM Transactions on Sensor Networks (TOSN) TOSN Homepage
archiveVolume 2, Issue 3, August 2006, Pages 404-443
[9]. P.Nalini, P.Lakshmi, P.Sri Hari, Ch.Gayatri, “Development of
Video Fusion Algorithm at Frame Level for Removal of Impulse
Noise”,IOSR Journal of Engineering (IOSRJEN) e-ISSN: 2250-
3021, p-ISSN: 2278-8719, www.iosrjen.org, Volume 2, Issue 10
(October 2012), PP 17-22
[10]. Karen Hollingsworth, Tanya Peters, Kevin W. Bowyer, “Iris
Recognition using Signal-level Fusion ofFrames from Video”,
Proc. International Conference on Biometrics [1] c 2009 Springer.