SlideShare a Scribd company logo
1 of 28
A New Approach to Data Fusion
in
UnderWater Wireless Sensor Networks
YOUSEF EMAMI
yousef.emami@ieee.org
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
1
Agenda
Agenda
Rudiments
Applications
Challenges
Algorithms
Literature Review
Conclusion
Reference
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
2
IEEE Remote Sensing Society Data Fusion Technical Committee defines
data fusion as below:
The process of combining data provided by different instruments and source in order to
improve the processing and interpretation of these data.
Hall defines data fusion as below:
A combination of data from multiple sensor to accomplish improved accuracy and more
specific inferences that could achieved by the use of single sensor alone
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
3
Rudiments
Data Fusion
UWSNs
Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review
Reference
Conclusio
n
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
4
Rudiments
Data Fusion
UWSNs
Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review
Reference
Conclusio
n
The relationship among Fusion Terms
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
5
Rudiments
Data Fusion
UWSNs
Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
Data Fusion in the Information-Processing Cycle
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
6
Rudiments
Data Fusion
UWSNs
Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
Data Mining in the Information-Processing Cycle
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
7
Rudiments
Data Fusion
UWSNs
Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
Classification Based on Relationship among Resources
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
8
Rudiments
Data Fusion
UWSNs
Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
The major challenges in the design of underwater sensor networks are as follows:
 The available bandwidth is severely limited
 Propagation delay under water is five orders of magnitude higher than that in RF
terrestrial channels and extremely variable
 High bit error rates and temporary losses of connectivity
 Battery power is limited and usually batteries cannot be recharged; also, solar energy
cannot be exploited.
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
9
Rudiments
Data Fusion
UWSNs
Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
Terrestrial Sensor Networks vs. Underwater Sensor Networks
 Size and cost
 Deployment
 Power
 Memory
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
10
Rudiments
Data Fusion
UWSNs
Applications Challenges
Algorithms
Methods
Techniques
Literature
Review
Reference
Conclusio
n
 Robotics
 Intelligent Transportation Systems Precision Agriculture
 Security, Improving Intrusion Detection Data Privacy
 Assessing and Monitoring Civil Infrastructures Environmental
Monitoring
 Fire Detection
 Financial analysis
 Fault diagnosis
 Medical Diagnoses
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
11
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review
Reference
Conclusio
n
 Improving Barrier Coverage in Wireless Sensor Networks
 Detect routing failures
 Collect link statistics for routing protocols
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
12
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review
Reference
Conclusio
n
 Data imperfection
Data provided by sensors is always affected by some level of impreciseness as well as
uncertainty in the measurements.
 Data modality
Sensor networks may collect the qualitatively similar (homogeneous) or different
(heterogeneous) data, Both cases must be handled by a data fusion scheme.
 Outliers and spurious data
Data fusion algorithms should be able to exploit the redundant data to alleviate such
effects
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
13
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
 Processing framework
Data fusion processing can be performed in a centralized or decentralized
manner.
 Data dimensionality
The measurement data could be preprocessed, either locally at each of the sensor
nodes or globally at the fusion center to be compressed into lower dimensional
data, assuming a certain level of compression loss is allowed
 Data alignment/registration
Sensor data must be transformed from each sensor’s local frame into a common
frame before fusion occurs. Data registration is of critical importance to the
successful deployment of fusion systems in practice.
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
14
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review
Reference
Conclusio
n
Inference
 Bayesian
 Dempster-Shafer
 Fuzzy Logic
 Neural Network
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
15
Rudiments Applications Challenges
Algorithms
Methods
Techniques
Literature
Review Reference
Conclusio
n
Estimation
 Least squares
 Maximum likelihood
 Moving average filter
 Kalman filter
 Particle filter
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
16
Rudiments Applications Challenges
Algorithms
Methods
Techniques
Literature
Review Reference
Conclusio
n
Rough set based fusion
 A mathematic method which analyses and treats vagueness and uncertainty, and offers an effective
method to data fusion system.
 It can analyze incomplete or inaccurate data to extract useful information.
 Rough set theory is now mainly applied in decision making of distributed data fusion system.
.
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
17
Introduction Applications Challenges
Algorithms
Methods
Techniques
Literature
Review
Reference
Conclusio
n
Data fusion in intelligent transportation systems: Progress and challenges – A survey by El Faouzi(2011)
A variety of functions are assigned to ITS to address the traffic congestion and safety problems:
 Automatic incident detection (AID)
 Advanced driver assistance (ADAS)
 Network control, crash analysis and prevention
 Traffic demand estimation
 Traffic forecast and monitoring
 Accurate position estimation
Each of these sub-systems can make use of different information sources. DF techniques can then be used to
combine them to yield better results.
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
18
Rudimentd Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
Energy efficient wireless sensor network communications based on computational
intelligent data fusion for environmental monitoring by D.F.Larios(2012)
Goal: Optimizing energy consumption in an environmental monitoring process
Method: The data fusion is based on a local Self-Organized Map(SOM)
Results: Enhancing network lifetime
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
19
RudimentsApplications Challenges
Algorithms
Methods
Technique
s
Literature
Review
Reference
Conclusio
n
An approach to implement data fusion techniques in wireless sensor networks using
genetic machine learning algorithms by Pinto(2014)
Goal: Optimizing the communication efficiency in dense wireless sensor network
Method: Genetic Algorithm
Result: The proposed approach is able adjust the sending rate of a WSN
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
20
RudimentsApplications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
A Power-Aware Framework for Distributed Data Fusion Application in Wireless Sensor
Networks by Zongqing Lu(2011)
Goal: Mapping distributed data fusion application into networks.
Method: Fusion function placement and fusion function transfer maintenance.
Result: PAFusion has better performances than DFuse and PAFusion has much less
overhead and causes only slightly more transmission cost than optimal solution.
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
21
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
Multisensor data fusion for underwater navigation by Majumder(2001)
Goal: Integrating information from a number of sensors to navigate a sub-sea vehicle
Method: Data Fusion
Result: Successful Navigation
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
22
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
Multi-sensor Data Fusion for Underwater Target Recognition Under Uncertainty by Tang
Zheng(2010)
Goal: Under Water Target Recognition
Method: A dynamic information fusion framework which is based on discrete dynamic
bayesian network (DDBN) for representing, integrating and inferring various target
characteristics from dynamic sensory information of different modalities
Result: The experimental results demonstrate the utility of the proposed method in
efficiently modeling and inferring dynamic events.
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
23
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
An Energy-Efficient Data Fusion Protocol for Wireless Sensor Network by Bin Zeng
(2007)
Goal: Proposing a data fusion protocol for gathering event data in sensor networks
Results: LEECF not only optimizes the transmission and fusion energy costs, but also
increases the fusion speed for sensor nodes. LEECF is completely distributed, requiring no
control information from the sink after node level is set up at first, and the nodes do not
require knowledge of the global network in order for LEECF to operate.
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
24
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review
ReferenceConclusio
n
Other applications:
Data fusion for underwater target tracking by S. Koteswara Rao(2009)
Data Fusion Method for Underwater Object Localization by Yun Lu (2013)
Application of the Multi-sensor Fusion Method for Underwater Landscape Modeling By
Noel(2014)
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
25
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n
To minimize energy consumption of Underwater wireless sensor networks ,Data fusion
techniques are good candidate and can prolong lifetime of UWSNs.
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
26
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review
ReferenceConclusion
THANK YOU FOR YOUR KIND ATTENTION
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
27
Rudiments
Applications
Challenges
Algorithms
Methods
Technique
s
Literature
Review
ReferenceConclusio
n
Problem
Statemen
t
1. Lawrence A. Klein, “Sensor and Data Fusion” ,SPIE Press,2010
2. Ahmed Abdelgawad,Magdy Baypumi ,” Resource-Aware Data Fusion Algorithms for Wireless Sensor Networks”, Springer
Publication, 2012
3. Martin E. Liggins ,David L. Hall,James Llinas,”Handbook of Multisensor Data Fusion”,CRC Press,2009
4. E. F. Nakamura, et al., "Information fusion for wireless sensor networks: Methods, models, and classifications," ACM Comput.
Surv., vol. 39, p. 9, 2007.
5. Ian F. Akyildiz, Mehmet Can Vuran, “Wireless Sensor Networks”, John Wiley & Sons,2010
6. B. Khaleghi, et al., "Multisensor data fusion: A review of the state-of-the-art," Information Fusion, vol. 14, pp. 28-44, 2013.
7. N.-E. E. Faouzi, et al., "Data fusion in intelligent transportation systems: Progress and challenges – A survey," Information Fusion,
vol. 12, pp. 4-10, 2011.
8. B. J. Larios D.F, Rodríguez G, "Energy efficient wireless sensor network communications based on computational intelligent data
fusion for environmental monitoring," Communication, vol. 6, pp. 2189-2197, 2012.
9 A.R.Pinto,et al.,” An approach to implement data fusion techniques in wireless sensor networks using genetic machine learning
algorithms”, Information Fusion,vol.15,pp.90-101,2014
10. S. Koteswara Rao, K.S. Linga Murthy, K. Raja Rajeswari.” Data fusion for underwater target tracking “,vol.4,pp.576-585,2010
Department of Computer Engineering and Information
Technology-Shiraz University of Technology
28
Rudiments Applications Challenges
Algorithms
Methods
Technique
s
Literature
Review Reference
Conclusio
n

More Related Content

What's hot

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxNShravani1
 
Anomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleAnomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleImpetus Technologies
 
Neural Networks: Self-Organizing Maps (SOM)
Neural Networks:  Self-Organizing Maps (SOM)Neural Networks:  Self-Organizing Maps (SOM)
Neural Networks: Self-Organizing Maps (SOM)Mostafa G. M. Mostafa
 
Automated Machine Learning
Automated Machine LearningAutomated Machine Learning
Automated Machine LearningYuriy Guts
 
Machine Learning and Internet of Things
Machine Learning and Internet of ThingsMachine Learning and Internet of Things
Machine Learning and Internet of ThingsSofian Hadiwijaya
 
Application of machine learning in industrial applications
Application of machine learning in industrial applicationsApplication of machine learning in industrial applications
Application of machine learning in industrial applicationsAnish Das
 
Introduction to intelligent systems
Introduction to intelligent systemsIntroduction to intelligent systems
Introduction to intelligent systemsMartin Molina
 
ELM: Extreme Learning Machine: Learning without iterative tuning
ELM: Extreme Learning Machine: Learning without iterative tuningELM: Extreme Learning Machine: Learning without iterative tuning
ELM: Extreme Learning Machine: Learning without iterative tuningzukun
 
Federated learning
Federated learningFederated learning
Federated learningMindos Cheng
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)Cory Cook
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Feedforward neural network
Feedforward neural networkFeedforward neural network
Feedforward neural networkSopheaktra YONG
 
Parametric & Non-Parametric Machine Learning (Supervised ML)
Parametric & Non-Parametric Machine Learning (Supervised ML)Parametric & Non-Parametric Machine Learning (Supervised ML)
Parametric & Non-Parametric Machine Learning (Supervised ML)Rehan Guha
 
Automated Machine Learning (Auto ML)
Automated Machine Learning (Auto ML)Automated Machine Learning (Auto ML)
Automated Machine Learning (Auto ML)Hayim Makabee
 

What's hot (20)

Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Integration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptxIntegration of Sensors & Actuators With Arduino.pptx
Integration of Sensors & Actuators With Arduino.pptx
 
Anomaly detection with machine learning at scale
Anomaly detection with machine learning at scaleAnomaly detection with machine learning at scale
Anomaly detection with machine learning at scale
 
Neural Networks: Self-Organizing Maps (SOM)
Neural Networks:  Self-Organizing Maps (SOM)Neural Networks:  Self-Organizing Maps (SOM)
Neural Networks: Self-Organizing Maps (SOM)
 
Automated Machine Learning
Automated Machine LearningAutomated Machine Learning
Automated Machine Learning
 
Machine Learning and Internet of Things
Machine Learning and Internet of ThingsMachine Learning and Internet of Things
Machine Learning and Internet of Things
 
Application of machine learning in industrial applications
Application of machine learning in industrial applicationsApplication of machine learning in industrial applications
Application of machine learning in industrial applications
 
Introduction to intelligent systems
Introduction to intelligent systemsIntroduction to intelligent systems
Introduction to intelligent systems
 
ELM: Extreme Learning Machine: Learning without iterative tuning
ELM: Extreme Learning Machine: Learning without iterative tuningELM: Extreme Learning Machine: Learning without iterative tuning
ELM: Extreme Learning Machine: Learning without iterative tuning
 
Federated learning
Federated learningFederated learning
Federated learning
 
Edge Computing.pptx
Edge Computing.pptxEdge Computing.pptx
Edge Computing.pptx
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)DBSCAN (2014_11_25 06_21_12 UTC)
DBSCAN (2014_11_25 06_21_12 UTC)
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Feedforward neural network
Feedforward neural networkFeedforward neural network
Feedforward neural network
 
K Nearest Neighbors
K Nearest NeighborsK Nearest Neighbors
K Nearest Neighbors
 
Parametric & Non-Parametric Machine Learning (Supervised ML)
Parametric & Non-Parametric Machine Learning (Supervised ML)Parametric & Non-Parametric Machine Learning (Supervised ML)
Parametric & Non-Parametric Machine Learning (Supervised ML)
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Automated Machine Learning (Auto ML)
Automated Machine Learning (Auto ML)Automated Machine Learning (Auto ML)
Automated Machine Learning (Auto ML)
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 

Viewers also liked

Intro to Multitarget Tracking for CURVE
Intro to Multitarget Tracking for CURVEIntro to Multitarget Tracking for CURVE
Intro to Multitarget Tracking for CURVEchenhm
 
Multi sensor-fusion
Multi sensor-fusionMulti sensor-fusion
Multi sensor-fusion万言 李
 
Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceBit Stew Systems
 
integrated curriculum
integrated curriculum integrated curriculum
integrated curriculum Iqra Shah
 
Internet of Things and Complex event processing (CEP)/Data fusion
Internet of Things and Complex event processing (CEP)/Data fusionInternet of Things and Complex event processing (CEP)/Data fusion
Internet of Things and Complex event processing (CEP)/Data fusionBAINIDA
 
Sensor fusion between car and smartphone
Sensor fusion between car and smartphoneSensor fusion between car and smartphone
Sensor fusion between car and smartphoneGabor Paller
 
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)Hellmuth Broda
 
Integrated curriculum
Integrated curriculumIntegrated curriculum
Integrated curriculumMatt Lyon
 
Blockchain Use Cases: Think of a "Public" Pub/Sub Queue
Blockchain Use Cases: Think of a "Public" Pub/Sub QueueBlockchain Use Cases: Think of a "Public" Pub/Sub Queue
Blockchain Use Cases: Think of a "Public" Pub/Sub QueueAltoros
 
Correlation
CorrelationCorrelation
CorrelationTech_MX
 
Internet of Things (IoT) and Big Data
Internet of Things (IoT) and Big DataInternet of Things (IoT) and Big Data
Internet of Things (IoT) and Big DataGuido Schmutz
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsAnthony Chen
 
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...Chris Haddad
 
Presentation on data integrity in Pharmaceutical Industry
Presentation on data integrity in Pharmaceutical IndustryPresentation on data integrity in Pharmaceutical Industry
Presentation on data integrity in Pharmaceutical IndustrySathish Vemula
 

Viewers also liked (20)

Intro to Multitarget Tracking for CURVE
Intro to Multitarget Tracking for CURVEIntro to Multitarget Tracking for CURVE
Intro to Multitarget Tracking for CURVE
 
Canini09a
Canini09aCanini09a
Canini09a
 
Multi sensor-fusion
Multi sensor-fusionMulti sensor-fusion
Multi sensor-fusion
 
Integrated curriculum all aspects by KHURRAM RAFI
Integrated curriculum all aspects by KHURRAM RAFIIntegrated curriculum all aspects by KHURRAM RAFI
Integrated curriculum all aspects by KHURRAM RAFI
 
Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine Intelligence
 
1 tracking systems1
1 tracking systems11 tracking systems1
1 tracking systems1
 
integrated curriculum
integrated curriculum integrated curriculum
integrated curriculum
 
Internet of Things and Complex event processing (CEP)/Data fusion
Internet of Things and Complex event processing (CEP)/Data fusionInternet of Things and Complex event processing (CEP)/Data fusion
Internet of Things and Complex event processing (CEP)/Data fusion
 
Sensor fusion between car and smartphone
Sensor fusion between car and smartphoneSensor fusion between car and smartphone
Sensor fusion between car and smartphone
 
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
 
Integrated curriculum
Integrated curriculumIntegrated curriculum
Integrated curriculum
 
Blockchain Use Cases: Think of a "Public" Pub/Sub Queue
Blockchain Use Cases: Think of a "Public" Pub/Sub QueueBlockchain Use Cases: Think of a "Public" Pub/Sub Queue
Blockchain Use Cases: Think of a "Public" Pub/Sub Queue
 
Correlation analysis
Correlation analysisCorrelation analysis
Correlation analysis
 
Correlation
CorrelationCorrelation
Correlation
 
Internet of Things (IoT) and Big Data
Internet of Things (IoT) and Big DataInternet of Things (IoT) and Big Data
Internet of Things (IoT) and Big Data
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of Things
 
Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...Big data streams, Internet of Things, and Complex Event Processing Improve So...
Big data streams, Internet of Things, and Complex Event Processing Improve So...
 
Curriculum
CurriculumCurriculum
Curriculum
 
Data fusion with kalman filtering
Data fusion with kalman filteringData fusion with kalman filtering
Data fusion with kalman filtering
 
Presentation on data integrity in Pharmaceutical Industry
Presentation on data integrity in Pharmaceutical IndustryPresentation on data integrity in Pharmaceutical Industry
Presentation on data integrity in Pharmaceutical Industry
 

Similar to Data fusion

Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficTELKOMNIKA JOURNAL
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...IJECEIAES
 
Congestion Prediction in Internet of Things Network using Temporal Convolutio...
Congestion Prediction in Internet of Things Network using Temporal Convolutio...Congestion Prediction in Internet of Things Network using Temporal Convolutio...
Congestion Prediction in Internet of Things Network using Temporal Convolutio...vitsrinu
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...ijwmn
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)S3 Infotech IEEE Projects
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...josephjonse
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...ijngnjournal
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...josephjonse
 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSIJCNCJournal
 
Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
Securing BGP by Handling Dynamic Network Behavior and Unbalanced DatasetsSecuring BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
Securing BGP by Handling Dynamic Network Behavior and Unbalanced DatasetsIJCNCJournal
 
G03403041052
G03403041052G03403041052
G03403041052theijes
 
SMART TRAFFIC MANAGEMENT USING CLOUD
SMART TRAFFIC MANAGEMENT USING CLOUDSMART TRAFFIC MANAGEMENT USING CLOUD
SMART TRAFFIC MANAGEMENT USING CLOUDsanyamlove
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...chokrio
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANETPerformance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANETjannahyusoff1
 
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...IJMTST Journal
 
SAMPLING BASED APPROACHES TO HANDLE IMBALANCES IN NETWORK TRAFFIC DATASET FOR...
SAMPLING BASED APPROACHES TO HANDLE IMBALANCES IN NETWORK TRAFFIC DATASET FOR...SAMPLING BASED APPROACHES TO HANDLE IMBALANCES IN NETWORK TRAFFIC DATASET FOR...
SAMPLING BASED APPROACHES TO HANDLE IMBALANCES IN NETWORK TRAFFIC DATASET FOR...cscpconf
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for amiIJCI JOURNAL
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 

Similar to Data fusion (20)

Approximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network trafficApproximation of regression-based fault minimization for network traffic
Approximation of regression-based fault minimization for network traffic
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
 
Congestion Prediction in Internet of Things Network using Temporal Convolutio...
Congestion Prediction in Internet of Things Network using Temporal Convolutio...Congestion Prediction in Internet of Things Network using Temporal Convolutio...
Congestion Prediction in Internet of Things Network using Temporal Convolutio...
 
SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
MACHINE LEARNING FOR QOE PREDICTION AND ANOMALY DETECTION IN SELF-ORGANIZING ...
 
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
 
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
 
Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
Securing BGP by Handling Dynamic Network Behavior and Unbalanced DatasetsSecuring BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets
 
G03403041052
G03403041052G03403041052
G03403041052
 
Presentation_final.pdf
Presentation_final.pdfPresentation_final.pdf
Presentation_final.pdf
 
SMART TRAFFIC MANAGEMENT USING CLOUD
SMART TRAFFIC MANAGEMENT USING CLOUDSMART TRAFFIC MANAGEMENT USING CLOUD
SMART TRAFFIC MANAGEMENT USING CLOUD
 
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...Comparative Performance Analysis of Wireless Communication Protocols for Inte...
Comparative Performance Analysis of Wireless Communication Protocols for Inte...
 
Performance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANETPerformance analysis of routing protocol in MANET
Performance analysis of routing protocol in MANET
 
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
 
SAMPLING BASED APPROACHES TO HANDLE IMBALANCES IN NETWORK TRAFFIC DATASET FOR...
SAMPLING BASED APPROACHES TO HANDLE IMBALANCES IN NETWORK TRAFFIC DATASET FOR...SAMPLING BASED APPROACHES TO HANDLE IMBALANCES IN NETWORK TRAFFIC DATASET FOR...
SAMPLING BASED APPROACHES TO HANDLE IMBALANCES IN NETWORK TRAFFIC DATASET FOR...
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 

More from yousef emami

A sonic-wave system that prevents from beetle entrance to building
A sonic-wave system that prevents from beetle entrance to buildingA sonic-wave system that prevents from beetle entrance to building
A sonic-wave system that prevents from beetle entrance to buildingyousef emami
 
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...yousef emami
 
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...yousef emami
 
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد yousef emami
 
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...yousef emami
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computingyousef emami
 
امواج الکترومغناطیس :استانداردها و چشم انداز ها
امواج الکترومغناطیس :استانداردها و چشم انداز هاامواج الکترومغناطیس :استانداردها و چشم انداز ها
امواج الکترومغناطیس :استانداردها و چشم انداز هاyousef emami
 
An improved network intrusion detection technique based on
An improved network intrusion detection technique based onAn improved network intrusion detection technique based on
An improved network intrusion detection technique based onyousef emami
 
Remote network monitoring
Remote network monitoringRemote network monitoring
Remote network monitoringyousef emami
 

More from yousef emami (12)

A sonic-wave system that prevents from beetle entrance to building
A sonic-wave system that prevents from beetle entrance to buildingA sonic-wave system that prevents from beetle entrance to building
A sonic-wave system that prevents from beetle entrance to building
 
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
An Energy-efficient Data Transmission Scheme in Underwater Wireless Sensor Ne...
 
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
ارائه یک رویکرد کارا در حفظ انرژي بر اساس روش هاي دیتافیوژن آگاه از ترافیک بر...
 
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
بررسی را ههاي بهبود امنیت مجازي سازي با استفاده از محاسبات قابل اعتماد
 
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
Efficient Intrusion Detection using Weighted K-means Clustering and Naïve Bay...
 
Automatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud ComputingAutomatic Management of Wireless Sensor Networks through Cloud Computing
Automatic Management of Wireless Sensor Networks through Cloud Computing
 
امواج الکترومغناطیس :استانداردها و چشم انداز ها
امواج الکترومغناطیس :استانداردها و چشم انداز هاامواج الکترومغناطیس :استانداردها و چشم انداز ها
امواج الکترومغناطیس :استانداردها و چشم انداز ها
 
An improved network intrusion detection technique based on
An improved network intrusion detection technique based onAn improved network intrusion detection technique based on
An improved network intrusion detection technique based on
 
VM placement
VM placementVM placement
VM placement
 
Remote network monitoring
Remote network monitoringRemote network monitoring
Remote network monitoring
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
802.11ac
802.11ac802.11ac
802.11ac
 

Recently uploaded

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Data fusion

  • 1. A New Approach to Data Fusion in UnderWater Wireless Sensor Networks YOUSEF EMAMI yousef.emami@ieee.org Department of Computer Engineering and Information Technology-Shiraz University of Technology 1
  • 2. Agenda Agenda Rudiments Applications Challenges Algorithms Literature Review Conclusion Reference Department of Computer Engineering and Information Technology-Shiraz University of Technology 2
  • 3. IEEE Remote Sensing Society Data Fusion Technical Committee defines data fusion as below: The process of combining data provided by different instruments and source in order to improve the processing and interpretation of these data. Hall defines data fusion as below: A combination of data from multiple sensor to accomplish improved accuracy and more specific inferences that could achieved by the use of single sensor alone Department of Computer Engineering and Information Technology-Shiraz University of Technology 3 Rudiments Data Fusion UWSNs Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 4. Department of Computer Engineering and Information Technology-Shiraz University of Technology 4 Rudiments Data Fusion UWSNs Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n The relationship among Fusion Terms
  • 5. Department of Computer Engineering and Information Technology-Shiraz University of Technology 5 Rudiments Data Fusion UWSNs Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n Data Fusion in the Information-Processing Cycle
  • 6. Department of Computer Engineering and Information Technology-Shiraz University of Technology 6 Rudiments Data Fusion UWSNs Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n Data Mining in the Information-Processing Cycle
  • 7. Department of Computer Engineering and Information Technology-Shiraz University of Technology 7 Rudiments Data Fusion UWSNs Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n Classification Based on Relationship among Resources
  • 8. Department of Computer Engineering and Information Technology-Shiraz University of Technology 8 Rudiments Data Fusion UWSNs Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 9. The major challenges in the design of underwater sensor networks are as follows:  The available bandwidth is severely limited  Propagation delay under water is five orders of magnitude higher than that in RF terrestrial channels and extremely variable  High bit error rates and temporary losses of connectivity  Battery power is limited and usually batteries cannot be recharged; also, solar energy cannot be exploited. Department of Computer Engineering and Information Technology-Shiraz University of Technology 9 Rudiments Data Fusion UWSNs Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 10. Terrestrial Sensor Networks vs. Underwater Sensor Networks  Size and cost  Deployment  Power  Memory Department of Computer Engineering and Information Technology-Shiraz University of Technology 10 Rudiments Data Fusion UWSNs Applications Challenges Algorithms Methods Techniques Literature Review Reference Conclusio n
  • 11.  Robotics  Intelligent Transportation Systems Precision Agriculture  Security, Improving Intrusion Detection Data Privacy  Assessing and Monitoring Civil Infrastructures Environmental Monitoring  Fire Detection  Financial analysis  Fault diagnosis  Medical Diagnoses Department of Computer Engineering and Information Technology-Shiraz University of Technology 11 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 12.  Improving Barrier Coverage in Wireless Sensor Networks  Detect routing failures  Collect link statistics for routing protocols Department of Computer Engineering and Information Technology-Shiraz University of Technology 12 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 13.  Data imperfection Data provided by sensors is always affected by some level of impreciseness as well as uncertainty in the measurements.  Data modality Sensor networks may collect the qualitatively similar (homogeneous) or different (heterogeneous) data, Both cases must be handled by a data fusion scheme.  Outliers and spurious data Data fusion algorithms should be able to exploit the redundant data to alleviate such effects Department of Computer Engineering and Information Technology-Shiraz University of Technology 13 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 14.  Processing framework Data fusion processing can be performed in a centralized or decentralized manner.  Data dimensionality The measurement data could be preprocessed, either locally at each of the sensor nodes or globally at the fusion center to be compressed into lower dimensional data, assuming a certain level of compression loss is allowed  Data alignment/registration Sensor data must be transformed from each sensor’s local frame into a common frame before fusion occurs. Data registration is of critical importance to the successful deployment of fusion systems in practice. Department of Computer Engineering and Information Technology-Shiraz University of Technology 14 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 15. Inference  Bayesian  Dempster-Shafer  Fuzzy Logic  Neural Network Department of Computer Engineering and Information Technology-Shiraz University of Technology 15 Rudiments Applications Challenges Algorithms Methods Techniques Literature Review Reference Conclusio n
  • 16. Estimation  Least squares  Maximum likelihood  Moving average filter  Kalman filter  Particle filter Department of Computer Engineering and Information Technology-Shiraz University of Technology 16 Rudiments Applications Challenges Algorithms Methods Techniques Literature Review Reference Conclusio n
  • 17. Rough set based fusion  A mathematic method which analyses and treats vagueness and uncertainty, and offers an effective method to data fusion system.  It can analyze incomplete or inaccurate data to extract useful information.  Rough set theory is now mainly applied in decision making of distributed data fusion system. . Department of Computer Engineering and Information Technology-Shiraz University of Technology 17 Introduction Applications Challenges Algorithms Methods Techniques Literature Review Reference Conclusio n
  • 18. Data fusion in intelligent transportation systems: Progress and challenges – A survey by El Faouzi(2011) A variety of functions are assigned to ITS to address the traffic congestion and safety problems:  Automatic incident detection (AID)  Advanced driver assistance (ADAS)  Network control, crash analysis and prevention  Traffic demand estimation  Traffic forecast and monitoring  Accurate position estimation Each of these sub-systems can make use of different information sources. DF techniques can then be used to combine them to yield better results. Department of Computer Engineering and Information Technology-Shiraz University of Technology 18 Rudimentd Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 19. Energy efficient wireless sensor network communications based on computational intelligent data fusion for environmental monitoring by D.F.Larios(2012) Goal: Optimizing energy consumption in an environmental monitoring process Method: The data fusion is based on a local Self-Organized Map(SOM) Results: Enhancing network lifetime Department of Computer Engineering and Information Technology-Shiraz University of Technology 19 RudimentsApplications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 20. An approach to implement data fusion techniques in wireless sensor networks using genetic machine learning algorithms by Pinto(2014) Goal: Optimizing the communication efficiency in dense wireless sensor network Method: Genetic Algorithm Result: The proposed approach is able adjust the sending rate of a WSN Department of Computer Engineering and Information Technology-Shiraz University of Technology 20 RudimentsApplications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 21. A Power-Aware Framework for Distributed Data Fusion Application in Wireless Sensor Networks by Zongqing Lu(2011) Goal: Mapping distributed data fusion application into networks. Method: Fusion function placement and fusion function transfer maintenance. Result: PAFusion has better performances than DFuse and PAFusion has much less overhead and causes only slightly more transmission cost than optimal solution. Department of Computer Engineering and Information Technology-Shiraz University of Technology 21 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 22. Multisensor data fusion for underwater navigation by Majumder(2001) Goal: Integrating information from a number of sensors to navigate a sub-sea vehicle Method: Data Fusion Result: Successful Navigation Department of Computer Engineering and Information Technology-Shiraz University of Technology 22 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 23. Multi-sensor Data Fusion for Underwater Target Recognition Under Uncertainty by Tang Zheng(2010) Goal: Under Water Target Recognition Method: A dynamic information fusion framework which is based on discrete dynamic bayesian network (DDBN) for representing, integrating and inferring various target characteristics from dynamic sensory information of different modalities Result: The experimental results demonstrate the utility of the proposed method in efficiently modeling and inferring dynamic events. Department of Computer Engineering and Information Technology-Shiraz University of Technology 23 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 24. An Energy-Efficient Data Fusion Protocol for Wireless Sensor Network by Bin Zeng (2007) Goal: Proposing a data fusion protocol for gathering event data in sensor networks Results: LEECF not only optimizes the transmission and fusion energy costs, but also increases the fusion speed for sensor nodes. LEECF is completely distributed, requiring no control information from the sink after node level is set up at first, and the nodes do not require knowledge of the global network in order for LEECF to operate. Department of Computer Engineering and Information Technology-Shiraz University of Technology 24 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review ReferenceConclusio n
  • 25. Other applications: Data fusion for underwater target tracking by S. Koteswara Rao(2009) Data Fusion Method for Underwater Object Localization by Yun Lu (2013) Application of the Multi-sensor Fusion Method for Underwater Landscape Modeling By Noel(2014) Department of Computer Engineering and Information Technology-Shiraz University of Technology 25 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n
  • 26. To minimize energy consumption of Underwater wireless sensor networks ,Data fusion techniques are good candidate and can prolong lifetime of UWSNs. Department of Computer Engineering and Information Technology-Shiraz University of Technology 26 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review ReferenceConclusion
  • 27. THANK YOU FOR YOUR KIND ATTENTION Department of Computer Engineering and Information Technology-Shiraz University of Technology 27 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review ReferenceConclusio n Problem Statemen t
  • 28. 1. Lawrence A. Klein, “Sensor and Data Fusion” ,SPIE Press,2010 2. Ahmed Abdelgawad,Magdy Baypumi ,” Resource-Aware Data Fusion Algorithms for Wireless Sensor Networks”, Springer Publication, 2012 3. Martin E. Liggins ,David L. Hall,James Llinas,”Handbook of Multisensor Data Fusion”,CRC Press,2009 4. E. F. Nakamura, et al., "Information fusion for wireless sensor networks: Methods, models, and classifications," ACM Comput. Surv., vol. 39, p. 9, 2007. 5. Ian F. Akyildiz, Mehmet Can Vuran, “Wireless Sensor Networks”, John Wiley & Sons,2010 6. B. Khaleghi, et al., "Multisensor data fusion: A review of the state-of-the-art," Information Fusion, vol. 14, pp. 28-44, 2013. 7. N.-E. E. Faouzi, et al., "Data fusion in intelligent transportation systems: Progress and challenges – A survey," Information Fusion, vol. 12, pp. 4-10, 2011. 8. B. J. Larios D.F, Rodríguez G, "Energy efficient wireless sensor network communications based on computational intelligent data fusion for environmental monitoring," Communication, vol. 6, pp. 2189-2197, 2012. 9 A.R.Pinto,et al.,” An approach to implement data fusion techniques in wireless sensor networks using genetic machine learning algorithms”, Information Fusion,vol.15,pp.90-101,2014 10. S. Koteswara Rao, K.S. Linga Murthy, K. Raja Rajeswari.” Data fusion for underwater target tracking “,vol.4,pp.576-585,2010 Department of Computer Engineering and Information Technology-Shiraz University of Technology 28 Rudiments Applications Challenges Algorithms Methods Technique s Literature Review Reference Conclusio n