{"title":"An Energy Model of the Ultra-Low-Power Transceiver nRF24L01 for Wireless Body Sensor Networks","authors":"A. Weder","doi":"10.1109/CICSyN.2010.24","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.24","url":null,"abstract":"In the recent years, Wireless Body Sensor Networks (WBSNs) attracted much attention in the research community. The key to success for WBSNs is the utilization of highly efficient transceivers and the application of intelligent policies to handle the limited (energy) resources. Simulations are a frequently used tool to evaluate different policies and analyze the performance of wireless networks in different configurations. The nRF24L01 is an ultra-low-power transceiver for the 2.4 GHz frequency band which is very well suited to build simple but efficient WBSNs. This work presents a detailed simulation model of the nRF24L01 for MiXiM, a simulation framework for wireless networks. The implementation is focused on tracking the transceiver’s energy consumption in operation. The presented simulation model is a valuable tool for network designers and implementers when working with the nRF24L01.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121056400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Implementation of Cellular Automata on Systolic Array","authors":"A. Yarahmadi, S. Setayeshi","doi":"10.1109/CICSyN.2010.54","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.54","url":null,"abstract":"Cellular Automata is one of the ways of performing computations which necessitates extremely the processing of data at high speeds. Implementing cellular automata on serial bases does not provide the required speed. So in this article the implementation of cellular automata on systolic base has been studied and the speed of performance in this method has been compared with that of the serial method. Conventional processors can’t process this enormous amount of data in a short period of time, so a new approach is required to improve computational complexity. Systolic array is a kind of parallel processing approaches which can increase the processing speed. Because processors of systolic set can work simultaneously and have its own local memory, they can improve the processing speed by limiting the number of external memory access in order to execute each of their instructions.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121307961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. El-Medany, Alauddin Alomary, Reyadh Al-Hakim, S. Al-Irhayim, Mustafa Nousif
{"title":"Implementation of GPRS-Based Positioning System Using PIC Microcontroller","authors":"W. El-Medany, Alauddin Alomary, Reyadh Al-Hakim, S. Al-Irhayim, Mustafa Nousif","doi":"10.1109/CICSyN.2010.76","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.76","url":null,"abstract":"This paper presents a hardware design and implementation of GPRS based positioning system using PIC microcontroller. The system is implemented using themicrochip PIC 16F877A microcontroller. The system has beentested on a test board, and then a PCB (Printed Circuit Board) layout has been implemented for the final system prototype. The system provides the ability to track current position of the vehicle or its position in any specific time and date by analyzing the received data from the GPS receiver. The prototype has been tested experimentally and the results are analyzed and discussed.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124706418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Password Renewal Enhancement for Dynamic Authentication in Wireless Sensor Networks","authors":"Farzad Kiani, G. Dalkılıç","doi":"10.1109/CICSYN.2010.26","DOIUrl":"https://doi.org/10.1109/CICSYN.2010.26","url":null,"abstract":"Security approaches in wireless sensor networks due to limitation of energy and resource are different from traditional protocols in current networks. So, many security problems exist such as authentication, integrity, digital signature and etc., and there has been relatively little research suited for wireless sensor networks. We proposed an enhanced version of scheme on dynamically clustering in wireless sensor network protocol. In comparison with the previous scheme, our proposed scheme possesses many advantages, including resistance to the replay and forgery attacks, reduction of user’s password leakage risk, capability of renewing password, and better efficiency.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126916031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Ahmad, N. Isa, Z. Hussain, R. Boudville, M. K. Osman
{"title":"Genetic Algorithm-Artificial Neural Network (GA-ANN) Hybrid Intelligence for Cancer Diagnosis","authors":"F. Ahmad, N. Isa, Z. Hussain, R. Boudville, M. K. Osman","doi":"10.1109/CICSyN.2010.46","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.46","url":null,"abstract":"Artificial Neural Network (ANN) is one of the most promising biological inspired computational intelligence techniques. However designing an ANN is a difficult task as it requires setting of ANN structure and tuning of some complex parameter. On the other hand, Genetic Algorithm (GA) as a global search technique is useful for complex optimization problem where the numbers of parameters are large and difficult to obtain. In this paper GA has been used to simultaneously select significant features as input to ANN and automatically determine the optimal number of hidden node. Meanwhile the ANN training is done by Levenberg Marquardt (LM) algorithm. A new procedure in obtaining optimal ANN architecture is also described which based on feature importance determine by Genetic Algorithm. Simulation results on cancer dataset proved that the proposed method has achieved the highest 97% average percentage of correct classification with the absent of 2nd and 5th feature.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"2 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114062229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EF-AQM: Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks","authors":"R. Alasem, H. Abu-Mansour","doi":"10.1109/CICSyN.2010.19","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.19","url":null,"abstract":"Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133989553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum Matching in a Partially Matched Bipartite Graph and Its Applications","authors":"S. Krishnaswamy","doi":"10.1109/CICSyN.2010.18","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.18","url":null,"abstract":"This paper discusses an approach to solve the maximum matching problem in Bipartite graph (B-graph) where the graph is partially matched and the existing matches cannot be changed. It uses the approach of choosing vertices for matching based on the run-time weight calculation. Vertex with highest weight is given preference for matching. Weights are assigned to vertices based on its number of matched, pass-through and un-matched edges. Matching is done by choosing vertices with highest weight from both disjoint set of vertices and continuing to form an Alternative path (A-path). This approach leads to finding and traversing through maximum number of A-paths (with no shared vertex) and making maximum matching in each of those A-paths. This condition will result in a B-graph which will have the maximum possible matching. 2N-Soft-fail Sector Redundancy for Access Points is one of the applications explained in this paper.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Micro SOA Model for Managing and Integrating Wireless Sensor Network into IP-Based Networks","authors":"A. Sleman, Reinhard Möller","doi":"10.1109/CICSyN.2010.22","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.22","url":null,"abstract":"Wireless sensor networks (WSNs) have many applications in home and industrial automation, and the management and integration of WSNs into Internet and IP-based networks is still getting tremendous interesting. This paper presents a micro SOA-model as part of a 4-layered, SOA-based architecture targeting resource-constrained devices with 48 KB of ROM and 10 KB of RAM. The key idea in this model is trying to implement SOA concepts using WSN protocols instead of trying to port the SOA protocols from IT-business world. Our micro model is based on the mIP protocol and it uses the HTTP philosophy instead of the HTTP protocol itself. The middleware layer in our architecture manages the simultaneous access to the WSN and filters the verbose information in a HTTP request to the WSN. It also manages the events and the service description of all devices in the network as well as it provides many other tasks like DNS, firewall, security, and authorization. Furthermore the paper presents a new idea for compressing XML and JSON messages based on a new concept of exchanging a common vocabulary between the networked embedded devices. Our results show that using JSON format instead of XML, or applying our zipping algorithm on them has many advantages in terms of network overhead and power consumption.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114634554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Mining Techniques for Modelling Seasonal Climate Effects on Grapevine Yield and Wine Quality","authors":"S. Shanmuganathan, P. Sallis, A. Narayanan","doi":"10.1109/CICSyN.2010.16","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.16","url":null,"abstract":"The paper describes ongoing research in data mining techniques investigated for modelling seasonal climate effects on grapevine phenology that determines the ratio of grape berry composition that in turn determines the fineness of wine vintage in addition to winemaker experience and talent. A brief introduction to the literature in this problem domain is followed by a discussion on conventional statistical data analysis methods that looks at the problems in using these methods with only a decade old data, often considered as incomplete in sequence. Data relating to vineyard yield with its coincident seasonal climate change is used in this study to model seasonal climate effects at micro scales i.e., vineyard, using data mining techniques, decision trees and statistical methods. The initial results show potential for predicting future grapevine yield using vineyard data for more specific scenario building than is possible now, using macro climate data.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129591196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology Driven Approach Enhancing Business Services Orchestration","authors":"Asta Krupaviciute, J. Fayn","doi":"10.1109/CICSyN.2010.33","DOIUrl":"https://doi.org/10.1109/CICSyN.2010.33","url":null,"abstract":"As knowledge is usually heterogeneous, voluminous, poorly structured and steadily evolving, its automated use in practice is extremely difficult. These limitations remain the main blocking element for creating advanced, adaptive business processes providing intelligent assistance. In this paper we propose to extend the typical business process development view, mainly focusing on services composition, with a business intelligence view which aims to support the design of complex, automatically reconfigurable services. To fulfil this objective, we designed an approach that consists in setting up an intelligent environment based on a context-aware concepts ontology of business processes and on related context handling rules for services orchestration. It’s a generic method that enables to capture and to granulate the knowledge into a set of models that support dynamic business processes management. We demonstrate the relevance of this approach for the design of automatic and personalised decision support services orchestration based on a core ontology.","PeriodicalId":358023,"journal":{"name":"2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130202881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}