{"title":"An efficient network selection algorithms in next-generation heterogeneous wireless networks","authors":"H. Bhute, P. Karde, V. Thakare","doi":"10.1504/IJIM.2017.10006303","DOIUrl":"https://doi.org/10.1504/IJIM.2017.10006303","url":null,"abstract":"In the next-generation heterogeneous wireless networks, it is obligatory to consider the integration of various networks for providing the seamless connectivity to the mobile node roaming. While providing the seamless connectivity, a suitable network to choose from the given set of networks is the crucial issue. During vertical handoff, it is required to select the best network not only according to user preference but also the application, network and terminal contexts. The network selection algorithm plays a very important role in ensuring quality of service and seamless connectivity in such networks. Network selection in heterogeneous wireless networks has been widely studied by using various mathematical models, in which multiple attribute decision-making is one of the most popular models. This paper surveys the different network selection techniques available in the literature and explains a method for network selection which takes into consideration of multiple decision-making criteria for selecting the optimal network.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kumar, V. D. A. Kumar, M. Ramakrishnan, S. Malathi, A. Govardhan
{"title":"Efficient routing for low rate wireless network - a novel approach","authors":"V. Kumar, V. D. A. Kumar, M. Ramakrishnan, S. Malathi, A. Govardhan","doi":"10.1504/IJIM.2017.10006299","DOIUrl":"https://doi.org/10.1504/IJIM.2017.10006299","url":null,"abstract":"In recent years, Wireless device networks have achieved associate degree attention on a world level. This comprises small sensors with restricted power and restricted resources. The applicability of wireless sensor networks (WSNs) in various fields such as medical research and civilian applications is proliferating enormously. Every routing protocol designed for WSNs should be energy-efficient, reliable and prolong the network lifetime. Due to the resources and energy constraints in WSNs, routing can be considered as a matter of contention in networks. This research proposes a beacon-enabled least-time and energy-efficient routing protocol with single-level data-aggregation using an IEEE 802.15.4. Considering the low complexness and low power consumption it is appropriate for low-rate wireless personal area networks as WSNs. On comparison of the proposed protocol with the popular ad hoc and other WSN routing protocols, the results show that the proposed protocol outperforms the routing protocols in the literature in terms of latency, throughput, and average energy consumption.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129240442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on spectrum sensing schemes for cognitive radio networks","authors":"T. Perarasi, G. Nagarajan","doi":"10.1504/IJIM.2017.10006298","DOIUrl":"https://doi.org/10.1504/IJIM.2017.10006298","url":null,"abstract":"Spectrum is a significant resource in RF environment, and is an essential function of cognitive radio to prevent harmful interference pertaining to the primary users. Spectrum sensing identifies the unutilised spectrum in order to improve the spectrum utilisation. Cooperative spectrum sensing is a technique which incorporates multiple secondary users. It paves a way in analysing the primary user information to achieve exact detection performance. In this paper, soften hard decision fusion mechanism is used to solve the sensing failure as it provides fine sensing and increases the detection probability with trade-off between probability of detection and complexity. Binary hypothesis testing rule is applied to verify the sensing concept. Censoring policy can be chosen in the case of good signal-to-noise ratio which provides energy-efficient sensing scheme. Results conclude that soften hard decision performs better than the other types of sensing schemes. Receiver operating characteristics are analysed.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic salt generation for mobile data security using elliptic curves against precomputation attacks","authors":"Bh. Padma, G. R. Kumar","doi":"10.1504/IJIM.2017.10006243","DOIUrl":"https://doi.org/10.1504/IJIM.2017.10006243","url":null,"abstract":"Pattern lock is a mechanism that most of the people set to their Android smart phones. As the built-in pattern lock system adds an extra layer of protection and is one of the innovative unlock methods supported by Android, a fair quantity of study has been done about its (in)security. Pattern locks are not difficult to crack and are vulnerable to precomputation attacks such as brute forcing, dictionaries and rainbow tables. Older versions of Android produce SHA-1 signatures for authentication process which are not salted hashes. However, the newer versions of Android pattern locks utilise scrypt hash function that generates random salt value which needs to be stored in the database to withstand such attacks. But for pattern passwords attaching a salt value is still found not to be enough and susceptible to brute force. This research, therefore, proposes a method where it helps to produce and append a salt value to a password dynamically by representing the pattern using points of an elliptic curve. After the implementation and analysis, the results show this method exhibits strict avalanche criterion and passwords will become more tolerant to brute forcing, and other precomputation attacks which makes it more difficult to compromise.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127071535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Whispered Speech Recognition for Mobile-Based Voice Authentication System","authors":"Seung-eun Ji, Wooil Kim","doi":"10.21742/IJISSE.2017.1.1.03","DOIUrl":"https://doi.org/10.21742/IJISSE.2017.1.1.03","url":null,"abstract":"This paper proposes asystem architecture for convenient and accurate voice authentication by incorporating mobile phone voice input and a One Time Password (OTP) to the voice authentication algorithm. Voice authentication has the advantage of enabling remote applications using existing infrastructure, but one of the hurdles in using voice authentication method has been its low accuracy. The users may prefer using whisper when providing their personal information for voice authentication over the mobile system in public circumstances. The experimental results show that the speech recognition performance over whispered speech for voice authentication system was improved by employing high-pass filter and acoustic model adaptation algorithm.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124725668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Duan, Libin Guo, Zhihang Zhang, Fenglong Yao, Longwen Li
{"title":"Research on Using the Gaussian Curvature of the Peaks Measuring aLaser Microprocessing Surface","authors":"Y. Duan, Libin Guo, Zhihang Zhang, Fenglong Yao, Longwen Li","doi":"10.21742/IJISSE.2017.1.1.06","DOIUrl":"https://doi.org/10.21742/IJISSE.2017.1.1.06","url":null,"abstract":"The measurement of the microprocessing surface is attracting more and more attention. By analyzing typical precision machining technology, it studies the Gaussian curvatures of the peaks to measure a laser microprocessing surface. Laser microprocessing surface as one typical microprocessing technology, it shows the the surface consists of one hyperboloid of two sheets with many connected peaks on the saddle surface and a negative Gaussian curvature. In addition, the number of convex peaks increases, which leads to the Gaussian curvature decreasing. Finally, it shows that the characterization accuracy is high using the Gaussian curvature, which can characterize the texture and flatness and the topography of the surface’s convex peaks. It completely satisfies the requirements for high precision of the measurement of microprocessing surface quality.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Integrated Visualization Tool for Differentially Expressed Genes and Gene Ontology Analysis","authors":"Somyung Oh, Junghyeon Ha, Kyungwon Lee, Sejong Oh","doi":"10.21742/IJISSE.2017.1.1.01","DOIUrl":"https://doi.org/10.21742/IJISSE.2017.1.1.01","url":null,"abstract":"To study biological significance, biologists deal with differentially expressed genes and corresponding gene ontology data. For more intuitive research, biologists visualize them with heatmap and gene ontology graph, respectively. We propose a tool that integrates these two visualization and enables them to have interaction. By integrating two independent visualization, we expect to get more insight in biological analysis trough the proposed tool.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121512830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kim Yong Guk, Kwang Myung Jeon, YoungShin Kim, Chang-Ho Choi, H. Kim
{"title":"Underwater Acoustic Sensor Array Signal Lossless Compression Based on Valid Channel Decision Approach","authors":"Kim Yong Guk, Kwang Myung Jeon, YoungShin Kim, Chang-Ho Choi, H. Kim","doi":"10.21742/IJISSE.2017.1.1.04","DOIUrl":"https://doi.org/10.21742/IJISSE.2017.1.1.04","url":null,"abstract":"A lossless compression method for underwater acoustic sensor array signals is proposed here. The proposed method consists of a valid channel decision and MPEG-4 ALS. The valid channel decision is based on Root-Mean-Square Crossing-Rate (RMSCR)-based sensor fault detection for excluding faulty sensor signals from the encoding process. After the decision process, multi-channel sensor signals are encoded losslessly using the MPEG-4 ALS encoder. For performance evaluation of the proposed method, we measure the precision of detecting faulty sensor and compression ratio. Findings show that the fault detection of proposed method works correctly, and compression ratio increases by 0.5% compared to the MPEG-4 ALS reference software in faulty sensor signal send mode, and by 3.05% in non-send mode.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech Enhancement Based on Feature Reconstruction for Automatic Speech Recognition System with Unknown Structure","authors":"Wooil Kim","doi":"10.21742/IJISSE.2017.1.1.02","DOIUrl":"https://doi.org/10.21742/IJISSE.2017.1.1.02","url":null,"abstract":"This study proposes a speech enhancement method which can be applied as a front-end to an automatic speech recognition system with an unknown structure. In this paper, a speech enhancement method is proposed, which is based on a feature reconstruction method employing variational model composition. In the proposed scheme, a gain parameter is estimated from the reconstructed speech feature and it is used for speech enhancement. The experimental results show that the proposed speech method significantly outperforms the existing front-end algorithms for unknown speech recognition over various background noise conditions. The results demonstrate that the proposed method can be effectively employed for an unknown ASR system to improve speech recognition performance, where no knowledge of the ASR system is available including the feature type and acoustic model.","PeriodicalId":433219,"journal":{"name":"The International Journal on the Image","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123311581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}