Balamurali B. T. Nair, Esam A. S. Alzqhoul, B. Guillemin
{"title":"Impact of Frame Loss Aspects of Mobile Phone Networks on Forensic Voice Comparison","authors":"Balamurali B. T. Nair, Esam A. S. Alzqhoul, B. Guillemin","doi":"10.4172/2090-4886.1000131","DOIUrl":"https://doi.org/10.4172/2090-4886.1000131","url":null,"abstract":"The analysis of mobile phone speech recordings can play an important role in criminal trials. However it may be erroneously assumed that all mobile phone technologies, such as the Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA), are similar in their potential impact on the speech signal. In fact these technologies differ significantly in their design and internal operation. This study investigates the impact of an important aspect of these networks, namely Frame Loss (FL), on the results of a forensic voice comparison undertaken using a Bayesian likelihood ratio framework. For both networks, whenever a frame is lost or irrecoverably corrupted, it is synthetically replaced at the receiving end using a history of past good speech frames. Sophisticated mechanisms have been put in place to minimize any resulting artefacts in the recovered speech. In terms of accuracy, FL with GSMcoded speech is shown to worsen same-speaker comparisons, but improve different-speaker comparisons. In terms of precision, FL negatively impacts both sets of comparisons. With CDMA-coded speech, FL is shown to negatively impact the accuracy of both same- and different-speaker comparisons. However, surprisingly, FL is shown to improve the precision of both sets.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic Approach to Scheduling Divisible Load on Network ofProcessors","authors":"Manar Arafat, S. Bataineh, Issa M. Khalil","doi":"10.4172/2090-4886.1000130","DOIUrl":"https://doi.org/10.4172/2090-4886.1000130","url":null,"abstract":"Divisible Load Theory (DLT) is a very efficient tool to schedule arbitrarily divisible load on a set of network processors. Most of previous work using DLT assumes that the processors' speeds and links' speeds are time- invariant. Closed form solution was derived for the system under the assumption that the processors' speed s and the links' speeds stay the same during the task execution time. This assumption is not practical as most of distributed systems used today have an autonomous control. In this paper we consider a distributed system (Grid) where the availability of the processors varies and follows a certain distribution function. A closed form solution for the finish time is derived. The solution considers all system parameters such as links' speed, number of processors, number of resources (sites), and availability of the processors and how much of power they can contribute. The result is shown and it measures the variation of execution time against the availability of processors.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ghomeishi, G. Mahdiraji, P. Jahanshahi, F. Adikan, D. Bradley
{"title":"Study of Traps in Special Doped Optical Fiber Radiation Sensors via GlowCurve Analysis","authors":"M. Ghomeishi, G. Mahdiraji, P. Jahanshahi, F. Adikan, D. Bradley","doi":"10.4172/2090-4886.1000128","DOIUrl":"https://doi.org/10.4172/2090-4886.1000128","url":null,"abstract":"Thermoluminescence dosimeters (TLDs) are widely used, serving the needs of various radiation applications. In recent times optical fibers have been introduced as alternatives to more conventional phosphor-based TLD systems, with many efforts being carried out to improve their thermoluminescence (TL) yield. While there have been extensive studies of many of the various TLD characteristics of optical fibers, including TL response, linearity, reproducibility, repeatability, sensitivity and fading, far more limited studies have concerned dependence on the type of TL activator used in optical fibers, promoting the TL mechanism. Present study focuses on TLD glow curves analysis for five different doped optical fibers that have been subjected to photon and electron irradiation. Trap parameters such as activation energy and frequency factors have been obtained from second order kinetics analysis, based on computerized glow curve deconvolution. An interesting observation is that co-doped fibers typically leads to enhanced TL characteristics, pointing to a need for optimization of the choice and levels in use of co-dopants.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000128","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimating Node Density for Redundant Sensors in Wireless SensorNetwork","authors":"Dhruvi Sharma, K. Kavitha, R. Gururaj","doi":"10.4172/2090-4886.1000127","DOIUrl":"https://doi.org/10.4172/2090-4886.1000127","url":null,"abstract":"The lifetime of a sensor network depends on the judicious utilization of the resource-constrained nodes. Practices like data aggregation, sleep scheduling play a major role in conserving the node’s energy. But in most cases, we observe a disparity in energy consumption rates among different sensors. This disparity results from higher utilization of a small set of deployed sensors in the field leaving these sensors drained out of power. To overcome this problem, it is often required to deploy redundant sensors to act as replacements for a faulty node. Secondly, the sensor network technology, being an application oriented technology, experiences variance in network parameters from application to application because of the various dynamics in nature. It is not often viable to go for a theoretically determined sensor distribution technique. Thus, it is often required to place sensors by studying the geographical constraints. These have proven to be highly valuable in designing energy efficient routing schemes anThe lifetime of a sensor network depends on the judicious utilization of the resource-constrained nodes. Practices like data aggregation, sleep scheduling play a major role in conserving the node’s energy. But in most cases, we observe a disparity in energy consumption rates among different sensors. This disparity results from higher utilization of a small set of deployed sensors in the field leaving these sensors drained out of power. To overcome this problem, it is often required to deploy redundant sensors to act as replacements for a faulty node. Secondly, the sensor network technology, being an application oriented technology, experiences variance in network parameters from application to application because of the various dynamics in nature. It is not often viable to go for a theoretically determined sensor distribution technique. Thus, it is often required to place sensors by studying the geographical constraints. These have proven to be highly valuable in designing energy efficient routing schemes and network topologies for sensor networks. In this paper we propose a scheme to decide how the distribution of available redundant sensor nodes should take place around sensor nodes. The scheme gives the flexibility to determine sensor positions based on application and geographical constraints. We propose to use the probability estimates of the utilization of a sensor in a given deployment to achieve desired network lifetimes. We also show how in some cases we can leverage the relative position from source(s) and sink be used for the same.d network topologies for sensor networks. In this paper we propose a scheme to decide how the distribution of available redundant sensor nodes should take place around sensor nodes. The scheme gives the flexibility to determine sensor positions based on application and geographical constraints. We propose to use the probability estimates of the utilization of a sensor in a given deployment to achieve desir","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000127","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trace Gas Sensor Based on Quartz-Enhanced Photo Acoustic Spectroscopy","authors":"Yufei Ma","doi":"10.4172/2090-4886.1000E106","DOIUrl":"https://doi.org/10.4172/2090-4886.1000E106","url":null,"abstract":"Photo acoustic spectroscopy (PAS) is a widely used method for trace gas sensing. It is based on photo acoustic effect which was discovered by Bell in 1880’s. When the laser power is absorbed by the medium, the absorbed energy can be transformed into heat energy by non-radiative processes. If the laser is modulated, the heat and the pressure wave generated by the heat will also be modulated. This process will produce acoustic wave. Microphone based PAS detection is employed for many years for gas sensing.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000E106","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70966511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending the Functionality of Pymote: Low Level Protocols and Simulation Result Analysis","authors":"F. Shahzad","doi":"10.4172/2090-4886.1000125","DOIUrl":"https://doi.org/10.4172/2090-4886.1000125","url":null,"abstract":"Wireless sensor networks (WSNs) are utilized in various applications and are providing the backbone for the new pervasive Internet, or Internet of Things. The development of a reliable and robust large-scale WSN system requires that the design concepts are checked and optimized before they are implemented and tested for a specific hardware platform. Simulation provides a cost effective and feasible method of examining the correctness and scalability of the system before deployment. In this work, we study the performance of Pymote, a high level Python library for event based simulation of distributed algorithms in wireless ad-hoc networks. We extended the Pymote framework allowing it to simulate packet level performance. The extension includes radio propagation, energy consumption, mobility and other models. The extended framework also provides interactive plotting, data collection and logging facilities for improved analysis and evaluation of the simulated system.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000125","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSNs: From dummy sensing to everywhere","authors":"R. Ramadan","doi":"10.4172/2090-4886.C1.003","DOIUrl":"https://doi.org/10.4172/2090-4886.C1.003","url":null,"abstract":"W the rapid development in Internet technology and convergence in communications, the overall quality of ubiquitous communication has improved significantly. IPv6-based next-generation wireless mobile communications will need an effective mobility management protocol to support ubiquitous network access by providing seamless handover. This is especially true with invention of portable mobile devices that can be connected almost anywhere at any time. However, the recent explosion in the usage of mobile devices has also generated several issues in terms of performance and quality of service. With the ever increasing number of mobile user, mobile users demand high quality performance, best quality of services and seamless connections that support real-time application which are audio and video streaming. Seamless is referred to users that are free to roam around different networks and at the same time stay connected without any disturbance to the ongoing session during the process of handover from one network to another. The handover process between these networks spawns long delay or latency, high packet loss, and fewer throughputs which may degrade the performance of real-time applications during the handover process. Therefore, the challenging issues of wireless network in real-time application are seamless connection and data packet load. These will be the focus of this presentation. This presentation will provide a methodology assessment of seamless connection and diminution of data packet load.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70967163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Health risks of wireless communication: What do we know, what can we do now, and what should we find out?","authors":"D. Davis","doi":"10.4172/2090-4886.C1.001","DOIUrl":"https://doi.org/10.4172/2090-4886.C1.001","url":null,"abstract":"The integration of physical systems with networked sensing, computation networks, and embedded control with actuation has led to the emergence of a new generation of engineered systems, the Cyber-Physical Systems (CPS). Such systems emphasize the link between cyber space and physical environment (i.e., time, space, and energy). CPS represents the next generation of complex engineering systems. They are large scale dynamic systems that offer significant processing power while interacting across communication networks.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70966590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel cache-mediator with wireless routers for multicore systems to achieve energy-efficient scalable performance","authors":"Abu Asaduzzaman","doi":"10.4172/2090-4886.C1.002","DOIUrl":"https://doi.org/10.4172/2090-4886.C1.002","url":null,"abstract":"","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70966754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ching-Kun Chen, Chun-Liang Lin, Shyan-Lung Lin, C. Chiang
{"title":"Data Encryption and Transmission Based on Personal ECG Signals","authors":"Ching-Kun Chen, Chun-Liang Lin, Shyan-Lung Lin, C. Chiang","doi":"10.4172/2090-4886.1000124","DOIUrl":"https://doi.org/10.4172/2090-4886.1000124","url":null,"abstract":"ECG signal vary from person to person, making it difficult to be imitated and duplicated. Biometric identification based on ECG is therefore a useful application based on this feature. Synchronization of chaotic systems provides a rich mechanism which is noise-like and virtually impossible to guess or predict. This study intends to combine our previously proposed information encryption/decryption system with chaotic synchronization circuits to create private key masking. To implement the proposed secure communication system, a pair of Lorenz-based synchronized circuits is developed by using operational amplifiers, resistors, capacitors and multipliers. The verification presented involves numerical simulation and hardware implementation to demonstrate feasibility of the proposed method. High quality randomness in ECG signals results in a widely expanded key space, making it an ideal key generator for personalized data encryption. The experiments demonstrate the use of this approach in encrypting texts and images via secure communications.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000124","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}