65 research outputs found
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you
can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military
applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on
these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the
network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectivel
Prospects and problems of cognitive radio network architectures in wireless sensor networks
Cognitive radio is a technique proposed by Mitola which provides a way to efficiently use precious radio spectrum resources [1, 2]. A cognitive radio recognizes, analyzes, and learns the situations of the radio spectrum and then employs various strategies to maximize spectrum usage.
The concept of cognitive radio is to detect and ascertain \vhich aspect of the spectrum is presently unused, and then perform data transmission at the newly discovered frequency band. An alternative cognitive radio scheme is to transmit signals on top of existing transmissions as long as the
interference temperature measure is lower than threshold. Spectrum sharing, spectrum sensing, and spectrum management are the stages of a cognitive radio. Spectrum sensing gathers up-to-date spectrum usage data, spectrum management determines the optimal spectrum access timing and scheme, and spectrum sharing ensures that users are served in a fair and timely mann
Towards Enhancing Keyframe Extraction Strategy for Summarizing Surveillance Video: An Implementation Study
The large amounts of surveillance video data are recorded, containing many redundant video frames, which makes video browsing and retrieval difficult, thus increasing bandwidth utilization, storage capacity, and time consumed. To ensure the reduction in bandwidth utilization and storage capacity to the barest minimum, keyframe extraction strategies have been developed. These strategies are implemented to extract unique keyframes whilst removing redundancies. Despite the achieved improvement in keyframe extraction processes, there still exist a significant number of redundant frames in summarized videos. With a view to addressing this issue, the current paper proposes an enhanced keyframe extraction strategy using k-means clustering and a statistical approach. Surveillance footage, movie clips, advertisements, and sports videos from a benchmark database as well as Compeng IP surveillance videos were used to evaluate the performance of the proposed method. In terms of compression ratio, the results showed that the proposed scheme outperformed existing schemes by 2.82%. This implies that the proposed scheme further removed redundant frames whiles retaining video quality. In terms of video playtime, there was an average reduction of 27.32%, thus making video content retrieval less cumbersome when compared with existing schemes. Implementation was done using MATLAB R2020b
Towards Enhancing Keyframe Extraction Strategy for Summarizing Surveillance Video: An Implementation Study
The large amounts of surveillance video data are recorded, containing many redundant video frames, which makes video browsing and retrieval difficult, thus increasing bandwidth utilization, storage capacity, and time consumed. To ensure the reduction in bandwidth utilization and storage capacity to the barest minimum, keyframe extraction strategies have been developed. These strategies are implemented to extract unique keyframes whilst removing redundancies. Despite the achieved improvement in keyframe extraction processes, there still exist a significant number of redundant frames in summarized videos. With a view to addressing this issue, the current paper proposes an enhanced keyframe extraction strategy using k-means clustering and a statistical approach. Surveillance footage, movie clips, advertisements, and sports videos from a benchmark database as well as Compeng IP surveillance videos were used to evaluate the performance of the proposed method. In terms of compression ratio, the results showed that the proposed scheme outperformed existing schemes by 2.82%. This implies that the proposed scheme further removed redundant frames whiles retaining video quality. In terms of video playtime, there was an average reduction of 27.32%, thus making video content retrieval less cumbersome when compared with existing schemes. Implementation was done using MATLAB R2020b
Development of Hybrid Automatic Segmentation Technique of a Single Leaf from Overlapping Leaves Image
The segmentation of a single leaf from an image with overlapping leaves is an important step towards the realization of effective precision agricultural systems. A popular approach used for this segmentation task is the hybridization of the Chan-Vese model and the Sobel operator CV-SO. This hybridized approach is popular because of its simplicity and effectiveness in segmenting a single leaf of interest from a complex background of overlapping leaves. However, the manual threshold and parameter tuning procedure of the CV-SO algorithm often degrades its detection performance. In this paper, we address this problem by introducing a dynamic iterative model to determine the optimal parameters for the CV-SO algorithm, which we dubbed the Dynamic CV-SO (DCV-SO) algorithm. This is a new hybrid automatic segmentation technique that attempts to improve the detection performance of the original hybrid CV-SO algorithm by reducing its mean error rate. The results obtained via simulation indicate that the proposed method yielded a 1.23% reduction in the mean error rate against the original CV-SO method
Practical applications and design challenges of wireless heterogeneous sensor networks
Heterogeneous, {hetero + genos 'type', from Greek), is defined in Oxford Advanced Learner's Dictionary as "consisting of many different kinds of people or things" and defined in Longman Dictionary as "consisting of parts or members that are very different from each other."
The design of interconnected nodes may be heterogeneous or homogeneous with the aim of catering for the design demands and purpose of various wireless applications. The heterogeneity or homogeneity of the interconnected nodes designed is with respect to their ability to sense events, transmit desired sensed data, computing and processing user queries, managing of energy resources and minimizing the complexity of the hardware design. The participating nodes in heterogeneous networks may be different in many aspects. They could have ditferent transmission radius, various kind of sensing units, different hardware power, and dit1erent power supply. Nodes with lesser energy resources serve as sensing nodes to collect physical information while nodes with more energy resources serve as data sinks.
Heterogeneity could be viewed either in terms of capability or functionality of sensor nodes. In homogeneous networks, all the participating and active nodes are alike in nature and the same transmit power level is used for their operation. These alike nodes are inherently built
with the same sensing units to track a single event [5, 9, 10]. Cluster heads and cluster members have different tasks in clustered sensor networks in the course of data delivering to the base station. An example is a tiered sensor network architecture where 802.11 mesh network comprise of high-end nodes, such as Intel XScale nodes which are deployed on a plain WSN fiel
Droneโs node placement algorithm with routing protocols to enhance surveillance
Flying ad-hoc network (FANET) is characterized by key component features such as communication scheme, energy awareness, and task distribution. In this research, a surveillance space considering standard petroleum pipe was created with three drones viz: drone 1 (D1), master drone (DM), and drone 2 (D2) to survey as FANET. DM aggregate packets from D1, D2 and communicate with the static ground control station (SGCS). The starting point of the three drones and their trajectories during deployment were calculated and simulated. Selection of DM, D1, and D2 was done using battery level before take-off. Simulation results show take-off time difference which depends on the distance of each drone to the SGCS during deployment. D1 take-off first, while DM and D2 followed after 0.0704 and 0.1314 ms respectively. The position-oriented routing protocols results indicated variation of information flow within time notch due to variation in the density of the transmitted packets. Packets delivery periods are 0.00136ร103 sec, 0.00110ร103 sec, and 0.00246ร103 sec for time notch 1, 2, and aggregating time notch respectively. From the results obtained, two algorithms were used successfully in deploying the drone
- โฆ