8,488 research outputs found
MODLEACH: A Variant of LEACH for WSNs
Wireless sensor networks are appearing as an emerging need for mankind.
Though, Such networks are still in research phase however, they have high
potential to be applied in almost every field of life. Lots of research is done
and a lot more is awaiting to be standardized. In this work, cluster based
routing in wireless sensor networks is studied precisely. Further, we modify
one of the most prominent wireless sensor network's routing protocol "LEACH" as
modified LEACH (MODLEACH) by introducing \emph{efficient cluster head
replacement scheme} and \emph{dual transmitting power levels}. Our modified
LEACH, in comparison with LEACH out performs it using metrics of cluster head
formation, through put and network life. Afterwards, hard and soft thresholds
are implemented on modified LEACH (MODLEACH) that boast the performance even
more. Finally a brief performance analysis of LEACH, Modified LEACH (MODLEACH),
MODLEACH with hard threshold (MODLEACHHT) and MODLEACH with soft threshold
(MODLEACHST) is undertaken considering metrics of throughput, network life and
cluster head replacements.Comment: IEEE 8th International Conference on Broadband and Wireless
Computing, Communication and Applications (BWCCA'13), Compiegne, Franc
Comparative analysis of spatial and transform domain methods for meningioma subtype classification
Pattern recognition in histopathological image analysis requires new techniques and methods. Various techniques have been presented and some state of the art techniques have been applied to complex textural data in histological images. In this paper, we compare the novel Adaptive Discriminant Wavelet Packet Transform (ADWPT) with a few prominent techniques in texture analysis namely Local Binary Patterns (LBP), Grey Level Co-occurrence Matrices (GLCMs) and Gabor Transforms. We show that ADWPT is a better technique for Meningioma subtype classification and produces classification accuracies of as high as 90%
A methodology for testing fault-tolerant software
A methodology for testing fault tolerant software is presented. There are problems associated with testing fault tolerant software because many errors are masked or corrected by voters, limiter, or automatic channel synchronization. This methodology illustrates how the same strategies used for testing fault tolerant hardware can be applied to testing fault tolerant software. For example, one strategy used in testing fault tolerant hardware is to disable the redundancy during testing. A similar testing strategy is proposed for software, namely, to move the major emphasis on testing earlier in the development cycle (before the redundancy is in place) thus reducing the possibility that undetected errors will be masked when limiters and voters are added
Executable assertions and flight software
Executable assertions are used to test flight control software. The techniques used for testing flight software; however, are different from the techniques used to test other kinds of software. This is because of the redundant nature of flight software. An experimental setup for testing flight software using executable assertions is described. Techniques for writing and using executable assertions to test flight software are presented. The error detection capability of assertions is studied and many examples of assertions are given. The issues of placement and complexity of assertions and the language features to support efficient use of assertions are discussed
An estimation of the grant element in foreign aid
The purpose of aid is to effect a real transfer of resources
from the developed countries to the developing ones. Aid can be given
through a number of arrangements which differ from one donor country to
another. The three main variables that influence the terms of aid are
the interest rate, the grace period and the repayment period. Another
factor that may influence these terms is the possibility that the loan
may be repayable in local instead of convertible currency; if this is
so, then the grant element of the loan increases.1 However, this
possibility is ignored when calculating the grant element in this paper
as it occurs infrequently in repayment agreements
Dynamic assertion testing of flight control software
Digital Flight Control System (DFCS) software was used as a test case for assertion testing. The assertions were written and embedded in the code, then errors were inserted (seeded) one at a time and the code executed. Results indicate that assertion testing is an effective and efficient method of detecting errors in flight software. Most errors are eliminate at an earlier stage in the development than before
Dynamic assertion testing of flight control software
An experiment in using assertions to dynamically test fault tolerant flight software is described. The experiment showed that 87% of typical errors introduced into the program would be detected by assertions. Detailed analysis of the test data showed that the number of assertions needed to detect those errors could be reduced to a minimal set. The analysis also revealed that the most effective assertions tested program parameters that provided greater indirect (collateral) testing of other parameters
Stack-run adaptive wavelet image compression
We report on the development of an adaptive wavelet image coder based on stack-run representation of the quantized coefficients. The coder works by selecting an optimal wavelet packet basis for the given image and encoding the quantization indices for significant coefficients and zero runs between coefficients using a 4-ary arithmetic coder. Due to the fact that our coder exploits the redundancies present within individual subbands, its addressing complexity is much lower than that of the wavelet zerotree coding algorithms. Experimental results show coding gains of up to 1:4dB over the benchmark wavelet coding algorithm
- …