117 research outputs found

    Queue backlog as a node metric for RPL protocol

    Get PDF
    The current de-facto routing protocol over WSN developed by IETF Working Group (6LOWPAN) named as Routing Protocol for Low Power and Lossy networks (RPL) [1], to enable IPv6 packets carrying over IEEE 802.4 and to empower the usage of IoT over WSN. Because of the potential large networks, number of nodes and the fact that multiple coexisting applications will be running in the same physical layer, RPL in the network layer faces throughput challenges. For the purpose of overcoming these problems many researchers focused on multipath solutions including a Back-Pressure routing protocol for data collection called BackIP [2], however it shows a superior throughput performance, BackIP have shortcomings of higher delay and limited applicability. In this paper, we introduce a node metric based on nodes Queue Backlogs for RPL protocol, which leads to better throughput performance while maintaining the delay and the ability to use with the different network applications. This metric depends on the Packet Queue length of the nodes with the consideration of other link and node metrics, like ETX or Energy usage, leading to better load balancing in the network. Moreover we discuss the needed design changes to enable our metric to perform in an efficient way. Keywords-IOT, RPL, WSN, Back Pressure, Queue Backlog, Objective Functio

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform

    Get PDF
    Recent advancement in digital medium has created a need for secure transfer and transaction over the internet. The fact is that the current digital distribution and storage technologies are great threat to multimedia industries where unlimited number of perfect copies can be produce illegally. In this paper we discuss digital watermarking as a means of hiding ownerโ€™s copyright message in images. At the moment, the most critical issue faced by the watermarking system is determining the best place to hide watermark data. We propose a method, an attack proof intelligent system, in which Artificial Neural network is use to locate the Safe Region in the host image and the watermark is embedded based on the located Safe Region in Fast Fourier Transform domain. Experiment on a large set of natural images shows the robustness of the new scheme. The implementation results have shown that this watermarking algorithm has high level of imperceptibility and the watermark bit were all recovered correctly. Keywords: (Artificial Neural Network, Back Propagation algorithm, Fast Fourier Transform, FFT, Image watermarking, Safe Region,

    Simulation Analysis for Multicast Context Delivery Network Mobility Management

    Get PDF
    The objective of this paper is to presents analyses for multicast network mobility management using NS3. It is mainly to verify the proposed network architecture and its activities.ย  NS3 is a network simulator that implements virtually network prototype that is close to real implementation. Network mobility management has become a popular topic in networking research due to its ability to mitigate mobile IPv6 problems. However the standard network mobility management only introduced to support unicast traffic. Hence this paper integrates context transfer and multicast fast reroute, and implements this integration to the standard network mobility management. This implementation enables multicast to network mobility management with high network performance support. The analyses focus on the throughput performance. The analyses of this simulator are hereby presented

    Image quality assessment of fast fourier transform domain watermarked images

    Get PDF
    Digital watermarking is the processing of embedding digital signature into the host media such as image, video, text, audio etc. During the watermarking process, images are subjected to variety of attacks such as noise in transmission channel, geometric attacks,compression, processing like filtering, etc, all this affect the visual quality of watermarked image. Thus, there is a need for image quality assessment of watermarked images in relation to the original images. Several measures of image metrics are available in the field of image processing however they are application based. This paper discusses watermarking in FFT domain and some of the image quality metric that can be applied. Experiments are conducted using the Full Reference (FR) images. We used Mean Square Error (MSE), Root Mean Square (RMS), Structural Similarity (SSIM), Image Fidelity Measure (IFM), Correlation Coefficient Index (CCI) and Peak Signal to Noise Ratio (PSNR) as our quality assessment. Result shows that CCI, SSIM, and IFM are most appropriate for measuring quality of watermarking system

    Adaptive Emotional Personality Model based on Fuzzy Logic Interpretation of Five Factor Theory

    Get PDF
    In recent years, emotional personality has found an important application in the field of human machine interaction. Interesting examples of this domain are computer games, interface agents, human-robot interaction, etc. However, few systems in this area include a model of personality, although it plays an important role in differentiating and determining the way they experience emotions and the way they behave. Personality simulation has always been a complex issue due to the complexity of the human personality itself, and the difficulty to model human psychology on electronic basis. Current efforts for emotion simulation are rather based on predefined set or inputs and its responses or on classical models which are simple approximate and have proven flaws. In this paper an emotional simulation system was presented. It utilizes the latest psychological theories to design a complex dynamic system that reacts to any environment, without being pre-programmed on sets of input. The design was relying on fuzzy logic to simulate human emotional reaction, thus increasing the accuracy by further emulating human brain and removing the pre-defined set of input and its matched output

    Ethical issues in monitoring and based tracking systems

    Get PDF
    Monitoring and based tracking systems use a variety of technologies to record and monitor the activities of humans. This can increase the risks to the privacy and security of individuals. The amount of information gathered about individuals is growing through the proliferation of surveillance cameras, sensors; microchips and Radio Frequency Identification RFID tags embedded in devices and products. Advances in electronic technologies allow companies and government agencies to store and process large amounts of information about individuals. The Internet provides the ultimate copier device, making this information easily available to millions. This paper highlights the ethical issues emerging with the new technologies in the monitoring and base tracking system. New regulations should be proposed to protect the individual privacy

    Toward Efficient Low Cost Highly Accurate Emotion Speech Synthesizer,

    Get PDF
    Abstract: A Text to Speech (TTS) system with the ability to express emotions is an interesting technology that is still under development. There have been multiple proposals to simulate emotion so far, and there are multiple dimensions for assessment. No system guarantees high score in all of these dimensions, this means that no system works in a direction to get low computation load, small database along with high accuracy and excellent voice quality. After all of these qualities are relative and fuzzy and there is no rigid grading system. In this paper we will propose a new path for research that will work toward improving all of the quality factors together, so that future work can come up with a more optimum solution for the emotional TTS systems

    Network Qos architecture

    Get PDF
    There is huge growth in internet recently. This growth is started initially at slow rate with limited number of application, However as the time progresses the nehvork has expanded in term of users and applications, This expansion dictated a alteration and modification of the original protocol to enable higher Quality of service. This chapter provides tan over view about QoS requirement, architecture and mobility suppor

    Off line Arabic handwritten character using neural network

    Get PDF
    โ€” Character Recognition (CR) considered as one of the most important in the field of pattern recognition. The ultimate objectives of the Optical Character Recognition (OCR) system is to simulate the capability of reading, hence the OCR considered as artificial intelligence. In this paper, a character-handwritten recognition for the Arabic language is developed. The main aim of the system is to save time and effort Arabic OCR. In addition, to be the alternative of the typing manual due to provide it fast and reliable. The system has four main stages; preprocessing, segmentation, feature extraction, classification, and recognition. The system is off-line and depends on the image acquisition. So, after acquitted the image has to go through the main stages. The Neural Network used as a classifier. The proposed system is able to recognize as many characters as can with high accuracy rate. In addition, it is focusing on the character that has similarities and the system will also be considered about the number of dots and its position, and the connected components

    Reed-Muller Codec Simulation Performance

    Get PDF
    The approach to error correction coding taken by modern digital communication systems started in the late 1940โ€™s with the ground breaking work of Shannon, Hamming and Golay. Reed- Muller (RM) codes were an important step beyond the Hamming and Golay codes because they allowed more flexibility in the size of the code word and the number of correctable errors per code word. Whereas the Hamming and Golay codes were specific codes with particular values for q; n; k; and t, the RM codes were a class of binary codes with a wide range of allowable design parameters. Binary Reed-Muller codes are among the most prominent families of codes in coding theory. They have been extensively studied and employed for practical applications. In this research, the performance simulation of Reed-Muller Codec was presented. An introduction on Reed-Muller codes, were introduced that consists of defining the key terms and operation used with the binary numbers. Reed-Muller codes were defined and encoding matrices were discussed. The decoding process was given and some examples were demonstrated to clarify the method. The results and the performance of Reed-Muller encoding were presented and the messages been encoded using the defined matrices were shown. The simulation of the decoding part also been shown. The performance of Reed-Muller codes were then analyzed in terms of its code rate, code length and minimum Hamming distance. The analysis that performed also successfully examines the relationship between the parameters of Reed- Muller coding. The decoding part of the Reed-Muller codes can detect one error and correct it as shown in the examples
    • โ€ฆ
    corecore