Reliability improvement for an RFID-based psychiatric patient localization system q,qq

Size: px
Start display at page:

Download "Reliability improvement for an RFID-based psychiatric patient localization system q,qq"

Transcription

1 Available online at Computer Communications 31 (2008) Reliability improvement for an RFID-based psychiatric patient localization system q,qq Chieh-Ling Huang a,b, Pau-Choo Chung a,b, *, Ming-Hua Tsai a,b, Yen-Kuang Yang c, Yu-Chia Hsu d a Department of Electrical Engineering, National Cheng-Kung University, 1 University Road, Tainan 70101, Taiwan, ROC b Institute of Computer and Communication, National Cheng-Kung University, Tainan 70101, Taiwan, ROC c Department of Psychiatry, National Cheng Kung University, Medical College, 138, Sheng-Li Road, Tainan 704, Taiwan, ROC d Advanced e-commerce Institute, Institute for Information Industry, 22F-A, 333 Sec. 2 Duenhua S. Road, Taipei 106, Taiwan, ROC Received 7 March 2007; accepted 6 January 2008 Available online 16 January 2008 Abstract Collaboration between Field Generators, Readers and Tags generates the required functions in using radio frequency identification (RFID) for psychiatric patient localization. The Field Generator continually transmits trigger signals within its transmission range. When a Tag, which a patient wears, receives a trigger signal from a Field Generator, the Tag responds to a Reader with its own ID and ID of the Field Generator that issues the trigger. Based on Field Generator IDs that a Tag responds to, the location of the patient wearing the Tag can be estimated approximately. However, in recent RFID based localization systems, certain phenomena impact the reliability of signal transmission and decrease the feasibility of the localization system. To eliminate interference from different Field Generators, this study presents a novel graph coloring with merging and deletion (GCMD) algorithm for such a localization system that eliminates interference from Field Generators located near each other. Experimental results indicate that the GCMD algorithm significantly improves localization system reliability, thereby increasing the feasibility of RFID for psychiatric patient localization. Ó 2008 Elsevier B.V. All rights reserved. Keywords: RFID; Localization; Graphic coloring; Reliability 1. Introduction Psychiatric patients often cannot control their actions, occasionally resulting in dangerous behavior. Therefore, q The authors are corresponding with the Smart Media and Intelligent Living Excellence (SMILE) Lab. qq This work was supported by the Applied Information Services Development and Integration project of Institute for Information Industry and National Science Council, Taiwan, ROC, under Grant NSC E * Corresponding author. Address: Department of Electrical Engineering, National Cheng-Kung University, 1 University Road, Tainan 70101, Taiwan, ROC. Tel.: x62373; fax: / addresses: kaio@ee.ncku.edu.tw (C.-L. Huang), pcchung@ee. ncku.edu.tw (P.-C. Chung), q @mail.ncku.edu.tw (M.-H. Tsai), ykyang@mail.ncku.edu.tw (Y.-K. Yang), ychsu@iii.org.tw (Y.-C. Hsu). continuously monitoring patients is crucial to treating psychiatric patients. For patients with relatively severe psychiatric disorders, care centers are regarded essential. Effectively caring for of such psychiatric patients should include protecting patients from danger, being aware of treatment progress, and preventing patients from leaving a care center. To achieve these care objectives, radio frequency identification (RFID) devices, which are small and relatively cheap, can effectively monitor the location of psychiatric patients. RFID technology has been utilized in various applications, including supply chain management [1], entry and exit control [2]. Such applications have the same attributes, i.e., the monitored objects cannot move of freely. Localizing moving objects, e.g., freight localization or human localization [3] is a challenging and relatively unexplored task. Interference and miss detection are challenges /$ - see front matter Ó 2008 Elsevier B.V. All rights reserved. doi: /j.comcom

2 2040 C.-L. Huang et al. / Computer Communications 31 (2008) typically associated with localizing moving objects. Interference decreases reliability in using RFID for position localization. Several studies have focused on hardware and software when investigating RFID reliability [4]. Investigating antenna design based on free space architecture [5,6] originates from a hardware perspective. Experiments have demonstrated that a passive RFID system has an extremely limited operational range, which can be further decreased due to morphology distortion. In certain applications in which Tags are placed on objects, bending object surfaces can also result in degradation of signal propagation, therefore causing poor reliability. In this scenario, an antenna structure with minimal sensitivity to morphology distortion should be utilized [7]. On the other hand, integrating time hopping code division multiple access (CDMA), cyclic redundacy check (CRC) error detection and repetition of transmission has been utilized to eliminate the collision problem [8]. The Colorwave algorithm [9] is a simple, distributed and on-line algorithm for the Reader collision problem in RFID systems. Pure ALOHA [10] and slot ALOHA [11] are common methods that use repetitive transmission to improve successful transmission probability. Pure ALOHA uses the Poisson model to evaluate the time interval between two repetitive transmissions. The slot ALOHA utilizes Markov probability to derive the number of time slots and response time required to attain a predetermined successful transmission rate. Experimental evidence demonstrated that a reduction in reliability caused by Field Generator interference is an important issue when using RFID to localize psychiatric patients. To resolve this problem, this paper proposed a graph coloring with merging and deletion (GCMD) algorithm for scheduling operation of Field Generators. The GCMD algorithm transforms deployment of Field Generators into a graph with vertices representing Field Generators and each edge between two vertices representing a signal range overlapping between two associated Field Generators. The coloring algorithm is then employed to cluster the Field Generators into groups. Subsequently, the time division multiple access (TDMA) algorithm can be utilized to schedule the operating slots for each group, such that each group operates in a mutually exclusive non-overlapped period. Consequently, the vertices must be classified into the smallest number of groups possible. To attain this aim, this study proposes merging and deletion of vertices based on a Field Generator relationship criterion, such that the graph can be effectively simplified. Thus, the number of groups is minimized, and system performance and reliability are improved. The remainder of this paper is organized as follows. First, the RFID-based psychiatric patient localization system is described in Section 2. Section 3 describes the GCMD scheduling approach. The criteria developed for merging and deletion are also introduced. Section 4 presents experiment descriptions and experimental results. Localizing reliability comparisons with and without the proposed scheduling algorithm are demonstrated. Finally, conclusions are presented in Section System overview The Department of Psychiatry, National Cheng Kung University Hospital (NCKUH) uses an RFID-based psychiatric patient localization system [3]. The department at NCKUH is the primary center for medical treatment of psychiatric patients in southern Taiwan. The department is located in its own building directly across from the NCKUH. The second floor serves as a clinic for psychiatric patients, and the third floor is an activity area. Psychiatric patients are brought to the building every morning and picked up in the afternoon. Nurses are responsible for scheduling daily activities and providing basic care; doctors are responsible for medical treatment. This RFID-based psychiatric patient localization system uses a ultra high frequency (UHF) long range tracker. The Field Generators operate on 433 MHz when triggering the Tag to respond, and the Tag replies to a Reader with 916 MHz signal once it is triggered. The entire care center is divided into several regions. Each Field Generator is responsible for one region; the coverage for regions overlaps. Fig. 1 presents the deployment of the six Field Generators and one Reader on the first floor of the care center and the grounds. Based on this deployment, Field Generators FG 4, FG 2 and FG 1 together track the rout from the exit to the ground area and main gate. Thus, when psychiatric patients move from Field Generator FG 4 to Field Generator FG 1, or Field Generator FG 2 to Field Generator FG 1, the system signals an alarm to the manager. Fig. 1. Dispose diagram of RFID-based psychiatric patient localization system.

3 C.-L. Huang et al. / Computer Communications 31 (2008) Psychiatric patients in the care center wear watch-like Tags. When patients are within a transmission region of a Field Generator the Field Generator triggers the Tag, and the Tag then transmits information, including Tag ID and Field Generator ID, to the Reader. The Reader then sends the information to a central server, which aggregates information from Readers, that determines the location of a given Tag, and, thus, the patient. Finally, this location information is recorded in a database. To localize patients effectively, the Field Generators must appropriately placed. In this experiment, the care center is on the first floor of the building and the Field Generators are placed on the first floor near the staircase on the first floor, the first floor building exit and around the grounds, and near exit from the grounds to the street. Via the Field Generators in the staircase and at the building exit, patients descending the stairs to the ground area are detected. The Field Generators in the ground area are also used to determine whether the patient is closing the main gate. Thus, the system can monitor patients attempting to leave the grounds. The relative density of Field Generators and reference Tags also computes patient positions and acquires data of patient activity patterns. Statistical analysis of activity patterns provides valuable data for evaluating treatment progress. 3. Reliability improvement with field generator scheduling This RFID-based system for localizing psychiatric patients relies on the Tag correctly receiving signal from the Field Generators to estimate the Tag location. However, two Field Generators with overlapping transmission ranges simultaneously issuing trigger signals to a Tag causes signal interferences in the overlapped region. This interference results in loss of signal and, therefore, decreases localization accuracy. Resolving this problem is necessary for accurate localization. In this section, a GCMD scheduling technique is presented that optimally schedules Field Generators such that overlapping Field Generators operate in mutually exclusive patterns. In this scheme, Field Generator deployment is translated into a graph, and a coloring algorithm is applied to this graph to partition the Field Generators into the minimal number of groups. This partitioning guarantees that Field Generators within the same group do not interfere with each other. A TDMA time division scheduling scheme is applied to groups of Field Generators for alternating the time slots within which each group operates. Thus, when one Field Generator group is operating, the other groups cannot operate. Maintaining the smallest number of Field Generator groups is essential, as the smallest number of groups allows the highest number of Field Generators to operate at any given time. Thus, increased system efficiency can be attained. This study presents a novel merging and deletion scheme that reduces the number of vertices in a graph. Thus, graph size can be reduced and the number of obtained partition groups decreased. The GCMD procedure is described as follows. Fig. 2 presents a flow chart of the GCMD procedure Transform the relationships among all Field Generators into a graph First, the relationships among Field Generators are transformed into an undirected graph G, whereas V and E are sets of vertices and edges, respectively. Where V Fig. 2. The flow chart of GCMD algorithm.

4 2042 C.-L. Huang et al. / Computer Communications 31 (2008) and E are derived based on the Field Generators and their signal region overlapping situations, respectively. 1. Set of vertices (V): Every Field Generator is associated with a vertex in the graph, e.g., vertex iv i represents Field Generator FG i. Then the localization system has Field Generators FG 1,FG 2,... and FG n, and the set of vertices V contains elements of vertices v 1,v 2,... and v n. Thus, the set of vertices for graph G is V(G)= {v 1,v 2,...,v n }. 2. Set of edges (E): Let S u represent the signal region of Field Generator FG u. When any two Field Generators have overlapping signal regions, their associated vertices are connected by an edge. For example, let sets S u and S v represent the signal regions of Field Generators FG u and FG v, respectively. If Field Generators FG u and FG v have overlapping regions, that is S u \ S v 6¼ / (empty set), then there is an undirected edge (u,v) between v u and v v. All these edges comprise the set of edges in graph G as E(G). Thus, all Field Generators and their overlapping signal ranges are transformed into an undirected graph G =(V,E) Vertex deletion and merging Once the graph is constructed, this step reduces the number of vertices in the graph via deletion and merging based on certain criteria Vertex deletion When the range of one Field Generator, FG x,iscompletely covered by other Field Generators, the function of FG x can be replaced by a combination of these other Field Generators. In this scenario, the Field Generator FG x can be removed. Therefore, the vertex deletion is as follows. Theorem 1. Let G be a graph associated with the RFID Field Generator deployment. Let v x be a vertex in graph G with adjacencies v x1,v x2,...,v xp. When S x S x1 [ S x2 [...S xp, then v x can be deleted Vertex merging From the previous discussion, we concluded that two Field Generators with overlapping signal regions are prohibited from transmitting signals simultaneously. However, consider a situation in which the entire overlapping region is covered by a union of Field Generators. In this scenario, other Field Generators can cover the overlapping region, thus enabling these two adjacent Field Generators to simultaneously transmit signals. Consequently, the two vertices associated with the two Field Generators can be merged, and no special care is required to avoid signal interference from the two Field Generators. Thus, Theorem 2 is developed to merge the two adjacent vertices. Theorem 2. If v u and v v are adjacency and have the same adjacencies v k1,v k2,...,v kq that satisfy, (S u \ S v ) S k1 [ S k2 [...\ S kq then v u and v v can be merged to v uv with S uv defined as S uv =(S u [ S v ) (S u \ S v ) Vertex coloring Following vertex deletion and merging, this study obtains a trimmed graph representing Field Generator deployment. Then, a coloring algorithm is applied to the trimmed graph, in which connected vertices are assigned different colors. The Field Generators with the same color are assigned to the same group, and, therefore, can transmit signals simultaneously. Conversely, the Field Generators with different colors are assigned to different groups; scheduling must be applied to avoid signal conflict Operation slot allocation After groping Field Generators, a weighted TDMA is applied to assign time slots for operation to each group. Consider that each partitioned group can occupy different levels of importance. For example, one group can cover a crucial region such as dangerous areas or exits. Thus, this group should be allocated more time slots than other groups. Another consideration is the size of an area covered by a group of Field Generators. Group importance should be assigned based on the size of the area covered by a group of Field Generators. Consequently, the importance factor for each group w i can be approximated. Then based on importance factors, w i, the time slot ratio for each group can be computed as T i ¼ P w i n. Thus, the k¼1 w k slot partition for each group can be based on factors of T i s. 4. Experiments For elucidate system performance, the maximal signal range of each Field Generator in the experimental environment is measured. Fig. 3 illustrates the signal range of each Field Generator. Fig. 4 presents a scenario in which Field Generator ranges overlap. Based on the overlapping scenario shown in Fig. 4, without graph reduction (vertex deletion and merging), the relationship among Field Generators is transformed into a graph (Fig. 5(a)). After the graph coloring is applied, the group results of the Field Generators are shown in Fig. 5(b). In Fig. 5(b), the Field Generators are divided into three groups: group 1 (Field Generators FG 1 and FG 3 ); group 2 (Field Generators FG 2 and FG 5 ); and, group 3 (Field Generators FG 4 and FG 6 ). However, from Fig. 5(a), we can find that vertex v 3 has adjacent vertices v 2, v 4, v 5 and v 6. Additionally, based on a signal range of each Field Generator shown in Figs. 3 and 4, the signal range of Field Generator 3, S 3, is contained within the union of S 2, S 4, S 5 and S 6 ; that is,

5 C.-L. Huang et al. / Computer Communications 31 (2008) Fig. 3. The signal distribution range of each Field Generator. Fig. 4. The mixed state signal situation of all Field Generators. Fig. 5. The graph of associated Field Generators without graph reduction. (a) Graph obtained. (b) Coloring result. S 3 S 2 [ S 4 [ S 5 [ S 6. Thus, according to Theorem 1, vertex v 3 can be deleted from the graph. Thus, after vertex deletion is applied to the graph, the graph of Fig. 6(a) can be obtained. Fig. 6(a) reveals that vertex v 1 and vertex v 4 have the same adjacency, v 2. Also, based on the signal range of each Field Generator shown in Figs. 3 and 4, we have S 1 \ S 4 S 2. Then, according to Theorem 2, vertex v 1 and vertex v 4 are merged into vertex v 1,4. Thus, after vertex merging is applied to the graph, the graph is finally simplified to Fig. 6(b). Applying the coloring algorithm to Fig. 6(b), we can obtains the coloring result of Fig. 6(c), in which Field Generators are divided into two groups: group 1 containing Field Generators FG 1, FG 4 and FG 6 ; and, group 2 containing Field Generators FG 2 and FG 5. On the other hand, as noted, when the coloring algorithm is applied to the original graph without graph reduction, the coloring algorithm requires three groups to partition. Thus, via graph reduction, a reduced number of groups is obtained, and, therefore, the number of Field Generators that can operate simultaneously is increased. In the current RFID system, Tags can be programmed to send out responses periodically (reciprocated regularly) or only when triggered by Field Generators. In this psychiatric patient localization system, a patient s location is computed based on the communication range of the patient s Tag within the Field Generators with respect to ranges of reference Tags. Consequently, Tags are pro-

6 2044 C.-L. Huang et al. / Computer Communications 31 (2008) Fig. 6. The graphic after graph reduction. (a) After vertex deletion. (b) After vertex merging. (c) Coloring result. grammed to report only in response to a Field Generator s trigger. Another issue that requires consideration is increasing the Reader acceptance rate in the scenario in which Tags may generate interference when more than two Tags are sending reports back to the Reader simultaneously. When localizing moving objects, it is almost impossible to schedule Tags as a result of their highly dynamic movement. Currently the most commonly adopted and effective technique for resolving Tag interference is through repetitive transmission. The ALOHA [12] indicates that with sufficient number of transmissions, the ALOHA system achieves a high success rate. Repetitive transmission times in the system are set at 6, and the associated lasting time is T rep. Another parameter associated with a Tag is time in field (TIF) time. Consider the situation in which a Reader receives two consecutive reports from the same Tag. How can the Reader determine whether the two reports are issued due to two separate triggers, or whether the two reports are due to a repetitive response trigger? To resolve this problem, a Tag can be programmed with a TIF Time (T TIF ) that specifies the time duration before the Tag can be triggered again. Another aim of TIF time is to prevent Tags from wasting energy replying to the same trigger from a Field Generator. In these experiments, if a Field Generator continuously sends a trigger signals, in an optimal situation, the Tag is physically trigged once for every T rep + T TIF time period. Thus, every T rep + T TIF is defined as one round. As known, a Tag repeats its response six times. Assume that within these six responses, if one of the six responses in one round is received, this round is regarded as successfully received. Otherwise, this round is considered lost. To measure the reliability value, we define the lost rate of responses L as the total number of lost rounds divided by the total number of rounds that should trigger the Tag: r L ¼ 1 ð1þ T =T rep þ T TIF where r denotes the number of rounds that the Reader successfully received Tag s reply signal and T represents time cost. In this system, it takes roughly three rounds for a patient to move from the building exit to the main gate. Under this scenario, we define response rate R n as: R n ¼ 1 L n ð2þ where n is the number of rounds 3 in this case. To measure reliability improvement using GCMD scheduling, two experimental situations are devised: (1) a fixed-points test and (2) a route test Fixed-points test This experiment is utilized to test the reliability of representative fixed points in the RFID-based localization system with and without the proposed GCMD scheduling. The selected representative fixed points are at the centers of covering regions for all Field Generators, and at the centers of overlapping regions. Fig. 4 presents the covering ranges of the six Field Generators deployed on the first floor. In this scenario, there are 15 fixed positions according to the deployment architecture (Fig. 7). Among these fixed positions, the positions 1 6 reside in single Field Generator range, whereas positions 7 10 are located in the overlapping region of two Field Gen- Fig. 7. Positions for fixed-point test.

7 C.-L. Huang et al. / Computer Communications 31 (2008) Table 1 Results of fixed-points test for the system without scheduling Point number Point number Point number Averaged response Table 2 Results of fixed-points test when GCMD algorithm is applied without graph reduction Point number Point number Point number Averaged response erators; positions are in the overlapped region for three Field Generators; position 15 is in the overlapping region of four Field Generators. These 15 positions taken together comprise various situations for a fixedpoint test. In the fixed-points test, people wearing Tags stand at each fixed position for 1 min; the response rate for each position is computed according to Eq. (2). Table 1 presents the response rate for each fixed point for the system without scheduling, which has a very low average response rate (43.28%). The Field Generator deployment is transformed into a graph. Without graph reduction, namely, vertex deletion and merging, the vertices are partitioned into three groups. The TDMA is then applied to alternately divide time periods into the three Field Generator groups; each group operates for 1 s and the sleeps for 2 s. Table 2 presents the measured response rates for the 15 fixed points. A comparison of fixed-point test results for scheduling (Table 2) with those without scheduling (Table 1) indicates that response rates are dramatically increased following scheduling. In the following experiment, vertex deletion and merging is applied to the graph, followed by the vertex partition. Thus one vertex, v 2, is deleted, and, finally, two groups are acquired for the remaining vertices. Thus, the time periods alternate between the two groups of Field Generators; each Field Generator is in operation for 1 s followed by 1 s of sleep. Thus, the rate of transmission time for each Field Generator is increased from 1/3 to 1/2. Table 3 shows Table 3 Results of fixed-points test when GCMD algorithm is applied Point number Point number Point number Averaged response Table 4 Results of fixed-points test when GCMD algorithm is applied with weighted TDMA Point number Point number Point number Averaged response 86.44

8 2046 C.-L. Huang et al. / Computer Communications 31 (2008) Fig. 8. The routes for reliability test. (a) The route connecting 15 representative points. (b) The route connecting the lowest reliability points. (c) The route connecting the highest reliability points. (d) The route having the shortest path from exit to main gate. (e) The route tracing a region not tested in (a d). the response rates in this experiment. The results obtained without vertex deletion and merging (Table 2) are compared with those applying vertex deletion and merging (Table 3). This comparison reveals that the overall response rate has increased significantly, except for positions 3, 8 and 14 that dramatically decreased. Closely examining these positions indicates that all three positions are either in corners, or very close to building walls (Fig. 7). Further investigation of these conditions is worth of future study. Consider that the signal range area of Field Generator FG 1 (in group 1) covers an entrance and exit, which are very more important. Additionally, group 1 (Field Generators FG 1,FG 4,FG 6 ) covers an area significantly larger than that covered by group 2 (Field Generators FG 2, FG 5 ). Therefore, the rate of allocated transmission time for group 1 is two times that of group 2. Thus, in this experiment, group 1 is assigned 2 s for operation and group 2 is assigned 1 s. Table 4 presents the measurement results for fixed points following this adjustment. Comparing the results after applying weighted TDMA (Table 4) with that apply traditional TDMA (Table 3), it can be observed that the average response rate is increased. Moreover, the response rate of point 1, i.e., nearest to an entrance and exit, is increased to 99.9% Route test Given that patients wearing Tags may stroll around inside the care center, this study also performs reliability tests of this localization system when the patients are strolling around. As such, several routes represent the critical paths designed. Fig. 8 presents the experimental routs, where (a) Route1 is the path passing the 15 representative points, (b) Route2 is the path connecting with poor reliability in the fixed-point test, (c) Route3 is the path connecting points with high reliability, (d) Route4 is the path of shortest distance from the building exit to the main gate and (e) Route5 is a route tracing through a region that is rarely covered by routes (a d). During experiments, people

9 C.-L. Huang et al. / Computer Communications 31 (2008) wearing Tags walk or run along each experimental path. The response rate is computed for each experimental route. Table 5 presents the response rates when the people walk or run on the five routes for the system without scheduling. Among these five routes, Route2 connects the points of the lowest response rate. Thus, according to Table 5, that Route2 has the lowest response rate among the five routes for the walking and running models. Furthermore, given the interferences of signal collision, some routes have rather low response rates. Reducing these interferences involves applying a scheduling to the Field Generators associated with Fig. 5(a). Table 6 presents the response rates after the scheduling algorithm is applied. All response rates have clearly improved significantly. However, as mention earlier, the scheduling on Fig. 5(b) causes the rate of transmission time for each Field Generator to be 1/3. Also mentioned earlier, the GCMD can improve the rate of transmission time from 1/3 to 1/2 in this case. Table 7 illustrates the response rates when GCMD is applied. Comparing the results in Table 6 with those in Table 7 reveals that response rates in the running model are reduced and the walking model is increased following graph reduction in GCMD scheduling algorithm. It may be noticed that graph reduction does not improve response rate. This is not surprising as the functionality of graph reduction is not to increase the response rate, but rather reduce the graph size; consequently a small Table 5 Results of routes test for the system without scheduling Walking model Running model Route number Route number Average response Overall average response Table 7 Results of routes test when GCMD algorithm is applied Walking model Running model Route number Route number Average response Overall average response number of excluded groups are obtained and additional Field Generators can be operate. As mentioned in fixed-point test, the Field Generators in group 1 in this scenario play more critical roles since their signal ranges covers a significantly large area where includes an entrance and exit points. Therefore, the rate of allocated transmission time for group 1 is adjusted to two times that of group 2. Table 8 presents the measurement results of the route test when applying the weighted TDMA. Based on experimental results, the response rates of the RFID-based localization system are significantly enhanced when GCMD scheduling is applied. However, position 3 has very low response rate with and without the GCMD algorithm. Analysis indicated that position 3 is in the furthest corner in this environment (Fig. 7). The Field Generator has difficulty reaching this sharp corner and the Tag cannot reach the Reader. Thus, a Reader is added at position 10. Experimental results indicate that by adding a Reader, response rate for position 3 improves from 0% to 57.81% in the unscheduled original system, and from 14.26% to 83.36% using GCMD scheduling. Notably, transmission time slots should be based on group importance. For group covering important regions or large areas should be allocated increased time periods. Adopting such strategies effectively increases localization system performance. Finally, Fig. 9 presents a summary Table 6 Results of routes test when GCMD algorithm is applied without graph reduction Walking model Running model Route number Route number Average response Overall average response Table 8 Results of routes test when GCMD algorithm is applied with weighted TDMA Walking model Running model Route number Route number Average response Overall average response 93.80

10 2048 C.-L. Huang et al. / Computer Communications 31 (2008) Fig. 9. Reliability comparison for original system and the system with proposed GCMD algorithm. of comparisons of response rates between the original system without GCMD scheduling and the system with GCMD scheduling. 5. Conclusion The RFID devices that are small and relatively cheap are very appropriate for use in localizing psychiatric patients. However, certain phenomena degrade the reliability of signal transmission and decrease feasibility of the localization system. In this study, a GCMD scheduling model is utilized for scheduling Field Generator transmissions in an RFID-based psychiatric patient localization system, thereby reducing interference caused by Field Generators located near one another. The GCMD scheduling scheme transforms relationships among Field Generators into an undirected graph; this graph is then simplified using deletion and merging algorithm proposed herein. Once the graph has been simplified, the GCMD algorithm colors the graph vertex and a weighted TDMA is applied to assign time slots for operation to each group. Experimental results demonstrated that the system is highly effective when using the proposed scheduling algorithm. Acknowledgements This work was supported by the Applied Information Services Development and Integration project of Institute for Information Industry. The authors thank the National Science Council of the Republic of China, Taiwan, for financially supporting this research under Contract No. NSC E References [1] K. Michael, L. McCathie, The Pros and Cons of RFID in supply chain management, International Conference on Mobile Business (2005) [2] F. Wu, F. Kuo, L.W. Liu, The application of RFID on drug safety of inpatient nursing healthcare, in: ACM Seventh International Conference on Electronic Commerce, vol. 113, 2005, pp [3] M.H. Tsai, C.L. Huang, P.C. Chung, Y.K. Yang, Y.C. Hsu, S.L. Hsiao, A psychiatric patients tracking system, IEEE International Symposium on Circuit and Systems (2006) [4] D.H. Shih, P.L. Sun, D.C. Yen, S.M. Huang, Taxonomy and survey of RFID anti-collision protocols, Computer communications 29 (2006) [5] P.R. Foster, R.A. Burberry, Antenna problems in RFID systems, IEE Colloquium on RFID Technology, 1999, 3/1 3/5. [6] J. Siden, P. Jonsson, T. Olsson, G. Wang, Performance degradation of RFID system due to the distortion in RFID tag antenna, in: 11th International Conference on Microwave and Telecommunication Technology, 2001, pp [7] X. Zhou, G. Wang, Study on the influence of curving of tag antennas on performance of RFID system, in: Fourth International Conference on Microwave and Millimeter Wave Technology, 2004, pp [8] Y. Fukumizu, M. Nagata, S. Ohno, K. Taki, A design of transponder IC for highly collision resistive RFID systems, in: IEEE Asia-Pacific Conference on Advanced System Integrated Circuits, 2004, pp [9] J. Waldrop, D.W. Engels, S.E. Sarma, Colorwave: an anticollision algorithm for the reader collision problem, IEEE International Conference on Communications 2 (2003) [10] B. Zhen, M. Kobayashi, M. Shimizu, To read transmitter only RFID tags with confidence, in: 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 1, 2004, [11] H. Vogt, Multiple object identification with passive RFID tags, IEEE International Conference on Systems, Man and Cybernetics 3 (2002). [12] A.S. Tanenbaum, Computer Networks, fourth ed., Prentice Hall PTR, New Jersey, 2003, pp

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks Jihoon Choi and Wonjun Lee Division of Computer and Communication Engineering College of Information

More information

Analysis and Simulation of RFID Anti-collision Algorithms

Analysis and Simulation of RFID Anti-collision Algorithms Analysis and Simulation of RFID Anti-collision Algorithms Tao Cheng, Li Jin School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 44, P.R.China E-mail: chtao@bjtu.edu.cn

More information

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles 2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

More information

Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29,

Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 211 Design and Implementation of Low Power Network Maintenance Protocols

More information

An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification

An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification Su-Ryun Lee Ajou University Department of Electrical and Computer Engineering Suwon, Korea srlee@ajouackr Sung-Don Joo LG

More information

Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments

Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments Tamkang Journal of Science and Engineering, Vol. 13, No. 1, pp. 1 9 (2010) 1 Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless

More information

CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW)

CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) 33 CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) In a RFID based communication system the reader activates a set of tags, and the tags respond back. As outlined

More information

Linear Quadtree Construction in Real Time *

Linear Quadtree Construction in Real Time * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26, 1917-1930 (2010) Short Paper Linear Quadtree Construction in Real Time * CHI-YEN HUANG AND YU-WEI CHEN + Department of Information Management National

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Other] Introducing probability in Colorwave Original Citation: Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo (2011).

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Efficient Dual Bias Q-Algorithm and Optimum Weights for EPC Class 1 Generation 2 Protocol

Efficient Dual Bias Q-Algorithm and Optimum Weights for EPC Class 1 Generation 2 Protocol Efficient Dual Bias Q-Algorithm and Optimum Weights for EPC Class 1 Generation 2 Protocol Dongwook Lee, Okkyeong Bang, Sooyeol Im, and Hyuckjae Lee School of Electrical Engineering Information and Communications

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Some Results on the Incidence Coloring Number of Chordal Rings *

Some Results on the Incidence Coloring Number of Chordal Rings * Some Results on the Incidence Coloring Number of Chordal Rings * Kung-Fu Ding, Kung-Jui Pai,+ and Ro-Yu Wu Department of Industrial Engineering and Management, Ming Chi University of Technology, New Taipei

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Power-Mode-Aware Buffer Synthesis for Low-Power Clock Skew Minimization

Power-Mode-Aware Buffer Synthesis for Low-Power Clock Skew Minimization This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Power-Mode-Aware Buffer Synthesis for Low-Power

More information

Efficient Prefix Computation on Faulty Hypercubes

Efficient Prefix Computation on Faulty Hypercubes JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 1-21 (21) Efficient Prefix Computation on Faulty Hypercubes YU-WEI CHEN AND KUO-LIANG CHUNG + Department of Computer and Information Science Aletheia

More information

Development of the Home Uterine Contraction Pressure Monitoring System Based on PDA

Development of the Home Uterine Contraction Pressure Monitoring System Based on PDA Available online at www.sciencedirect.com AASRI Procedia 3 (2012 ) 566 570 2012 AASRI Conference on Modeling, Identification and Control Development of the Home Uterine Contraction Pressure Monitoring

More information

Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment

Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment Ching-Huang Yun and Ming-Syan Chen Department of Electrical Engineering National Taiwan

More information

Feature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News

Feature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News Selecting Model in Automatic Text Categorization of Chinese Industrial 1) HUEY-MING LEE 1 ), PIN-JEN CHEN 1 ), TSUNG-YEN LEE 2) Department of Information Management, Chinese Culture University 55, Hwa-Kung

More information

Performance Improvement of Hardware-Based Packet Classification Algorithm

Performance Improvement of Hardware-Based Packet Classification Algorithm Performance Improvement of Hardware-Based Packet Classification Algorithm Yaw-Chung Chen 1, Pi-Chung Wang 2, Chun-Liang Lee 2, and Chia-Tai Chan 2 1 Department of Computer Science and Information Engineering,

More information

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information

More information

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs

FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw

More information

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks , pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Efficient remote mutual authentication and key agreement

Efficient remote mutual authentication and key agreement computers & security 25 (2006) 72 77 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Efficient remote mutual authentication and key agreement Wen-Gong Shieh*, Jian-Min

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Image Error Concealment Based on Watermarking

Image Error Concealment Based on Watermarking Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Blind Signature Scheme Based on Elliptic Curve Cryptography

Blind Signature Scheme Based on Elliptic Curve Cryptography Blind Signature Scheme Based on Elliptic Curve Cryptography Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung Department of Management Information System, National Chung Hsing University 250 Kuo Kuang Road.,

More information

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking Rengamathi Sankarkumar (B), Damith Ranasinghe, and Thuraiappah Sathyan Auto-ID Lab, The School of Computer Science, University

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

An Active RFID Tag for Outdoor Billboard Management

An Active RFID Tag for Outdoor Billboard Management 2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN: 978-1-60595-498-1 An Active RFID Tag for Outdoor Billboard Management Hui JIANG 1,2,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search

Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search Jinyan Liu, Quanyuan Feng School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031,

More information

Development of a Smart Power Meter for AMI Based on ZigBee Communication

Development of a Smart Power Meter for AMI Based on ZigBee Communication Development of a Smart Power Meter for AMI Based on ZigBee Communication Shang-Wen Luan Jen-Hao Teng Member IEEE Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan Abstract: Many

More information

Research on the Security Authentication Mode of MF1 S50 Electronic Tag

Research on the Security Authentication Mode of MF1 S50 Electronic Tag ORIGINAL ARTICLE Research on the Security Authentication Mode of MF1 S50 Electronic Tag Xiao Zhiliang Foshan Polytechinc., Foshan, Guangdong, China, 528137 Abstract: This paper expatiates the security

More information

Collision Avoidance through Multiple RTS/CTS Dialogue in RFID System

Collision Avoidance through Multiple RTS/CTS Dialogue in RFID System Collision Avoidance through Multiple RTS/CTS Dialogue in RFID System ICUIMC 2008, Sungkyunkwan Univ. Jan. 31, 2008 and Jae-Hyun Kim Wireless Information and Network Engineering Research Lab. Ajou University,

More information

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2

RETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2 Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

Internet of Things (IoT)

Internet of Things (IoT) Internet of Things (IoT) Yan Zhang Professor, University of Oslo, Norway April 7, 2017 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual

More information

A METHOD OF MAP MATCHING FOR PERSONAL POSITIONING SYSTEMS

A METHOD OF MAP MATCHING FOR PERSONAL POSITIONING SYSTEMS The 21 st Asian Conference on Remote Sensing December 4-8, 2000 Taipei, TAIWA A METHOD OF MAP MATCHIG FOR PERSOAL POSITIOIG SSTEMS Kay KITAZAWA, usuke KOISHI, Ryosuke SHIBASAKI Ms., Center for Spatial

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

and Molds 1. INTRODUCTION

and Molds 1. INTRODUCTION Optimal Tool Path Generation for 2 and Molds D Milling of Dies HuiLi Automotive Components Division Ford Motor Company, Dearborn, MI, USA Zuomin Dong (zdong@me.uvic.ca) and Geoffrey W Vickers Department

More information

Distributed clustering algorithms for data-gathering in wireless mobile sensor networks

Distributed clustering algorithms for data-gathering in wireless mobile sensor networks J. Parallel Distrib. Comput. 67 (2007) 1187 1200 www.elsevier.com/locate/jpdc Distributed clustering algorithms for data-gathering in wireless mobile sensor networks Chuan-Ming Liu a,, Chuan-Hsiu Lee a,

More information

Introduction and Simulation of Modified Left Algorithms to Attribute Orthogonal Codes in 3 rd Generation Systems

Introduction and Simulation of Modified Left Algorithms to Attribute Orthogonal Codes in 3 rd Generation Systems J. Basic. Appl. Sci. Res., 1(12)2950-2959, 2011 2011, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Introduction and Simulation of Modified Left

More information

AUTOMATIC PHOTO ORIENTATION VIA MATCHING WITH CONTROL PATCHES

AUTOMATIC PHOTO ORIENTATION VIA MATCHING WITH CONTROL PATCHES AUTOMATIC PHOTO ORIENTATION VIA MATCHING WITH CONTROL PATCHES J. J. Jaw a *, Y. S. Wu b Dept. of Civil Engineering, National Taiwan University, Taipei,10617, Taiwan, ROC a jejaw@ce.ntu.edu.tw b r90521128@ms90.ntu.edu.tw

More information

An optically transparent ultra high speed LAN-ring employing OTDM

An optically transparent ultra high speed LAN-ring employing OTDM An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,

More information

Internet of Things (IoT)

Internet of Things (IoT) Internet of Things (IoT) INF5050 February 19, 2016 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual entity that exists and moves

More information

Sensor Based Time Series Classification of Body Movement

Sensor Based Time Series Classification of Body Movement Sensor Based Time Series Classification of Body Movement Swapna Philip, Yu Cao*, and Ming Li Department of Computer Science California State University, Fresno Fresno, CA, U.S.A swapna.philip@gmail.com,

More information

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License Title Performance analysis of realistic optical time division multiplexed wavelength routed networks Author(s) Li, CY; Li, G; Wai, PKA; Li, VOK Citation The 8th IEEE Annual Workshop on Computer Communications

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

An Efficient Tag Identification Algorithm Based on Improved Collision Detection

An Efficient Tag Identification Algorithm Based on Improved Collision Detection An Efficient Tag Identification Algorithm Based on Improved Collision Detection Ya-Ning Yan 1 and Jian Xiong 2 1. ZTE Telecommunications College, Xi an Peihua University, Xi an 710065, China 2. School

More information

RFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems,

RFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems, RFID systems: anti-collision protocols and applications Naeem Khademi Cyber-Physical Systems, 12.11.2010 RFID Systems Radio-frequency identification (RFID) is a technology that uses communication via electromagnetic

More information

RECOMMENDATION ITU-R M Intelligent transport systems dedicated short range communications at 5.8 GHz

RECOMMENDATION ITU-R M Intelligent transport systems dedicated short range communications at 5.8 GHz Rec. ITU-R M.1453-2 1 RECOMMENDATION ITU-R M.1453-2 Intelligent transport systems dedicated short range communications at 5.8 GHz (Question ITU-R 205/8) (2000-2002-2005) Scope This Recommendation outlines

More information

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement

Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed

More information

Computers and Mathematics with Applications. An embedded system for real-time facial expression recognition based on the extension theory

Computers and Mathematics with Applications. An embedded system for real-time facial expression recognition based on the extension theory Computers and Mathematics with Applications 61 (2011) 2101 2106 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa An

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

Moment-preserving Based Watermarking for Color Image Authentication and Recovery

Moment-preserving Based Watermarking for Color Image Authentication and Recovery 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore Moment-preserving Based Watermarking for Color Image Authentication and Recovery Kuo-Cheng Liu + Information Educating

More information

Spoofing Attack Against an EPC Class One RFID System

Spoofing Attack Against an EPC Class One RFID System Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Spoofing Attack Against an EPC Class One RFID System Christopher

More information

Theoretical Computer Science

Theoretical Computer Science Theoretical Computer Science 410 (2009) 3372 3390 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs An (18/11)n upper bound for sorting

More information

Utilizing a Test Lab For Wireless Medical Devices

Utilizing a Test Lab For Wireless Medical Devices Utilizing a Test Lab For Wireless Medical Devices Allie Paquette Changes in healthcare suggest that more and more medical devices will begin to utilize the information technology (IT) network infrastructure

More information

Association Rule Mining and Clustering

Association Rule Mining and Clustering Association Rule Mining and Clustering Lecture Outline: Classification vs. Association Rule Mining vs. Clustering Association Rule Mining Clustering Types of Clusters Clustering Algorithms Hierarchical:

More information

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)

More information

Faster Implementation of Canonical Minimum Redundancy Prefix Codes *

Faster Implementation of Canonical Minimum Redundancy Prefix Codes * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 341-345 (2001) Short Paper Faster Implementation of Canonical Minimum Redundancy Prefix Codes * KUO-LIANG CHUNG AND JUNG-GEN WU + Department of Information

More information

PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES

PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES E SELVADIVYA divyacharlez@gmail.com GREETA PRIYADARSHINI greetasam@gmail.com ABSTRACT In this research we deal with delay-tolerant

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

The MAC Protocol of the paper: Performance of Buffer-Aided Adaptive Modulation in Multihop Communications

The MAC Protocol of the paper: Performance of Buffer-Aided Adaptive Modulation in Multihop Communications The MAC Protocol of the paper: 1 Performance of Buffer-Aided Adaptive Modulation in Multihop Communications Chen Dong, Lie-Liang ang, Senior Member, IEEE and Lajos Hanzo, Fellow, IEEE School of ECS, University

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

Comment Extraction from Blog Posts and Its Applications to Opinion Mining

Comment Extraction from Blog Posts and Its Applications to Opinion Mining Comment Extraction from Blog Posts and Its Applications to Opinion Mining Huan-An Kao, Hsin-Hsi Chen Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan

More information

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 70 CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 3.1 INTRODUCTION In medical science, effective tools are essential to categorize and systematically

More information

Supplement to. Logic and Computer Design Fundamentals 4th Edition 1

Supplement to. Logic and Computer Design Fundamentals 4th Edition 1 Supplement to Logic and Computer esign Fundamentals 4th Edition MORE OPTIMIZTION Selected topics not covered in the fourth edition of Logic and Computer esign Fundamentals are provided here for optional

More information

Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors

Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors A. Fabri 1 and P. Recht 2 1 Universität Dortmund a.fabri@wiso.uni-dortmund.de 2 Universität Dortmund p.recht@wiso.uni-dortmund.de

More information

A Self-Organized Femtocell for IEEE e System

A Self-Organized Femtocell for IEEE e System A Self-Organized Femtocell for IEEE 80.16e System Young Jin Sang, Hae Gwang Hwang and Kwang Soon Kim School of Electrical and Electronic Engineering, Yonsei University 134, Shinchong-dong, Seodaemun-gu,

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Zigbee Based Indoor Location Tracking System

Zigbee Based Indoor Location Tracking System Zigbee Based Indoor Location Tracking System Vishal Shinde 1, Prof. R. N. Panchal 2, Prof. J.R.Panchal 3 Student, Department of Electronics and Telecommunication, Siddhant College of Engineering, Savitribai

More information

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,

More information

Initialization Protocols for IEEE Based Ad Hoc Networks Λ

Initialization Protocols for IEEE Based Ad Hoc Networks Λ Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Object Tracking System Using Motion Detection and Sound Detection

Object Tracking System Using Motion Detection and Sound Detection Object Tracking System Using Motion Detection and Sound Detection Prashansha Jain Computer Science department Medicaps Institute of Technology and Management, Indore, MP, India Dr. C.S. Satsangi Head of

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

Agilent E7478A GPRS Drive Test System

Agilent E7478A GPRS Drive Test System Agilent E7478A GPRS Drive Test System Product Overview Quickly deploy your GPRS networks and manage multiformat environments Our drive test solution doesn t just uncover problems on your GPRS network it

More information

CCP: Conflicts Check Protocol for Bitcoin Block Security 1

CCP: Conflicts Check Protocol for Bitcoin Block Security 1 CCP: Conflicts Check Protocol for Bitcoin Block Security Chen Yang Peking University, China yc900@pku.edu.cn Abstract In this work, we present our early stage results on a Conflicts Check Protocol (CCP)

More information

A deployment procedure for wireless sensor networks

A deployment procedure for wireless sensor networks A deployment procedure for wireless sensor networks Tzu-Che Huang, Hung-Ren Lai and Cheng-Hsien Ku Networks and Multimedia Institute, Institute for Information Industry tzuche@nmi.iii.org.tw Abstract Since

More information

Property Maintenance & Operations Manual Training

Property Maintenance & Operations Manual Training Property Maintenance & Operations Manual Training Introduction to Property Operations Management and Building Security October 16, 2007 Property Maintenance & Operations Manual Training April 12, 2007

More information

An IoT-Aware Architecture for Smart

An IoT-Aware Architecture for Smart An IoT-Aware Architecture for Smart Healthcare System Presented By: Amnah Allboani Abstract Smart hospital system (SHS) relies on complementary technologies specifically RFID, WSN, and smart mobile, interoperating

More information

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network

Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network Send Orders for Reprints to reprints@benthamscience.ae 690 The Open Electrical & Electronic Engineering Journal, 2014, 8, 690-694 Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation

More information

Processing Continuous Range Queries on Moving Objects using a Bit Vector Based Index *

Processing Continuous Range Queries on Moving Objects using a Bit Vector Based Index * Processing Continuous Range Queries on Moving Objects using a Bit Vector Based Index * I-Fang Su 1, Chang-Ming Tsai 2, Yuan-Ko Huang 3, Chieh-Ling Huang 2, Jwu-Jenq Chen 2, and Yu-Chi Chung 2, a 1 Department

More information

3D HAND LOCALIZATION BY LOW COST WEBCAMS

3D HAND LOCALIZATION BY LOW COST WEBCAMS 3D HAND LOCALIZATION BY LOW COST WEBCAMS Cheng-Yuan Ko, Chung-Te Li, Chen-Han Chung, and Liang-Gee Chen DSP/IC Design Lab, Graduated Institute of Electronics Engineering National Taiwan University, Taiwan,

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information