A wireless sensor network for visual detection and classification of intrusions
|
|
- Maude May
- 5 years ago
- Views:
Transcription
1 A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang Technological University, Blk N4 Nanyang Avenue SINGAPORE 3 SWPS, ul.chodakowska 19/31, Warszawa POLAND Abstract: - The paper reports works on a wireless sensor network supporting a huan operator onitoring a wide area of an unstructured environent. The ain objective is to develop echaniss allowing intelligent preliinary analysis of data (captured by a large nuber of sensing devices, including caeras) so that the huan intervention is needed only for cases identified as potentially dangerous intrusions. The developed feasibility-study platfor contains two types of nodes: relatively siple warning nodes with a variety of sensors detecting a potential presence of intruders (proxiity, vibration, agnetic activity, noise, etc.) and ore sophisticated nodes equipped with caeras and capable to perfor coplex iage analysis tasks so that the intrusion can be visually verified and (possibly) classified before involving a huan operator. The nodes can wirelessly counicate using a standard protocol. Several echaniss of visual detection have been proposed and ipleented. Thus, the actual details of a network for a given application can be optiized, taking into account the current conditions, hardware constraints and user-defined requireents. Generally, iniization of the wirelessly transitted data is of high priority. The paper briefly overviews the developed platfor and discusses ethodologies of the algoriths used in the syste. Soe ipleentation details are not disclosed. Key-Words: - visual surveillance, sensor network, FPGA, intrusion detection and classification 1 Introduction Although visual surveillance in considered the ost effective ethod of onitoring coplex environents, systes that could perfor such a task fully autonoously and reliably are still very difficult to build. In less abitious (but ore realistic) scenario, a huan operator can be supported by a visual surveillance syste that can autoatically handle typical situations. The huan intervention is needed only in special situation (or situations involving decisions which are reserved for huans). In this paper we report developent of wireless sensor network that is based on the aboveentioned concept. The network is supposed to onitor a relatively large area (and to detect intruders in this area) using sensor nodes (usually deployed randoly or partially randoly) of two types. The first-level nodes (which would be ore nuerous) contain relatively siple sensors detecting nonvisual signatures of intruders. When a potential presence of an intruder is detected, the second-level nodes are wirelessly activated. The second-level nodes are equipped with caeras that (upon activation of the node) capture iages of the area where the intrusion is suspected. The iages are subsequently processed by the digital hardware (FPGA) of the node in order to classify and possibly identify the intruder. If the node is unable to categorize the intrusion, the intruder s iage can be wirelessly transitted to a higher decision level, possibly involving a huan operator. In Section 2 of the paper, we briefly present the developed hardware platfor. Section 3 discusses iage processing algoriths used in the secondlevel nodes to classify intruders. More advanced techniques of intrusion identification (perfored by the host coputer using data transitted by the second-level nodes) are presented in Section 4. Section 5 suarizes the paper and highlights directions for the future works. 2 Description of the Network Coponents The developed network consists of an unspecified nuber of nodes no predefined structure of the network is envisaged. The first-level nodes (Fig. 1)
2 incorporate a wireless counication chip, a lowcost icrocontroller (perforing sensor data acquisition, generatingf wirelessly-transitted essages and interfacing the wireless chip) and basic non-vision sensors. Battery power supply is provided. Currently, only infrared proxiity sensors and vibrations sensors are used, but other additional options are planned (and the corresponding sensors are available). Therefore, only the kernel of a second-level node would be peranently active, while the other parts (e.g. the caeras) are activated only when a warning essage fro the first level is received. Two option are possible: (1) a second-level node can be activated by any first-level node within the wireless range or (2) a second-level level node can be activated by selected first-level nodes (i.e. the warning essages containing identifiers of other nodes are ignored). Fig. 1. The first-level node of the network. The sensors of first-level nodes onitor conditions in the protected area and act as preliinary detectors of possible intrusions. A possible intrusion is defined as a particular coincidence of sensor readings. Various definitions of possible intrusions can be used, either for different applications or within the sae application. Whenever a possible intrusion is sensed, the node wirelessly transits a essage containing the node identifier and (if several definitions of possible intrusions are siultaneously used) the type of sensed intrusion. To provide a higher level of reliability, the essage ay be repeated several ties. A standard counication protocol for low-power wireless networks is used. The second-level nodes area built around an FPGA odule that can control up to four caeras. Additionally, the nodes are equipped with the sae wireless counication coponents as the firstlevel nodes. Typically, one second-level node is associated with several first-level nodes, but the network structure is not peranent. As an illustration, a typical fragent of the network is shown in Fig. 2. Low energy consuption in the network nodes is a crucial issue since very long operational lifetie is expected. In the first-level nodes, this is achieved by using high perforance batteries and low-power coponents. Thus, the nodes can be peranently active during their whole operational lifetie. In the second-level nodes, power consuption by both FPGA s and caeras is relatively high. Fig. 2. Fragent of the network. Upon activation, a second-level node caera captures a short sequence of iages (typically two or three) that are subsequently processed using dedicated algoriths ipleented in the node s FPGA. In general, the purpose of iage processing is to extract the possible intruders fro a captured iage and to classify/identify the. After the task is copleted, selected fragents of caera-captured iages and/or other results produced by the algoriths ay be wirelessly transitted to higherlevel coponents of a decision syste (possibly including a huan operator). Additionally, the second-level nodes can be periodically activated in order to update the background iage (see Section 3). In general, the peak energy consuption in a second-level node ay be high, but the average power requireents could be low enough to provide long operational lifetie. In the prototype platfor, power is supplied by a DC adaptor. The prototype second-level nodes are built around a coercially available FPGA developent board (see Fig. 3). However, only selected resources available in the board are used in the prototype (as shown in Fig. 3). In the final product, a less powerful FPGA will be possibly used.
3 Details of iage processing algoriths ipleented in the second-level nodes are discussed in Section 3. Fig. 3. Coponents of the FPGA developent board used in the second-level node. Fig. 5. An exeplary scene containing an intruder. 3 Iage Processing in Intrusion Detection 3.1 Extraction of Intruder s Silhouettes When a caera attached to a second level node captures an iage of the suspected intrusion area, the first iage processing operation is extraction of fragents not present in the background iage currently eorized in the node. Although such an operation can be (hypothetically) ipleented as a siple iage subtraction, a ore sophisticated ethod is needed for scenarios of realistic coplexity. In general, the scene background ay be affected by both illuination variations and inor configuration changes (e.g. swaying trees, grass, vibrations of the network nodes, etc.). Fig. 4. An exeplary background iage captured by the caera. Fig. 6. Intruder s silhouettes extracted by the proposed algoriths (both versions are shown). The first proble can be solved by occasional background updates (see the later part of this section) but for the second one, a ore sophisticated approach has been proposed. In the developed syste, we apply a cobination of subtractions in RGB space (with a threshold defining the acceptable differences) followed by a sequence of selected
4 orphological operations. The purpose of the orphological operations is to filter out differences caused by inor configuration changes. The extracted silhouettes of intruders are available in two different fors: either as a binary blob of the intruder s shape or as a full iage within the extracted silhouette. Exaples of the original scene, the scene with the intruder, and two variants of the intruder s silhouette are shown in Figs 4, 5 and 6. The intruder s silhouettes can be subsequently used for either visual identification or for further analysis and classification of the intrusion. In the actual ipleentation of the ethod, two (or possibly ore) iages of the intruded area are captured, and the silhouettes are extracted fro both iages. The presented syste has been designed under the general assuption that the intruders can be associated with other physical phenoena, so that relatively siple sensors (proxiity, vibration, agnetic, etc.) can be used as warning devices indicating a potential presence of intruders. Thus, if there is a change in the caera-captured iages without the presence of the corresponding sensor warnings, it should be considered a background change rather than intrusion. Therefore, the algorith used for intruder extraction can also be used for periodical background update. It is particularly useful if the background change is due to rapid illuination changes (additional shadows, etc.). For slow changes of the background a siple correlation ethod has been ipleented based on the following forula: r = ( n n ( A ( A n A)( B 2 A)) ( n n B) ( B B)) 2 (3.1) Where A and B are the current background and a new iage, respectively. The background is updated when the value of r reaches the predefined threshold. 3.2 Further Analysis of Silhouettes Detected intruders can be further characterized by using selected features of their binary silhouettes. The proposed features are oents of low order, fro which several useful descriptors of the intruders can be derived. In particular, the type of intruder s obility can be broadly categorized by coparing the low order oents of the silhouettes extracted fro a pair of subsequently captured iages. The exaple in Fig. 7 shows a pair of (overlapping) silhouettes of a huan. A siple coparison of the low order oents calculated fro both silhouettes, would indicate that a vertical intruder of irregular shape is oving toward the node and turning to the left. The speed of otion can be estiated based on the size changes and displaceents of the gravity centre. Such a characteristic could be a sufficient evidence to recognize the intruder as a huan. In case of soe an-ade objects, the silhouettes extracted fro the iages would have ore consistent shapes so that a broad classification of such objects can be done within the second-level node by using oent invariants (eg. [2], [3]). Generally, intrusions that can be satisfactorily identified at the second-level node are not sent for visual verification by a huan operator. Unknown cases, however, have to be inspected. The iages of such intruders would be wirelessly transitted to the next level (which would usually incorporate a huan operator). In order to save the bandwidth, actually only the full-iage silhouettes (or their rectangular outlines) are transitted. Another prospective application of the full-iage silhouettes is discussed in the next section. Fig. 7. Intruder s silhouettes extracted fro two consecutive iages (the green area is shared by both silhouettes). 4 Advanced Method of Intruder Identification The shape-based ethods discussed in Section 4
5 would fail in ost cases where intruders are only partially visible. Therefore, selected ethods that have been originally intended for vision-based robotic navigation are being adopted for the developed syste. The proposed approach is based on detection and atching interest points in relative scale (e.g. [4], [5]). Interest points (soeties referred to as corner points) are easily perceivable sall areas where the corner response (based on the atrix of 2D partial derivatives of the iage intensities - see [X]) reaches its local axiu. Exaples of interest points autoatically found in two iages of real objects are shown in Fig. 8. Fig. 8. Two exaples of object iages with autoatically extracted interest points. If an object of interest is represented by a dataset of its interest points (including geoetric relations between the points) an iage of such an object can be hypothetically identified atching iageextracted interest points to the dataset. The ajor practical difficulties, i.e. sensitivity to illuination variation, scale of the objects and perspective distortions of 3D objects, have been successfully solved in the algorith presented in [7] and [8]. Exeplary results of atching interest point of a odel object and a caera-captured iage of a partially visible object (under different illuination conditions and in a different scale) are presented in Fig. 9. With a sufficient nuber of interest points atched, the presence of an object of interest can be positively verified in the caera-captured iage. Therefore, the identification of intruders by using their silhouettes can be done using the sae principle. Interest points are detected within the intruder s silhouettes (full-iage) and their paraeters would be wirelessly transitted to a higher level syste that contains a database of know objects. If the intruder can be verified based on the interest points, the huan assistance is not required. Fig. 9. Interest points in a odel object and their correspondences is geoetrically and photoetrically distorted iage of the object. 4 Conclusions The syste reported in this paper has been ipleented using coercially available developent boards (RC200 FPGA developent boards and Eber icrocontroller boards). The final prototype odel, however, will have a dedicated architecture designed based on conducted tests and further analysis and researches. Siilar concepts of an FPGA-based wireless sensor network are discussed in details in [1]. Although the paper highlights ostly the iage processing aspects of the developed systes, other coponents also play iportant roles in the overall functionality of the network. It can be briefly entioned that echaniss for reliable wireless transission have been ipleented in the syste (including on-chip ipleentation of AES-128 encryption algorith). Additional tests and experients are needed, however, to identify the ost suitable wireless protocols. Developent of a proprietary protocol is seriously taken as a feasible alternative. In the future, further developent is envisaged that ay lead to a coercially available product.
6 4 Acknowledgent The authors gratefully acknowledge the support and funding fro IntelliSys Research Centre, a partnership between Nanyang Technological University and Singapore Technologies Engineering. References: [1] Bellis, S.J. et al. Developent of field prograable odular wireless sensor network nodes for abient systes. Coputer Counications, to appear, [2] Hu M.K. Visual pattern recognition by oent invariants. IRE Trans.Inf.Theory vol.8, pp , [3] Maitra, S. Moent invariants, Proc. of IEEE, vol. 67(4), pp , [4] Mikolajczyk, K. and Schid, C. Scale & affine invariant interest point detectors, International Journal of Coputer Vision, vol. 60(1), pp , [5] Schid, C., Mohr, R. and Bauckhage, C. Evaluation of interest point detectors, International Journal of Coputer Vision, vol. 37(2), pp , [6] Harris, C. and Stephens, M. A cobined corner and edge detector, 4 th Alvey Vision Conference, Manchester, pp , [7] Isla, M.S. et al. Towards invariant interest point detection in an object, Conf. WSCG'2005, Plzen, pp , [8] Isla, M.S., Sluzek, A. and Zhu, L. Representing and Matching the Local Shape of an Object, Conf. MIRAGE 2005, Rocquencourt, pp 9-16, 2005.
Feature Based Registration for Panoramic Image Generation
IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh
More informationNovel Image Representation and Description Technique using Density Histogram of Feature Points
Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationA Novel 2D Texture Classifier For Gray Level Images
2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationVision Based Mobile Robot Navigation System
International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of
More informationIMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco
IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationSecure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationEffective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion
Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationMGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor
International Journal of Coputer Theory and Engineering, Vol 5, No, February 0 MGS-SIFT: A New Illuination Invariant Feature Based on SIFT Descriptor Reza Javanard Alitappeh and Fariborz Mahoudi Abstract
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationFeature based stereo correspondence using moment invariant
University of Wollongong Research Online Faculty of Inforatics - Papers (Archive) Faculty of Engineering and Inforation Sciences 008 Feature based stereo correspondence using oent invariant Prashan Prearatne
More informationPROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER
nd International Congress of Mechanical Engineering (COBEM 3) Noveber 3-7, 3, Ribeirão Preto, SP, Brazil Copyright 3 by ABCM PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationSimulated Sensor Reading. Heading. Y [m] local minimum ; m. local maximum ; M. discontinuity ; D. connection ; c X [m]
Localization based on Visibility Sectors using Range Sensors Sooyong Lee y Nancy. Aato Jaes Fellers Departent of Coputer Science Texas A& University College Station, TX 7784 fsooyong,aato,jpf938g@cs.tau.edu
More informationColorado School of Mines. Computer Vision. Professor William Hoff Dept of Electrical Engineering &Computer Science.
Professor Willia Hoff Dept of Electrical Engineering &Coputer Science http://inside.ines.edu/~whoff/ 1 Caera Calibration 2 Caera Calibration Needed for ost achine vision and photograetry tasks (object
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationRelief shape inheritance and graphical editor for the landscape design
Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More information3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search
436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationRegion Segmentation Region Segmentation
/7/ egion Segentation Lecture-7 Chapter 3, Fundaentals of Coputer Vision Alper Yilaz,, Mubarak Shah, Fall UCF egion Segentation Alper Yilaz,, Mubarak Shah, Fall UCF /7/ Laer epresentation Applications
More informationAction Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs
International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationOn Fusion of Gated Imaging and Local Shape Features for Identification of Objects in Cluttered Scenes
Proceedings of the 6th WSEAS International Conference on Robotics, Control and Manufacturing Technology, Hangzhou, China, April 16-18, 006 (pp187-19) On Fusion of Gated Imaging and Local Shape Features
More informationAffine Invariant Texture Analysis Based on Structural Properties 1
ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern
More informationAn Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationNEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS
NEW APPROACHES FOR REAL TIME TRAFFIC DATA ACQUISITION WITH AIRBORNE SYSTEMS I. Ernst a *, M. Hetscher a, K. Thiessenhusen a, M. Ruhé a, A. Börner b, S. Zuev a a DLR, Institute of Transportation Research,
More informationRedundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network
(IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationAn Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationRECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,
More informationFeature-Centric Evaluation for Efficient Cascaded Object Detection
IEEE Conference on Coputer Vision and Pattern (CVPR, 2004 Feature-Centric Evaluation for Efficient Cascaded Object Detection Henry Schneideran 1 Robotics Institute Carnegie Mellon University Pittsburgh,
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More information3D Human Action Recognition using Hu Moment Invariants and Euclidean Distance Classifier
Vol. 8, No. 4, 017 3D Huan Action Recognition using Hu oent Invariants and Euclidean Distance Classifier Fadwa Al-Azzo Syste Engineering Departent University of Arkansas at Little Rock Arkansas, USA Arwa
More informationMirror Localization for a Catadioptric Imaging System by Projecting Parallel Lights
2007 IEEE International Conference on Robotics and Autoation Roa, Italy, 10-14 April 2007 FrC2.5 Mirror Localization for a Catadioptric Iaging Syste by Projecting Parallel Lights Ryusuke Sagawa, Nobuya
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationHand Gesture Recognition for Human-Computer Interaction
Journal of Coputer Science 6 (9): 002-007, 200 ISSN 549-3636 200 Science Publications Hand Gesture Recognition for Huan-Coputer Interaction S. ohaed ansoor Rooi, R. Jyothi Priya and H. Jayalakshi Departent
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationIntelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision
Recent Researches in Syste Science Intelligent Robotic Syste with Fuzzy Learning Controller and D Stereo Vision SHIUH-JER HUANG Departent of echanical Engineering National aiwan University of Science and
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology
ELEN 689-603: Project Progress eport Second Order Delay Coputation for C networks wi Non-Tree Topology ajeshwary Tayade 000 07 573 //003 PDF created wi pdffactory trial version www.pdffactory.co : Introduction
More informationComparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types
Coparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Aritz Sánchez de la Fuente, Patrick Ndjiki-Nya, Karsten Sühring, Tobias Hinz, Karsten üller, and Thoas
More informationFair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient
More informationSupplementary Section. A. Algorithm. B. Datasets. C. More on Labeling Functions
Suppleentary Section In this section, we include ore details about our algorith, labeling functions, datasets as well as additional results and coparisons, which could not be included in the ain paper
More informationEFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.
EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study
More informationA New Generic Model for Vision Based Tracking in Robotics Systems
A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University
More informationDynamical Topology Analysis of VANET Based on Complex Networks Theory
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationAn Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints
519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationAbstract. 2. Segmentation Techniques. Keywords. 1. Introduction. 3. Threshold based Image Segmentation
International Journal of Advanced Coputer Research (ISSN (print): 49-777 ISSN (online): 77-7970) Volue-3 Nuber- Issue-8 March-03 MRI Brain Iage Segentation based on hresholding G. Evelin Sujji, Y.V.S.
More informationAscending order sort Descending order sort
Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract
More informationA Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm
International Journal of Mechanical Engineering and Robotics Research Vol. 5, o., January 06 A Method of Generating Multi-Scale Disc-Like Distributions for D Registration Algorith Hyunki Hong and Beohee
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationThe Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network
The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationLighting Control System with Low Rate Network Green Computing System. Abstract
The 2 nd RMUTP International Conference 2010 Page 24 Lighting Control Syste with Low Rate Network Green Coputing Syste Wanapun Waiyawut Departent of Coputer Engineering, Faculty of Engineering, Rajaangala
More informationData Acquisition of Obstacle Shapes for Fish Robots
Proceedings of the 2nd WEA International Conference on Dynaical ystes and Control, Bucharest, oania, October -17, 6 Data Acquisition of Obstacle hapes for Fish obots EUNG Y. NA, DAEJUNG HIN, JIN Y. KIM,
More informationThe Horizontal Deformation Analysis of High-rise Buildings
Environental Engineering 10th International Conference eissn 2029-7092 / eisbn 978-609-476-044-0 Vilnius Gediinas Technical University Lithuania, 27 28 April 2017 Article ID: enviro.2017.194 http://enviro.vgtu.lt
More informationA Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation
28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationFeature Selection to Relate Words and Images
The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationA Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,
A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer
More informationImprove Peer Cooperation using Social Networks
Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding
More informationINTRINSIC DECOMPOSITION FOR STEREOSCOPIC IMAGES
INTRINSIC DECOMPOSITION FOR STEREOSCOPIC IMAGES Dehua Xie 1, Shuaicheng Liu 1, Kaio Lin 2, Shuyuan Zhu 1, and Bing Zeng 1 1 School of Electronic Engineering, University of Electronic Science and Technology
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationCOLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS
International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde
More informationModal Masses Estimation in OMA by a Consecutive Mass Change Method.
Modal Masses Estiation in OMA by a Consecutive Mass Change Method. F. Pelayo University of Oviedo, Departent of Construction and Manufacturing Engineering, Gijón, Spain M. López-Aenlle University of Oviedo,
More informationA Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design
A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India
More informationRelocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction
Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,
More informationA Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems
A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,
More information(Geometric) Camera Calibration
(Geoetric) Caera Calibration CS635 Spring 217 Daniel G. Aliaga Departent of Coputer Science Purdue University Caera Calibration Caeras and CCDs Aberrations Perspective Projection Calibration Caeras First
More informationA Discrete Spring Model to Generate Fair Curves and Surfaces
A Discrete Spring Model to Generate Fair Curves and Surfaces Atsushi Yaada Kenji Shiada 2 Tootake Furuhata and Ko-Hsiu Hou 2 Tokyo Research Laboratory IBM Japan Ltd. LAB-S73 623-4 Shiotsurua Yaato Kanagawa
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationDevelopment and self-calibration of a robotic visual inspecting system
nd International Conference on Machinery, Electronics and Control Siulation (MECS 7) Developent and self-calibration of a robotic visual inspecting syste Chengyi Yu, a, Xiaobo Chen,b and Juntong Xi3,c
More informationG045 3D Multiple Attenuation and Depth Imaging of Ocean Bottom Seismic Data
G045 3D Multiple Attenuation and Depth Iaging of Ocean Botto Seisic Data J. Mispel* (StatoilHydro ASA), B. Arntsen (StatoilHydro ASA), A. Kritski (StatoilHydro ASA), L. Aundsen (StatoilHydro ASA), M. Thopson
More informationHIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES
HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationMinimax Sensor Location to Monitor a Piecewise Linear Curve
NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner
More informationFINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS*
irnper neuvork protocols. A. Danthine. editor, 'iniversite de liege. I'->7X. F3 FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS* Gregor V. Bochann Departeent de Matheatiques Ecole Polytechnique Federals
More informationDevelopment of an Integrated Cost Estimation and Cost Control System for Construction Projects
ABSTRACT Developent of an Integrated Estiation and Control Syste for Construction s by Salan Azhar, Syed M. Ahed and Aaury A. Caballero Florida International University 0555 W. Flagler Street, Miai, Florida
More informationAsynchronous Distributed Data Parallelism for Machine Learning
Asynchronous Distributed Data Parallelis for Machine Learning Zheng Yan, Yunfeng Shao Shannon Lab, Huawei Technologies Co., Ltd. Beijing, China, 100085 {yanzheng, shaoyunfeng}@huawei.co Abstract Distributed
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationGlobal Optimization of Transmitter Placement in Wireless Communication Systems
Global Optiization of Transitter Placeent in Wireless Counication Systes J. He, A. Verstak, L. T. Watson, T. S. Rappaport, C. R. Anderson, N. Raakrishnan, C. A. Shaffer, W. H. Tranter, K. Bae, J. Jiang
More information