Reliability improvement for an RFID-based psychiatric patient localization system q,qq
|
|
- Ashlyn Melinda Day
- 5 years ago
- Views:
Transcription
1 Available online at Computer Communications 31 (2008) Reliability improvement for an RFID-based psychiatric patient localization system q,qq Chieh-Ling Huang a,b, Pau-Choo Chung a,b, *, Ming-Hua Tsai a,b, Yen-Kuang Yang c, Yu-Chia Hsu d a Department of Electrical Engineering, National Cheng-Kung University, 1 University Road, Tainan 70101, Taiwan, ROC b Institute of Computer and Communication, National Cheng-Kung University, Tainan 70101, Taiwan, ROC c Department of Psychiatry, National Cheng Kung University, Medical College, 138, Sheng-Li Road, Tainan 704, Taiwan, ROC d Advanced e-commerce Institute, Institute for Information Industry, 22F-A, 333 Sec. 2 Duenhua S. Road, Taipei 106, Taiwan, ROC Received 7 March 2007; accepted 6 January 2008 Available online 16 January 2008 Abstract Collaboration between Field Generators, Readers and Tags generates the required functions in using radio frequency identification (RFID) for psychiatric patient localization. The Field Generator continually transmits trigger signals within its transmission range. When a Tag, which a patient wears, receives a trigger signal from a Field Generator, the Tag responds to a Reader with its own ID and ID of the Field Generator that issues the trigger. Based on Field Generator IDs that a Tag responds to, the location of the patient wearing the Tag can be estimated approximately. However, in recent RFID based localization systems, certain phenomena impact the reliability of signal transmission and decrease the feasibility of the localization system. To eliminate interference from different Field Generators, this study presents a novel graph coloring with merging and deletion (GCMD) algorithm for such a localization system that eliminates interference from Field Generators located near each other. Experimental results indicate that the GCMD algorithm significantly improves localization system reliability, thereby increasing the feasibility of RFID for psychiatric patient localization. Ó 2008 Elsevier B.V. All rights reserved. Keywords: RFID; Localization; Graphic coloring; Reliability 1. Introduction Psychiatric patients often cannot control their actions, occasionally resulting in dangerous behavior. Therefore, q The authors are corresponding with the Smart Media and Intelligent Living Excellence (SMILE) Lab. qq This work was supported by the Applied Information Services Development and Integration project of Institute for Information Industry and National Science Council, Taiwan, ROC, under Grant NSC E * Corresponding author. Address: Department of Electrical Engineering, National Cheng-Kung University, 1 University Road, Tainan 70101, Taiwan, ROC. Tel.: x62373; fax: / addresses: kaio@ee.ncku.edu.tw (C.-L. Huang), pcchung@ee. ncku.edu.tw (P.-C. Chung), q @mail.ncku.edu.tw (M.-H. Tsai), ykyang@mail.ncku.edu.tw (Y.-K. Yang), ychsu@iii.org.tw (Y.-C. Hsu). continuously monitoring patients is crucial to treating psychiatric patients. For patients with relatively severe psychiatric disorders, care centers are regarded essential. Effectively caring for of such psychiatric patients should include protecting patients from danger, being aware of treatment progress, and preventing patients from leaving a care center. To achieve these care objectives, radio frequency identification (RFID) devices, which are small and relatively cheap, can effectively monitor the location of psychiatric patients. RFID technology has been utilized in various applications, including supply chain management [1], entry and exit control [2]. Such applications have the same attributes, i.e., the monitored objects cannot move of freely. Localizing moving objects, e.g., freight localization or human localization [3] is a challenging and relatively unexplored task. Interference and miss detection are challenges /$ - see front matter Ó 2008 Elsevier B.V. All rights reserved. doi: /j.comcom
2 2040 C.-L. Huang et al. / Computer Communications 31 (2008) typically associated with localizing moving objects. Interference decreases reliability in using RFID for position localization. Several studies have focused on hardware and software when investigating RFID reliability [4]. Investigating antenna design based on free space architecture [5,6] originates from a hardware perspective. Experiments have demonstrated that a passive RFID system has an extremely limited operational range, which can be further decreased due to morphology distortion. In certain applications in which Tags are placed on objects, bending object surfaces can also result in degradation of signal propagation, therefore causing poor reliability. In this scenario, an antenna structure with minimal sensitivity to morphology distortion should be utilized [7]. On the other hand, integrating time hopping code division multiple access (CDMA), cyclic redundacy check (CRC) error detection and repetition of transmission has been utilized to eliminate the collision problem [8]. The Colorwave algorithm [9] is a simple, distributed and on-line algorithm for the Reader collision problem in RFID systems. Pure ALOHA [10] and slot ALOHA [11] are common methods that use repetitive transmission to improve successful transmission probability. Pure ALOHA uses the Poisson model to evaluate the time interval between two repetitive transmissions. The slot ALOHA utilizes Markov probability to derive the number of time slots and response time required to attain a predetermined successful transmission rate. Experimental evidence demonstrated that a reduction in reliability caused by Field Generator interference is an important issue when using RFID to localize psychiatric patients. To resolve this problem, this paper proposed a graph coloring with merging and deletion (GCMD) algorithm for scheduling operation of Field Generators. The GCMD algorithm transforms deployment of Field Generators into a graph with vertices representing Field Generators and each edge between two vertices representing a signal range overlapping between two associated Field Generators. The coloring algorithm is then employed to cluster the Field Generators into groups. Subsequently, the time division multiple access (TDMA) algorithm can be utilized to schedule the operating slots for each group, such that each group operates in a mutually exclusive non-overlapped period. Consequently, the vertices must be classified into the smallest number of groups possible. To attain this aim, this study proposes merging and deletion of vertices based on a Field Generator relationship criterion, such that the graph can be effectively simplified. Thus, the number of groups is minimized, and system performance and reliability are improved. The remainder of this paper is organized as follows. First, the RFID-based psychiatric patient localization system is described in Section 2. Section 3 describes the GCMD scheduling approach. The criteria developed for merging and deletion are also introduced. Section 4 presents experiment descriptions and experimental results. Localizing reliability comparisons with and without the proposed scheduling algorithm are demonstrated. Finally, conclusions are presented in Section System overview The Department of Psychiatry, National Cheng Kung University Hospital (NCKUH) uses an RFID-based psychiatric patient localization system [3]. The department at NCKUH is the primary center for medical treatment of psychiatric patients in southern Taiwan. The department is located in its own building directly across from the NCKUH. The second floor serves as a clinic for psychiatric patients, and the third floor is an activity area. Psychiatric patients are brought to the building every morning and picked up in the afternoon. Nurses are responsible for scheduling daily activities and providing basic care; doctors are responsible for medical treatment. This RFID-based psychiatric patient localization system uses a ultra high frequency (UHF) long range tracker. The Field Generators operate on 433 MHz when triggering the Tag to respond, and the Tag replies to a Reader with 916 MHz signal once it is triggered. The entire care center is divided into several regions. Each Field Generator is responsible for one region; the coverage for regions overlaps. Fig. 1 presents the deployment of the six Field Generators and one Reader on the first floor of the care center and the grounds. Based on this deployment, Field Generators FG 4, FG 2 and FG 1 together track the rout from the exit to the ground area and main gate. Thus, when psychiatric patients move from Field Generator FG 4 to Field Generator FG 1, or Field Generator FG 2 to Field Generator FG 1, the system signals an alarm to the manager. Fig. 1. Dispose diagram of RFID-based psychiatric patient localization system.
3 C.-L. Huang et al. / Computer Communications 31 (2008) Psychiatric patients in the care center wear watch-like Tags. When patients are within a transmission region of a Field Generator the Field Generator triggers the Tag, and the Tag then transmits information, including Tag ID and Field Generator ID, to the Reader. The Reader then sends the information to a central server, which aggregates information from Readers, that determines the location of a given Tag, and, thus, the patient. Finally, this location information is recorded in a database. To localize patients effectively, the Field Generators must appropriately placed. In this experiment, the care center is on the first floor of the building and the Field Generators are placed on the first floor near the staircase on the first floor, the first floor building exit and around the grounds, and near exit from the grounds to the street. Via the Field Generators in the staircase and at the building exit, patients descending the stairs to the ground area are detected. The Field Generators in the ground area are also used to determine whether the patient is closing the main gate. Thus, the system can monitor patients attempting to leave the grounds. The relative density of Field Generators and reference Tags also computes patient positions and acquires data of patient activity patterns. Statistical analysis of activity patterns provides valuable data for evaluating treatment progress. 3. Reliability improvement with field generator scheduling This RFID-based system for localizing psychiatric patients relies on the Tag correctly receiving signal from the Field Generators to estimate the Tag location. However, two Field Generators with overlapping transmission ranges simultaneously issuing trigger signals to a Tag causes signal interferences in the overlapped region. This interference results in loss of signal and, therefore, decreases localization accuracy. Resolving this problem is necessary for accurate localization. In this section, a GCMD scheduling technique is presented that optimally schedules Field Generators such that overlapping Field Generators operate in mutually exclusive patterns. In this scheme, Field Generator deployment is translated into a graph, and a coloring algorithm is applied to this graph to partition the Field Generators into the minimal number of groups. This partitioning guarantees that Field Generators within the same group do not interfere with each other. A TDMA time division scheduling scheme is applied to groups of Field Generators for alternating the time slots within which each group operates. Thus, when one Field Generator group is operating, the other groups cannot operate. Maintaining the smallest number of Field Generator groups is essential, as the smallest number of groups allows the highest number of Field Generators to operate at any given time. Thus, increased system efficiency can be attained. This study presents a novel merging and deletion scheme that reduces the number of vertices in a graph. Thus, graph size can be reduced and the number of obtained partition groups decreased. The GCMD procedure is described as follows. Fig. 2 presents a flow chart of the GCMD procedure Transform the relationships among all Field Generators into a graph First, the relationships among Field Generators are transformed into an undirected graph G, whereas V and E are sets of vertices and edges, respectively. Where V Fig. 2. The flow chart of GCMD algorithm.
4 2042 C.-L. Huang et al. / Computer Communications 31 (2008) and E are derived based on the Field Generators and their signal region overlapping situations, respectively. 1. Set of vertices (V): Every Field Generator is associated with a vertex in the graph, e.g., vertex iv i represents Field Generator FG i. Then the localization system has Field Generators FG 1,FG 2,... and FG n, and the set of vertices V contains elements of vertices v 1,v 2,... and v n. Thus, the set of vertices for graph G is V(G)= {v 1,v 2,...,v n }. 2. Set of edges (E): Let S u represent the signal region of Field Generator FG u. When any two Field Generators have overlapping signal regions, their associated vertices are connected by an edge. For example, let sets S u and S v represent the signal regions of Field Generators FG u and FG v, respectively. If Field Generators FG u and FG v have overlapping regions, that is S u \ S v 6¼ / (empty set), then there is an undirected edge (u,v) between v u and v v. All these edges comprise the set of edges in graph G as E(G). Thus, all Field Generators and their overlapping signal ranges are transformed into an undirected graph G =(V,E) Vertex deletion and merging Once the graph is constructed, this step reduces the number of vertices in the graph via deletion and merging based on certain criteria Vertex deletion When the range of one Field Generator, FG x,iscompletely covered by other Field Generators, the function of FG x can be replaced by a combination of these other Field Generators. In this scenario, the Field Generator FG x can be removed. Therefore, the vertex deletion is as follows. Theorem 1. Let G be a graph associated with the RFID Field Generator deployment. Let v x be a vertex in graph G with adjacencies v x1,v x2,...,v xp. When S x S x1 [ S x2 [...S xp, then v x can be deleted Vertex merging From the previous discussion, we concluded that two Field Generators with overlapping signal regions are prohibited from transmitting signals simultaneously. However, consider a situation in which the entire overlapping region is covered by a union of Field Generators. In this scenario, other Field Generators can cover the overlapping region, thus enabling these two adjacent Field Generators to simultaneously transmit signals. Consequently, the two vertices associated with the two Field Generators can be merged, and no special care is required to avoid signal interference from the two Field Generators. Thus, Theorem 2 is developed to merge the two adjacent vertices. Theorem 2. If v u and v v are adjacency and have the same adjacencies v k1,v k2,...,v kq that satisfy, (S u \ S v ) S k1 [ S k2 [...\ S kq then v u and v v can be merged to v uv with S uv defined as S uv =(S u [ S v ) (S u \ S v ) Vertex coloring Following vertex deletion and merging, this study obtains a trimmed graph representing Field Generator deployment. Then, a coloring algorithm is applied to the trimmed graph, in which connected vertices are assigned different colors. The Field Generators with the same color are assigned to the same group, and, therefore, can transmit signals simultaneously. Conversely, the Field Generators with different colors are assigned to different groups; scheduling must be applied to avoid signal conflict Operation slot allocation After groping Field Generators, a weighted TDMA is applied to assign time slots for operation to each group. Consider that each partitioned group can occupy different levels of importance. For example, one group can cover a crucial region such as dangerous areas or exits. Thus, this group should be allocated more time slots than other groups. Another consideration is the size of an area covered by a group of Field Generators. Group importance should be assigned based on the size of the area covered by a group of Field Generators. Consequently, the importance factor for each group w i can be approximated. Then based on importance factors, w i, the time slot ratio for each group can be computed as T i ¼ P w i n. Thus, the k¼1 w k slot partition for each group can be based on factors of T i s. 4. Experiments For elucidate system performance, the maximal signal range of each Field Generator in the experimental environment is measured. Fig. 3 illustrates the signal range of each Field Generator. Fig. 4 presents a scenario in which Field Generator ranges overlap. Based on the overlapping scenario shown in Fig. 4, without graph reduction (vertex deletion and merging), the relationship among Field Generators is transformed into a graph (Fig. 5(a)). After the graph coloring is applied, the group results of the Field Generators are shown in Fig. 5(b). In Fig. 5(b), the Field Generators are divided into three groups: group 1 (Field Generators FG 1 and FG 3 ); group 2 (Field Generators FG 2 and FG 5 ); and, group 3 (Field Generators FG 4 and FG 6 ). However, from Fig. 5(a), we can find that vertex v 3 has adjacent vertices v 2, v 4, v 5 and v 6. Additionally, based on a signal range of each Field Generator shown in Figs. 3 and 4, the signal range of Field Generator 3, S 3, is contained within the union of S 2, S 4, S 5 and S 6 ; that is,
5 C.-L. Huang et al. / Computer Communications 31 (2008) Fig. 3. The signal distribution range of each Field Generator. Fig. 4. The mixed state signal situation of all Field Generators. Fig. 5. The graph of associated Field Generators without graph reduction. (a) Graph obtained. (b) Coloring result. S 3 S 2 [ S 4 [ S 5 [ S 6. Thus, according to Theorem 1, vertex v 3 can be deleted from the graph. Thus, after vertex deletion is applied to the graph, the graph of Fig. 6(a) can be obtained. Fig. 6(a) reveals that vertex v 1 and vertex v 4 have the same adjacency, v 2. Also, based on the signal range of each Field Generator shown in Figs. 3 and 4, we have S 1 \ S 4 S 2. Then, according to Theorem 2, vertex v 1 and vertex v 4 are merged into vertex v 1,4. Thus, after vertex merging is applied to the graph, the graph is finally simplified to Fig. 6(b). Applying the coloring algorithm to Fig. 6(b), we can obtains the coloring result of Fig. 6(c), in which Field Generators are divided into two groups: group 1 containing Field Generators FG 1, FG 4 and FG 6 ; and, group 2 containing Field Generators FG 2 and FG 5. On the other hand, as noted, when the coloring algorithm is applied to the original graph without graph reduction, the coloring algorithm requires three groups to partition. Thus, via graph reduction, a reduced number of groups is obtained, and, therefore, the number of Field Generators that can operate simultaneously is increased. In the current RFID system, Tags can be programmed to send out responses periodically (reciprocated regularly) or only when triggered by Field Generators. In this psychiatric patient localization system, a patient s location is computed based on the communication range of the patient s Tag within the Field Generators with respect to ranges of reference Tags. Consequently, Tags are pro-
6 2044 C.-L. Huang et al. / Computer Communications 31 (2008) Fig. 6. The graphic after graph reduction. (a) After vertex deletion. (b) After vertex merging. (c) Coloring result. grammed to report only in response to a Field Generator s trigger. Another issue that requires consideration is increasing the Reader acceptance rate in the scenario in which Tags may generate interference when more than two Tags are sending reports back to the Reader simultaneously. When localizing moving objects, it is almost impossible to schedule Tags as a result of their highly dynamic movement. Currently the most commonly adopted and effective technique for resolving Tag interference is through repetitive transmission. The ALOHA [12] indicates that with sufficient number of transmissions, the ALOHA system achieves a high success rate. Repetitive transmission times in the system are set at 6, and the associated lasting time is T rep. Another parameter associated with a Tag is time in field (TIF) time. Consider the situation in which a Reader receives two consecutive reports from the same Tag. How can the Reader determine whether the two reports are issued due to two separate triggers, or whether the two reports are due to a repetitive response trigger? To resolve this problem, a Tag can be programmed with a TIF Time (T TIF ) that specifies the time duration before the Tag can be triggered again. Another aim of TIF time is to prevent Tags from wasting energy replying to the same trigger from a Field Generator. In these experiments, if a Field Generator continuously sends a trigger signals, in an optimal situation, the Tag is physically trigged once for every T rep + T TIF time period. Thus, every T rep + T TIF is defined as one round. As known, a Tag repeats its response six times. Assume that within these six responses, if one of the six responses in one round is received, this round is regarded as successfully received. Otherwise, this round is considered lost. To measure the reliability value, we define the lost rate of responses L as the total number of lost rounds divided by the total number of rounds that should trigger the Tag: r L ¼ 1 ð1þ T =T rep þ T TIF where r denotes the number of rounds that the Reader successfully received Tag s reply signal and T represents time cost. In this system, it takes roughly three rounds for a patient to move from the building exit to the main gate. Under this scenario, we define response rate R n as: R n ¼ 1 L n ð2þ where n is the number of rounds 3 in this case. To measure reliability improvement using GCMD scheduling, two experimental situations are devised: (1) a fixed-points test and (2) a route test Fixed-points test This experiment is utilized to test the reliability of representative fixed points in the RFID-based localization system with and without the proposed GCMD scheduling. The selected representative fixed points are at the centers of covering regions for all Field Generators, and at the centers of overlapping regions. Fig. 4 presents the covering ranges of the six Field Generators deployed on the first floor. In this scenario, there are 15 fixed positions according to the deployment architecture (Fig. 7). Among these fixed positions, the positions 1 6 reside in single Field Generator range, whereas positions 7 10 are located in the overlapping region of two Field Gen- Fig. 7. Positions for fixed-point test.
7 C.-L. Huang et al. / Computer Communications 31 (2008) Table 1 Results of fixed-points test for the system without scheduling Point number Point number Point number Averaged response Table 2 Results of fixed-points test when GCMD algorithm is applied without graph reduction Point number Point number Point number Averaged response erators; positions are in the overlapped region for three Field Generators; position 15 is in the overlapping region of four Field Generators. These 15 positions taken together comprise various situations for a fixedpoint test. In the fixed-points test, people wearing Tags stand at each fixed position for 1 min; the response rate for each position is computed according to Eq. (2). Table 1 presents the response rate for each fixed point for the system without scheduling, which has a very low average response rate (43.28%). The Field Generator deployment is transformed into a graph. Without graph reduction, namely, vertex deletion and merging, the vertices are partitioned into three groups. The TDMA is then applied to alternately divide time periods into the three Field Generator groups; each group operates for 1 s and the sleeps for 2 s. Table 2 presents the measured response rates for the 15 fixed points. A comparison of fixed-point test results for scheduling (Table 2) with those without scheduling (Table 1) indicates that response rates are dramatically increased following scheduling. In the following experiment, vertex deletion and merging is applied to the graph, followed by the vertex partition. Thus one vertex, v 2, is deleted, and, finally, two groups are acquired for the remaining vertices. Thus, the time periods alternate between the two groups of Field Generators; each Field Generator is in operation for 1 s followed by 1 s of sleep. Thus, the rate of transmission time for each Field Generator is increased from 1/3 to 1/2. Table 3 shows Table 3 Results of fixed-points test when GCMD algorithm is applied Point number Point number Point number Averaged response Table 4 Results of fixed-points test when GCMD algorithm is applied with weighted TDMA Point number Point number Point number Averaged response 86.44
8 2046 C.-L. Huang et al. / Computer Communications 31 (2008) Fig. 8. The routes for reliability test. (a) The route connecting 15 representative points. (b) The route connecting the lowest reliability points. (c) The route connecting the highest reliability points. (d) The route having the shortest path from exit to main gate. (e) The route tracing a region not tested in (a d). the response rates in this experiment. The results obtained without vertex deletion and merging (Table 2) are compared with those applying vertex deletion and merging (Table 3). This comparison reveals that the overall response rate has increased significantly, except for positions 3, 8 and 14 that dramatically decreased. Closely examining these positions indicates that all three positions are either in corners, or very close to building walls (Fig. 7). Further investigation of these conditions is worth of future study. Consider that the signal range area of Field Generator FG 1 (in group 1) covers an entrance and exit, which are very more important. Additionally, group 1 (Field Generators FG 1,FG 4,FG 6 ) covers an area significantly larger than that covered by group 2 (Field Generators FG 2, FG 5 ). Therefore, the rate of allocated transmission time for group 1 is two times that of group 2. Thus, in this experiment, group 1 is assigned 2 s for operation and group 2 is assigned 1 s. Table 4 presents the measurement results for fixed points following this adjustment. Comparing the results after applying weighted TDMA (Table 4) with that apply traditional TDMA (Table 3), it can be observed that the average response rate is increased. Moreover, the response rate of point 1, i.e., nearest to an entrance and exit, is increased to 99.9% Route test Given that patients wearing Tags may stroll around inside the care center, this study also performs reliability tests of this localization system when the patients are strolling around. As such, several routes represent the critical paths designed. Fig. 8 presents the experimental routs, where (a) Route1 is the path passing the 15 representative points, (b) Route2 is the path connecting with poor reliability in the fixed-point test, (c) Route3 is the path connecting points with high reliability, (d) Route4 is the path of shortest distance from the building exit to the main gate and (e) Route5 is a route tracing through a region that is rarely covered by routes (a d). During experiments, people
9 C.-L. Huang et al. / Computer Communications 31 (2008) wearing Tags walk or run along each experimental path. The response rate is computed for each experimental route. Table 5 presents the response rates when the people walk or run on the five routes for the system without scheduling. Among these five routes, Route2 connects the points of the lowest response rate. Thus, according to Table 5, that Route2 has the lowest response rate among the five routes for the walking and running models. Furthermore, given the interferences of signal collision, some routes have rather low response rates. Reducing these interferences involves applying a scheduling to the Field Generators associated with Fig. 5(a). Table 6 presents the response rates after the scheduling algorithm is applied. All response rates have clearly improved significantly. However, as mention earlier, the scheduling on Fig. 5(b) causes the rate of transmission time for each Field Generator to be 1/3. Also mentioned earlier, the GCMD can improve the rate of transmission time from 1/3 to 1/2 in this case. Table 7 illustrates the response rates when GCMD is applied. Comparing the results in Table 6 with those in Table 7 reveals that response rates in the running model are reduced and the walking model is increased following graph reduction in GCMD scheduling algorithm. It may be noticed that graph reduction does not improve response rate. This is not surprising as the functionality of graph reduction is not to increase the response rate, but rather reduce the graph size; consequently a small Table 5 Results of routes test for the system without scheduling Walking model Running model Route number Route number Average response Overall average response Table 7 Results of routes test when GCMD algorithm is applied Walking model Running model Route number Route number Average response Overall average response number of excluded groups are obtained and additional Field Generators can be operate. As mentioned in fixed-point test, the Field Generators in group 1 in this scenario play more critical roles since their signal ranges covers a significantly large area where includes an entrance and exit points. Therefore, the rate of allocated transmission time for group 1 is adjusted to two times that of group 2. Table 8 presents the measurement results of the route test when applying the weighted TDMA. Based on experimental results, the response rates of the RFID-based localization system are significantly enhanced when GCMD scheduling is applied. However, position 3 has very low response rate with and without the GCMD algorithm. Analysis indicated that position 3 is in the furthest corner in this environment (Fig. 7). The Field Generator has difficulty reaching this sharp corner and the Tag cannot reach the Reader. Thus, a Reader is added at position 10. Experimental results indicate that by adding a Reader, response rate for position 3 improves from 0% to 57.81% in the unscheduled original system, and from 14.26% to 83.36% using GCMD scheduling. Notably, transmission time slots should be based on group importance. For group covering important regions or large areas should be allocated increased time periods. Adopting such strategies effectively increases localization system performance. Finally, Fig. 9 presents a summary Table 6 Results of routes test when GCMD algorithm is applied without graph reduction Walking model Running model Route number Route number Average response Overall average response Table 8 Results of routes test when GCMD algorithm is applied with weighted TDMA Walking model Running model Route number Route number Average response Overall average response 93.80
10 2048 C.-L. Huang et al. / Computer Communications 31 (2008) Fig. 9. Reliability comparison for original system and the system with proposed GCMD algorithm. of comparisons of response rates between the original system without GCMD scheduling and the system with GCMD scheduling. 5. Conclusion The RFID devices that are small and relatively cheap are very appropriate for use in localizing psychiatric patients. However, certain phenomena degrade the reliability of signal transmission and decrease feasibility of the localization system. In this study, a GCMD scheduling model is utilized for scheduling Field Generator transmissions in an RFID-based psychiatric patient localization system, thereby reducing interference caused by Field Generators located near one another. The GCMD scheduling scheme transforms relationships among Field Generators into an undirected graph; this graph is then simplified using deletion and merging algorithm proposed herein. Once the graph has been simplified, the GCMD algorithm colors the graph vertex and a weighted TDMA is applied to assign time slots for operation to each group. Experimental results demonstrated that the system is highly effective when using the proposed scheduling algorithm. Acknowledgements This work was supported by the Applied Information Services Development and Integration project of Institute for Information Industry. The authors thank the National Science Council of the Republic of China, Taiwan, for financially supporting this research under Contract No. NSC E References [1] K. Michael, L. McCathie, The Pros and Cons of RFID in supply chain management, International Conference on Mobile Business (2005) [2] F. Wu, F. Kuo, L.W. Liu, The application of RFID on drug safety of inpatient nursing healthcare, in: ACM Seventh International Conference on Electronic Commerce, vol. 113, 2005, pp [3] M.H. Tsai, C.L. Huang, P.C. Chung, Y.K. Yang, Y.C. Hsu, S.L. Hsiao, A psychiatric patients tracking system, IEEE International Symposium on Circuit and Systems (2006) [4] D.H. Shih, P.L. Sun, D.C. Yen, S.M. Huang, Taxonomy and survey of RFID anti-collision protocols, Computer communications 29 (2006) [5] P.R. Foster, R.A. Burberry, Antenna problems in RFID systems, IEE Colloquium on RFID Technology, 1999, 3/1 3/5. [6] J. Siden, P. Jonsson, T. Olsson, G. Wang, Performance degradation of RFID system due to the distortion in RFID tag antenna, in: 11th International Conference on Microwave and Telecommunication Technology, 2001, pp [7] X. Zhou, G. Wang, Study on the influence of curving of tag antennas on performance of RFID system, in: Fourth International Conference on Microwave and Millimeter Wave Technology, 2004, pp [8] Y. Fukumizu, M. Nagata, S. Ohno, K. Taki, A design of transponder IC for highly collision resistive RFID systems, in: IEEE Asia-Pacific Conference on Advanced System Integrated Circuits, 2004, pp [9] J. Waldrop, D.W. Engels, S.E. Sarma, Colorwave: an anticollision algorithm for the reader collision problem, IEEE International Conference on Communications 2 (2003) [10] B. Zhen, M. Kobayashi, M. Shimizu, To read transmitter only RFID tags with confidence, in: 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, vol. 1, 2004, [11] H. Vogt, Multiple object identification with passive RFID tags, IEEE International Conference on Systems, Man and Cybernetics 3 (2002). [12] A.S. Tanenbaum, Computer Networks, fourth ed., Prentice Hall PTR, New Jersey, 2003, pp
Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks
Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks Jihoon Choi and Wonjun Lee Division of Computer and Communication Engineering College of Information
More informationAnalysis and Simulation of RFID Anti-collision Algorithms
Analysis and Simulation of RFID Anti-collision Algorithms Tao Cheng, Li Jin School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 44, P.R.China E-mail: chtao@bjtu.edu.cn
More informationAn Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles
2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles
More informationProceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29,
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 211 Design and Implementation of Low Power Network Maintenance Protocols
More informationAn Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification Su-Ryun Lee Ajou University Department of Electrical and Computer Engineering Suwon, Korea srlee@ajouackr Sung-Don Joo LG
More informationBandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments
Tamkang Journal of Science and Engineering, Vol. 13, No. 1, pp. 1 9 (2010) 1 Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless
More informationCHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW)
33 CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) In a RFID based communication system the reader activates a set of tags, and the tags respond back. As outlined
More informationLinear Quadtree Construction in Real Time *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26, 1917-1930 (2010) Short Paper Linear Quadtree Construction in Real Time * CHI-YEN HUANG AND YU-WEI CHEN + Department of Information Management National
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico di Torino Porto Institutional Repository [Other] Introducing probability in Colorwave Original Citation: Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo (2011).
More informationAchieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless
More informationEfficient Dual Bias Q-Algorithm and Optimum Weights for EPC Class 1 Generation 2 Protocol
Efficient Dual Bias Q-Algorithm and Optimum Weights for EPC Class 1 Generation 2 Protocol Dongwook Lee, Okkyeong Bang, Sooyeol Im, and Hyuckjae Lee School of Electrical Engineering Information and Communications
More informationAmeliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks
Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating
More informationSome Results on the Incidence Coloring Number of Chordal Rings *
Some Results on the Incidence Coloring Number of Chordal Rings * Kung-Fu Ding, Kung-Jui Pai,+ and Ro-Yu Wu Department of Industrial Engineering and Management, Ming Chi University of Technology, New Taipei
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationPower-Mode-Aware Buffer Synthesis for Low-Power Clock Skew Minimization
This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Power-Mode-Aware Buffer Synthesis for Low-Power
More informationEfficient Prefix Computation on Faulty Hypercubes
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 1-21 (21) Efficient Prefix Computation on Faulty Hypercubes YU-WEI CHEN AND KUO-LIANG CHUNG + Department of Computer and Information Science Aletheia
More informationDevelopment of the Home Uterine Contraction Pressure Monitoring System Based on PDA
Available online at www.sciencedirect.com AASRI Procedia 3 (2012 ) 566 570 2012 AASRI Conference on Modeling, Identification and Control Development of the Home Uterine Contraction Pressure Monitoring
More informationUsing Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment
Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce Environment Ching-Huang Yun and Ming-Syan Chen Department of Electrical Engineering National Taiwan
More informationFeature Selecting Model in Automatic Text Categorization of Chinese Financial Industrial News
Selecting Model in Automatic Text Categorization of Chinese Industrial 1) HUEY-MING LEE 1 ), PIN-JEN CHEN 1 ), TSUNG-YEN LEE 2) Department of Information Management, Chinese Culture University 55, Hwa-Kung
More informationPerformance Improvement of Hardware-Based Packet Classification Algorithm
Performance Improvement of Hardware-Based Packet Classification Algorithm Yaw-Chung Chen 1, Pi-Chung Wang 2, Chun-Liang Lee 2, and Chia-Tai Chan 2 1 Department of Computer Science and Information Engineering,
More informationOVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision
OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision Huei-Wen Ferng, Jin-Hui Lin, Yuan-Cheng Lai, and Yung-Ching Chen Department of Computer Science and Information
More informationFPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs
FPOC: A Channel Assignment Strategy Using Four Partially Overlapping Channels in WMNs Yung-Chang Lin Cheng-Han Lin Wen-Shyang Hwang Ce-Kuen Shieh yaya80306@hotmail.com jhlin5@cc.kuas.edu.tw wshwang@cc.kuas.edu.tw
More informationImproved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks
, pp.282-286 http://dx.doi.org/10.14257/astl.2015.116.57 Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks Rae Hyeon Kim, Jeong Gon Kim 1 Department of
More informationAn Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol
An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationEfficient remote mutual authentication and key agreement
computers & security 25 (2006) 72 77 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/cose Efficient remote mutual authentication and key agreement Wen-Gong Shieh*, Jian-Min
More informationA Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem
2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationBlind Signature Scheme Based on Elliptic Curve Cryptography
Blind Signature Scheme Based on Elliptic Curve Cryptography Chwei-Shyong Tsai Min-Shiang Hwang Pei-Chen Sung Department of Management Information System, National Chung Hsing University 250 Kuo Kuang Road.,
More informationA Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking
A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking Rengamathi Sankarkumar (B), Damith Ranasinghe, and Thuraiappah Sathyan Auto-ID Lab, The School of Computer Science, University
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationAn Active RFID Tag for Outdoor Billboard Management
2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN: 978-1-60595-498-1 An Active RFID Tag for Outdoor Billboard Management Hui JIANG 1,2,
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationResearch on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search
Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search Jinyan Liu, Quanyuan Feng School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031,
More informationDevelopment of a Smart Power Meter for AMI Based on ZigBee Communication
Development of a Smart Power Meter for AMI Based on ZigBee Communication Shang-Wen Luan Jen-Hao Teng Member IEEE Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan Abstract: Many
More informationResearch on the Security Authentication Mode of MF1 S50 Electronic Tag
ORIGINAL ARTICLE Research on the Security Authentication Mode of MF1 S50 Electronic Tag Xiao Zhiliang Foshan Polytechinc., Foshan, Guangdong, China, 528137 Abstract: This paper expatiates the security
More informationCollision Avoidance through Multiple RTS/CTS Dialogue in RFID System
Collision Avoidance through Multiple RTS/CTS Dialogue in RFID System ICUIMC 2008, Sungkyunkwan Univ. Jan. 31, 2008 and Jae-Hyun Kim Wireless Information and Network Engineering Research Lab. Ajou University,
More informationRETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu
More informationA Dynamic TDMA Protocol Utilizing Channel Sense
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2
More informationInternet of Things (IoT)
Internet of Things (IoT) Yan Zhang Professor, University of Oslo, Norway April 7, 2017 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual
More informationA METHOD OF MAP MATCHING FOR PERSONAL POSITIONING SYSTEMS
The 21 st Asian Conference on Remote Sensing December 4-8, 2000 Taipei, TAIWA A METHOD OF MAP MATCHIG FOR PERSOAL POSITIOIG SSTEMS Kay KITAZAWA, usuke KOISHI, Ryosuke SHIBASAKI Ms., Center for Spatial
More informationEnhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks
Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure
More informationand Molds 1. INTRODUCTION
Optimal Tool Path Generation for 2 and Molds D Milling of Dies HuiLi Automotive Components Division Ford Motor Company, Dearborn, MI, USA Zuomin Dong (zdong@me.uvic.ca) and Geoffrey W Vickers Department
More informationDistributed clustering algorithms for data-gathering in wireless mobile sensor networks
J. Parallel Distrib. Comput. 67 (2007) 1187 1200 www.elsevier.com/locate/jpdc Distributed clustering algorithms for data-gathering in wireless mobile sensor networks Chuan-Ming Liu a,, Chuan-Hsiu Lee a,
More informationIntroduction and Simulation of Modified Left Algorithms to Attribute Orthogonal Codes in 3 rd Generation Systems
J. Basic. Appl. Sci. Res., 1(12)2950-2959, 2011 2011, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Introduction and Simulation of Modified Left
More informationAUTOMATIC PHOTO ORIENTATION VIA MATCHING WITH CONTROL PATCHES
AUTOMATIC PHOTO ORIENTATION VIA MATCHING WITH CONTROL PATCHES J. J. Jaw a *, Y. S. Wu b Dept. of Civil Engineering, National Taiwan University, Taipei,10617, Taiwan, ROC a jejaw@ce.ntu.edu.tw b r90521128@ms90.ntu.edu.tw
More informationAn optically transparent ultra high speed LAN-ring employing OTDM
An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationMobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks
Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks William Shaw 1, Yifeng He 1, and Ivan Lee 1,2 1 Department of Electrical and Computer Engineering, Ryerson University, Toronto,
More informationInternet of Things (IoT)
Internet of Things (IoT) INF5050 February 19, 2016 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual entity that exists and moves
More informationSensor Based Time Series Classification of Body Movement
Sensor Based Time Series Classification of Body Movement Swapna Philip, Yu Cao*, and Ming Li Department of Computer Science California State University, Fresno Fresno, CA, U.S.A swapna.philip@gmail.com,
More informationPerformance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License
Title Performance analysis of realistic optical time division multiplexed wavelength routed networks Author(s) Li, CY; Li, G; Wai, PKA; Li, VOK Citation The 8th IEEE Annual Workshop on Computer Communications
More informationA FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS
A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,
More informationAn Efficient Tag Identification Algorithm Based on Improved Collision Detection
An Efficient Tag Identification Algorithm Based on Improved Collision Detection Ya-Ning Yan 1 and Jian Xiong 2 1. ZTE Telecommunications College, Xi an Peihua University, Xi an 710065, China 2. School
More informationRFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems,
RFID systems: anti-collision protocols and applications Naeem Khademi Cyber-Physical Systems, 12.11.2010 RFID Systems Radio-frequency identification (RFID) is a technology that uses communication via electromagnetic
More informationRECOMMENDATION ITU-R M Intelligent transport systems dedicated short range communications at 5.8 GHz
Rec. ITU-R M.1453-2 1 RECOMMENDATION ITU-R M.1453-2 Intelligent transport systems dedicated short range communications at 5.8 GHz (Question ITU-R 205/8) (2000-2002-2005) Scope This Recommendation outlines
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationComputers and Mathematics with Applications. An embedded system for real-time facial expression recognition based on the extension theory
Computers and Mathematics with Applications 61 (2011) 2101 2106 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa An
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationMoment-preserving Based Watermarking for Color Image Authentication and Recovery
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore Moment-preserving Based Watermarking for Color Image Authentication and Recovery Kuo-Cheng Liu + Information Educating
More informationSpoofing Attack Against an EPC Class One RFID System
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Spoofing Attack Against an EPC Class One RFID System Christopher
More informationTheoretical Computer Science
Theoretical Computer Science 410 (2009) 3372 3390 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs An (18/11)n upper bound for sorting
More informationUtilizing a Test Lab For Wireless Medical Devices
Utilizing a Test Lab For Wireless Medical Devices Allie Paquette Changes in healthcare suggest that more and more medical devices will begin to utilize the information technology (IT) network infrastructure
More informationAssociation Rule Mining and Clustering
Association Rule Mining and Clustering Lecture Outline: Classification vs. Association Rule Mining vs. Clustering Association Rule Mining Clustering Types of Clusters Clustering Algorithms Hierarchical:
More informationA REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK
A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK Md. Nadeem Enam 1, Ozair Ahmad 2 1 Department of ECE, Maulana Azad College of Engineering & Technology, Patna, (India)
More informationFaster Implementation of Canonical Minimum Redundancy Prefix Codes *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 341-345 (2001) Short Paper Faster Implementation of Canonical Minimum Redundancy Prefix Codes * KUO-LIANG CHUNG AND JUNG-GEN WU + Department of Information
More informationPROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES
PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES E SELVADIVYA divyacharlez@gmail.com GREETA PRIYADARSHINI greetasam@gmail.com ABSTRACT In this research we deal with delay-tolerant
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationOn the Relationships between Zero Forcing Numbers and Certain Graph Coverings
On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationThe MAC Protocol of the paper: Performance of Buffer-Aided Adaptive Modulation in Multihop Communications
The MAC Protocol of the paper: 1 Performance of Buffer-Aided Adaptive Modulation in Multihop Communications Chen Dong, Lie-Liang ang, Senior Member, IEEE and Lajos Hanzo, Fellow, IEEE School of ECS, University
More informationMobile Agent Driven Time Synchronized Energy Efficient WSN
Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,
More informationIMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS
IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,
More informationPerformance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks
Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation
More informationADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS
ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National
More informationOptical networking technology
1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the
More informationComment Extraction from Blog Posts and Its Applications to Opinion Mining
Comment Extraction from Blog Posts and Its Applications to Opinion Mining Huan-An Kao, Hsin-Hsi Chen Department of Computer Science and Information Engineering National Taiwan University, Taipei, Taiwan
More informationCHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES
70 CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 3.1 INTRODUCTION In medical science, effective tools are essential to categorize and systematically
More informationSupplement to. Logic and Computer Design Fundamentals 4th Edition 1
Supplement to Logic and Computer esign Fundamentals 4th Edition MORE OPTIMIZTION Selected topics not covered in the fourth edition of Logic and Computer esign Fundamentals are provided here for optional
More informationOnline Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors
Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors A. Fabri 1 and P. Recht 2 1 Universität Dortmund a.fabri@wiso.uni-dortmund.de 2 Universität Dortmund p.recht@wiso.uni-dortmund.de
More informationA Self-Organized Femtocell for IEEE e System
A Self-Organized Femtocell for IEEE 80.16e System Young Jin Sang, Hae Gwang Hwang and Kwang Soon Kim School of Electrical and Electronic Engineering, Yonsei University 134, Shinchong-dong, Seodaemun-gu,
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationZigbee Based Indoor Location Tracking System
Zigbee Based Indoor Location Tracking System Vishal Shinde 1, Prof. R. N. Panchal 2, Prof. J.R.Panchal 3 Student, Department of Electronics and Telecommunication, Siddhant College of Engineering, Savitribai
More informationMaximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol
Maximum Traffic Scheduling and Capacity Analysis for IEEE 80..3 High Data Rate MAC Protocol Yi-Hsien Tseng, Eric Hsiao-kuang Wu and Gen-Huey Chen Department of Computer Science and Information Engineering,
More informationInitialization Protocols for IEEE Based Ad Hoc Networks Λ
Initialization Protocols for IEEE 802.11-Based Ad Hoc Networks Λ Chih-Shun Hsu and Jang-Ping Sheu Department of Computer Science and Information Engineering National Central University, Chung-Li, 32054,
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationObject Tracking System Using Motion Detection and Sound Detection
Object Tracking System Using Motion Detection and Sound Detection Prashansha Jain Computer Science department Medicaps Institute of Technology and Management, Indore, MP, India Dr. C.S. Satsangi Head of
More informationFERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,
More informationAgilent E7478A GPRS Drive Test System
Agilent E7478A GPRS Drive Test System Product Overview Quickly deploy your GPRS networks and manage multiformat environments Our drive test solution doesn t just uncover problems on your GPRS network it
More informationCCP: Conflicts Check Protocol for Bitcoin Block Security 1
CCP: Conflicts Check Protocol for Bitcoin Block Security Chen Yang Peking University, China yc900@pku.edu.cn Abstract In this work, we present our early stage results on a Conflicts Check Protocol (CCP)
More informationA deployment procedure for wireless sensor networks
A deployment procedure for wireless sensor networks Tzu-Che Huang, Hung-Ren Lai and Cheng-Hsien Ku Networks and Multimedia Institute, Institute for Information Industry tzuche@nmi.iii.org.tw Abstract Since
More informationProperty Maintenance & Operations Manual Training
Property Maintenance & Operations Manual Training Introduction to Property Operations Management and Building Security October 16, 2007 Property Maintenance & Operations Manual Training April 12, 2007
More informationAn IoT-Aware Architecture for Smart
An IoT-Aware Architecture for Smart Healthcare System Presented By: Amnah Allboani Abstract Smart hospital system (SHS) relies on complementary technologies specifically RFID, WSN, and smart mobile, interoperating
More informationOpen Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation Based on the Greedy Algorithm for Wireless Mesh Network
Send Orders for Reprints to reprints@benthamscience.ae 690 The Open Electrical & Electronic Engineering Journal, 2014, 8, 690-694 Open Access Research on Algorithms of Spatial-Temporal Multi-Channel Allocation
More informationProcessing Continuous Range Queries on Moving Objects using a Bit Vector Based Index *
Processing Continuous Range Queries on Moving Objects using a Bit Vector Based Index * I-Fang Su 1, Chang-Ming Tsai 2, Yuan-Ko Huang 3, Chieh-Ling Huang 2, Jwu-Jenq Chen 2, and Yu-Chi Chung 2, a 1 Department
More information3D HAND LOCALIZATION BY LOW COST WEBCAMS
3D HAND LOCALIZATION BY LOW COST WEBCAMS Cheng-Yuan Ko, Chung-Te Li, Chen-Han Chung, and Liang-Gee Chen DSP/IC Design Lab, Graduated Institute of Electronics Engineering National Taiwan University, Taiwan,
More informationResearch Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks
Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless
More information