JMM Abstracts 

Vol.6 No.4 December, 2010

Performance Evaluation of Wireless Sensor Networks for Mobile Event and Mobile Sink (281-292)
Tao Yang, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, and Arjan Durresi 
Extending lifetime and energy efficiency are important objectives and challenges in Wireless Sensor Networks (WSNs). In large scale WSNs, when the nodes are near to the sink they consume much more energy than the nodes far from the sink. In our previous work, we considered that the sink node was stationary and only event node was moving in the observation field. In this work, we consider both cases when the sink node and event node are moving. For the simulations, we use TwoRayGround and Shadowing radio models, lattice topology and AODV protocol. We compare the simulation results for the cases when the sink node and event node are mobile and stationary. The simulation results have shown that the goodput of TwoRayGround is better than Shadowing in case of mobile event, but the depletion of Shadowing is better than TwoRayGround in case of mobile event. The goodput in case of mobile sink is better than stationary sink when the transmission rate is lower than 10pps. For TwoRayGround radio model, the depletion in case of mobile sink is better than stationary sink when the number of nodes is increased.

Fault Tolerant Small-World Cellular Neural Networks for Intermitted Faults (293-304)
Katsuyoshi Matsumoto, Minoru Uehara, and Hideki Mori 
A Cellular Neural Network (CNN) is a neural network model linked only to neighborhoods and which is suitable for image processing, such as noise reduction and edge detection. A Small World Cellular Neural Network (SWCNN) is an extended CNN to which has been added a small world link, which is a global short-cut. The SWCNN has better performance than the CNN. One of the weaknesses of the SWCNN has low fault tolerance. If the the neuron is failed, the SWCNN shows lower fault tolerance than the CNN. Previously, we proposed TMR and Reliability Counter (RC) for fault tolerance the SWCNN. In this paper, we propose the Stateful Reliability Counter (Stateful RC) method to improve tolerance. The Stateful RC has a failure state of the last histrory. The Stateful RC for TMR has higher fault tolerant than TMR and RC in the low repaire rate.

Performance Analysis of ROADMs at Peak Traffic in All Optical Network (305-313)
T.S. Indumath, K. Rajaiah, T. Srinivas, and V. Rajappa 
Reconfigurable Optical Add / Drop Multiplexer is a subsystem of All Optical Networks. In this paper we analyze the routing performance of ROADMs at peak traffic using Pascal distribution model. To evaluate wavelength routing capability of ROADMs of various architectures in dynamic optical network, a theoretical routing power model is considered. With simulation results, the routing power and blocking probability have been evaluated to achieve better performance and flexibility.

Fingerprint Image Processing and Fuzzy Vault Implementation (314-338)
Nandita Bhattacharjee and Chien Eao Lee 
Accuracy and reliability are two terms that are vital in a biometric system, which must also tolerate the fuzziness of the biometric characteristics to a certain degree. In this paper, we propose and implement fingerprint image enhancement as a preliminary stage to increase the accuracy and reliability of minutiae extraction process for fuzzy vault implementation. In this pre-processing stage, we attempt to recover and enhance the corrupted and noisy region by employing filtering technique. The enhanced image is finally transformed to its skeleton equivalent, preserving the ridges and valleys connectivity for minutiae extraction process. Rutovitz Crossing Number (CN) algorithm is then applied to extract the candidate minutiae which will then undergo a series of minutiae filtering processes to determine the validity of the extracted raw minutiae as true minutia. The implementations of the minutiae filtering processes are able to identify and eliminate the predefined spurious minutiae. As we are focusing on extracting accurate minutiae for the purpose of fuzzy vault implementation, we also take into consideration the quantization of the minutiae, which is an important factor in fuzzy vault locking and unlocking procedures. We then perform the fingerprint fuzzy vault cryptography processes based on the extracted minutiae, where a secret key is generated, encoded and then decoded. Experiments have been conducted for the fingerprint image processing stage and fuzzy vault implementation stage. We obtained a Goodness Index (GI) of 0.55 for the image processing stage, which indicates that our implementation is performing well comparing to other methods. As for the fuzzy vault implementation, we managed to achieve promising False Acceptance Rate (FAR) and False Rejection Rate (FRR) for polynomial degrees ranging from 8 to 13. 

Enriching the Design and Prototyping Loop: a Set of Tools to Support the Creation of Activity-Based Pervasive Applications (339-360)
Pascal Bruegger, Agnes Lisowska, Denis Lalanne, and Beat Hirsbrunner
This paper proposes a complete approach to support the modelling, testing and prototyping of pervasive applications. It describes a set of tools aimed at supporting designers in the conceptualisation of their application and in the software development stage, and proposes a method for checking the validity of their design. For each step of the development life-cycle (design, prototyping and evaluation), we position the proposed approach with respect to related tools and methods. We also present a pervasive application implemented and evaluated using the proposed approach and tools, which facilitates further discussion of the benefits and disadvantages of using the proposed framework. We conclude with propositions for improvements to our comprehensive modelling, prototyping and testing framework for pervasive applications.

Back to JMM Online Front Page