scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Computer Science & Engineering Survey in 2010"


Journal ArticleDOI
TL;DR: A survey of routing protocols for Wireless Sensor Network is given and their strengths and limitations are compared.
Abstract: Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.

582 citations


Journal ArticleDOI
TL;DR: A detailed description of the mathematical working of few cluster validity indices and not all is presented, to classify these indices and to explore the ideas for the future promotion of the work in the domain of cluster validation.
Abstract: Data Clustering is a technique of finding similar characteristics among the data set which are always hidden in nature and grouping them into groups, called as clusters. Different clustering algorithms exhibit different results, since they are very sensitive to the characteristics of original data set especially noise and dimension. The quality of such clustering process determines the purity of cluster and hence it is very important to evaluate the results of the clustering algorithm. Due to this, Cluster validation activity had been a major and challenging task. The major factor which influences cluster validation is the internal cluster validity measure of choosing the optimal number of clusters. The main objective of this article is to present a detailed description of the mathematical working of few cluster validity indices and not all, to classify these indices and to explore the ideas for the future promotion of the work in the domain of cluster validation. In addition to this, a maximization objective function is defined assuming to provide a cluster validation activity.

80 citations


Journal ArticleDOI
TL;DR: In this article, the authors examined the accuracy and performance of multimodal biometric authentication systems using state of the art Commercial Off- The-Shelf (COTS) products.
Abstract: Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Experimental studies show that Unimodal biometric systems had many disadvantages regarding performance and accuracy. Multimodal biometric systems perform better than unimodal biometric systems and are popular even more complex also. We examine the accuracy and performance of multimodal biometric authentication systems using state of the art Commercial Off- The-Shelf (COTS) products. Here we discuss fingerprint and face biometric systems, decision and fusion techniques used in these systems. We also discuss their advantage over unimodal biometric systems.

49 citations


Journal ArticleDOI
TL;DR: This paper aims to present the most important possible application of neural networks in reduction of energy consumption according to research studies done in the literature so far through a general classification of them.
Abstract: The main concern in Wireless Sensor Networks is how to handle with their limited energy resources. The performance of Wireless Sensor Networks strongly depends on their lifetime. As a result, Dynamic Power Management approaches with the purpose of reduction of energy consumption in sensor nodes, after deployment and designing of the network, have drawn attentions of many research studies. Recently, there have been a strong interest to use intelligent tools especially Neural Networks in energy efficient approaches of Wireless Sensor Networks, due to their simple parallel distributed computation, distributed storage, data robustness, auto-classification of sensor nodes and sensor reading. Dimensionality reduction and prediction of sensor data obtained simply from the outputs of the neural-networks algorithms can lead to lower communication costs and energy conservation. All these characteristics show great analogy and compatibility between wireless sensor networks and neural networks. This paper aims to present the most important possible application of neural networks in reduction of energy consumption according to research studies have been done in the literature so far through a general classification of them.

48 citations


Journal ArticleDOI
TL;DR: This paper is trying to analyze and study the MANET environments, challenges and other issues, which will help the researchers to understand the MANETS concepts thoroughly.
Abstract: Various deployment ways of mobile ad hoc networks (MANETS) can have widely varying characteristics that have a greater impact on the behaviour of different routing protocols created for these networks. Before directly deploying the applications in such environments, it is most important for developers to understand the potential quantitative behaviour of the variations, challenges, capacity and implementation issues that support their applications. Analytical models exist to describe the behaviour of MANETS, but they are restricted to simplistic statistical models that represent either node mobility or link connectivity individually without considering the interplay of the two and other important aspects of MANETS. In this paper we are trying to analyze and study the MANET environments, challenges and other issues, which will help the researchers to understand the MANET concepts thoroughly.

34 citations


Journal ArticleDOI
TL;DR: In this article, the authors compare different human gesture recognition systems for interfacing machines directly to human wits without any corporeal media in an ambient environment. But, the main goal of gesture recognition is to create a system which can recognize specific human gestures and use them to convey information or for device control.
Abstract: Gesture recognition is mainly apprehensive on analyzing the functionality of human wits. The main goal of gesture recognition is to create a system which can recognize specific human gestures and use them to convey information or for device control. Hand gestures provide a separate complementary modality to speech for expressing ones ideas. Information associated with hand gestures in a conversation is degree, discourse structure, spatial and temporal structure. The approaches present can be mainly divided into Data-Glove Based and Vision Based approaches. An important face feature point is the nose tip. Since nose is the highest protruding point from the face. Besides that, it is not affected by facial expressions. Another important function of the nose is that it is able to indicate the head pose. Knowledge of the nose location will enable us to align an unknown 3D face with those in a face database. Eye detection is divided into eye position detection and eye contour detection. Existing works in eye detection can be classified into two major categories: traditional image-based passive approaches and the active IR based approaches. The former uses intensity and shape of eyes for detection and the latter works on the assumption that eyes have a reflection under near IR illumination and produce bright/dark pupil effect. The traditional methods can be broadly classified into three categories: template based methods, appearance based methods and feature based methods. The purpose of this paper is to compare various human Gesture recognition systems for interfacing machines directly to human wits without any corporeal media in an ambient environment.

32 citations


Journal ArticleDOI
TL;DR: An overview of various techniques that are implemented in past recent for selection of materialized view is given and some future aspects are also stated that might be useful for recent researchers.
Abstract: Quick response time and accuracy are important factors in the success of any database. In large databases particularly in distributed database, query response time plays an important role as timely access to information and it is the basic requirement of successful business application. A data warehouse uses multiple materialized views to efficiently process a given set of queries. The materialization of all views is not possible because of the space constraint and maintenance cost constraint. Materialized views selection is one of the crucial decisions in designing a data warehouse for optimal efficiency. Selecting a suitable set of views that minimizes the total cost associated with the materialized views is the key component in data warehousing. Materialized views are found useful for fast query processing. This paper gives an overview of various techniques that are implemented in past recent for selection of materialized view. The issues related to maintaining the materialized view are also discussed in this paper. Here some future aspects are also stated that might be useful for recent researchers.

15 citations


Journal ArticleDOI
TL;DR: This review paper identifies which protocol gives better performance in terms of reachability, saved rebroadcast and average latency in rebroadcasting a route request message of the probabilistic broadcast protocols and their enhancement schemes.
Abstract: is a fundamental operation in MANETs where a source node transmits a message that is to be disseminated to all the nodes in the network. Broadcasting is categorized into deterministic and probabilistic schemes. This paper reviews the probabilistic broadcasting protocol because of its adaptability in changing environment. Probabilistic broadcasting is best suited in terms of ad hoc network which is well known for its decentralized network nature. Probability, counter and distance based scheme under probabilistic scheme are discussed in this paper. Besides the basic probability scheme this paper also includes their recent advancements. Rebroadcast is one of the initial task for route discovery in reactive protocols. This review paper identify which protocol gives better performance in terms of reachability, saved rebroadcast and average latency in rebroadcasting a route request message. Simulation results are presented, which shows reachability, saved rebroadcast and average latency of the probabilistic broadcast protocols and their enhancement schemes. The comparative study shows the improvement of enhanced scheme over probabilistic schemes. KEYWORDSbroadcasting, Probability based scheme, Counter based scheme, Distance based scheme,

6 citations


Journal ArticleDOI
TL;DR: This research work illustrates the use of SRr on spatio-temporal database, composed of road traffic data of metro cities of United States of America, which is composed of traffic information, based on spatial location and time.
Abstract: Perl Status Reporter (SRr) [1] is a data mining tool and in this research work we illustrate the use of SRr on spatio-temporal database. Spatio–temporal data are associated with time and space and used vastly in different applications of diversified areas such as geography, geology, city planning, agriculture, environmental study, traffic navigation, aerospace industries, and so on. We exploit spatio-temporal data which is composed of road traffic data of metro cities of United States of America. The traffic data file consists of traffic information, based on spatial location and time, in metro cities and we want to extract the piece of information from that huge file which is of our interest. SRr needs a flat data input file to perform the data extraction process. SRr reads input file and derives the desired information from it. The input file has two parameters of interest (firstKey and secondKey). The association of these two parameters describes the uniqueness of entries in that file and works as composite key similar to that in traditional databases. Based on the parameter of interest SRr generates an output file, named as firstKey_secondKey. SRr subsequently reads the input file line by line and extracts the data of interest and stores all the tuples having the same composite key, into that output file generated by SRr.

5 citations


Journal ArticleDOI
TL;DR: This work selectively discusses methods of Ontology management including operations such as mapping, alignment, matching, integration and merging, and provides a widespread understanding of methods proposed for ontology management operations.
Abstract: Ontologies are currently emerging as representation techniques for overlapping complimentary context domains. A single ontology is no longer enough to support the tasks predicted by a distributed environment like the Semantic Web. Multiple ontologies need to be accessed from several applications. Ontology management is possible through interoperability of semantic data sources. Ontology management includes operations such as mapping, alignment, matching, integration and merging. This work selectively discusses methods of these operations. It provides the researchers a widespread understanding of methods proposed for ontology management operations.

4 citations


Journal ArticleDOI
TL;DR: The proposed multi tree database architecture consists of a number of database subsystems, each of which is a three-level structure and proposes indexing schemes for each type of location databases and analyzes their efficiency and cost in terms of database access time and storage requirement.
Abstract: The next-generation mobile network will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent personal telecommunication number (PTN) scheme is conducive to implementing such a global mobile system. In this paper, firstly we propose multi tree database architecture consists of a number of database subsystems, each of which is a three-level t also proposes indexing schemes for each type of location databases and analyzes their efficiency and cost in terms of database access time and storage requirement. Tree structure and is connected to the others only through its root. Results have revealed that the proposed database architecture for location management can effectively support the anticipated high user density in the future mobile networks.