Volume 5, Issue 2, February 2013

Energy Efficient Routing Protocol Using Local Mobile Agent for Large Scale WSNs

Ali Seirafi, Mohammad Hadi Moazzam and Farshad Kabiri Samani

The energy consumption is always an important topic for research on routing protocols of wireless sensor networks. Many algorithms are introduced in this field and each of them can propose solutions in order to improve the energy consumption issue. Energy Efficient Cluster Head Selection (EECHS) is one of the most well known protocols in WSN, but its performance decreases with increase of the network scale. To solve this problem, we introduce an improved routing protocol uses a new multi hop transmission method to balance energy consumption among the whole network. This approach reduces the time distance between failing of the first and the last nodes at minimum and keeps network coverage until the last moments. The simulation results performed in MATLAB, show that the proposed algorithm is more efficient and increases the network lifetime.

Keywords: Local Mobile Agent, Clustering, Routing Protocol, Network Lifetime

Detection and Estimation of multiple far-field primary users using sensor array in Cognitive Radio Networks

Kiran Sultan, Ijaz Mansoor Qureshi and Muhammad Zubair

The field of spectrum sensing faces a lot of challenges in terms of reliability and accuracy in gathering information for detection and estimation of primary transmissions in Cognitive Radio Networks (CRNs). We propose an efficient, reliable and low-complexity spectrum sensing scheme for CRNs which not only detects the number of sources but also estimates their parameters such as frequency, Direction-of-Arrival (DOA) and power strength. It is based on Genetic Algorithm (GA) as global optimizer hybridized with Pattern Search (PS) as local optimizer. Fitness function is derived from Maximum Likelihood (ML) principle and defines the MSE between actual and estimated signals. Its effectiveness under low SNR conditions is proved. Our proposed system model constitutes a uniform linear array (ULA) of sensors. Best estimates of the parameters of the active primary users are obtained by minimizing the fitness function. We detect signals in the frequency band of 80MHz-108MHz and assume far-field approximation and the snapshots are available to us after 10-15 seconds.

Keywords: Cognitive Radio Network, Direction-of-Arrival, Spectrum Sensing

Real-Time Markerless Square-ROI Recognition based on Contour-Corner for Breast Augmentation

L. Rechard and A. Bade

Augmented reality (AR) can be described as a technology consists of computer vision and image processing methods which is used to enhanced user vision and perception. Whereas marker detection and recognition are the two most important steps which are vital in the field of augmented reality (AR) in order to successfully placed computer generated object into the real world. This paper, aims to present a real-time markerless identification and verification technique by combining contour-corner approach to detect and extract strong interest point from the environment as the fundamental component in registering the virtual imagery with its real object without the needs to use conventional printed marker. To enhance and to combine the current contour and corner detection approach, we proposed smoothing and adaptive thresholding technique to the input stream and then use subpixel corner detection to obtain better and accurate interest point. Our method used marker-less approach as to avoid the needs to prepare the target environment and to make our approach more flexible. The proposed method starts with first getting an input from the real environment thru a camera as visual sensor. On receiving an input image, the proposed technique will process the image, detects strong interest points from the ROI and recognize a marker by applying enhanced contour-corner detection.

Keywords: Augmented reality, contour detection, corner detection, interest point

Hiding Image in Image by Five Modulus Method for Image Steganography

Firas A. Jassim

This paper is to create a practical steganographic implementation to hide color image (stego) inside another color image (cover). The proposed technique uses Five Modulus Method to convert the whole pixels within both the cover and the stego images into multiples of five. Since each pixels inside the stego image is divisible by five then the whole stego image could be divided by five to get new range of pixels 0..51. Basically, the reminder of each number that is not divisible by five is either 1,2,3 or 4 when divided by 5. Subsequently, then a 4?4 window size has been implemented to accommodate the proposed technique. For each 4x4 window inside the cover image, a number from 1 to 4 could be embedded secretly from the stego image. The previous discussion must be applied separately for each of the R, G, and B arrays. Moreover, a stego-key could be combined with the proposed algorithm to make it difficult for any adversary to extract the secret image from the cover image. Based on the PSNR value, the extracted stego image has high PSNR value. Hence this new steganography algorithm is very efficient to hide color images.

Keywords: information hiding, image representation, security, protection

Predicting Consumers Intention to Adopt M-Commerce Services: An Empirical Study in the Indian Context

Kanwalvir Singh and Himanshu Aggarwal

Mobile Commerce (M-commerce) services are playing a significant role in changing the lives of the common citizens. This paper is an attempt to explore the factors concerning consumer’s intention to adopt Mobile commerce services in the state of Punjab in India. Finding and analyzing these critical factors can lead to the overall healthy growth & advancements involved with the implementation of e-Governance in every country. This empirical study will help in formulating effective strategic planning based on the data analysis of the consumers by statistically analyzing the data. It can really bolster the cause for the development of efficiently and strategically developed information systems for e-Governance projects in any country. This study highlights consumer’s post-adoption evaluation of their current use of M-services to predict their interest in next generation M-commerce services.

Keywords: M-commerce, Consumer adoption, E-governance, M-services

QoS Aware Web Services Recommendations Framework

Shahid Kamal and Roliana Ibrahim

This paper proposes a framework that emphasizes on the ranking by the users in the past to increase the acceptance of the services in order to increase the recommendation quality in terms of trust.

Keywords: web service, ranking, Q-requirements, trusts