The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed. 相似文献
A quantum‐tunneling metal‐insulator‐metal (MIM) diode is fabricated by atmospheric pressure chemical vapor deposition (AP‐CVD) for the first time. This scalable method is used to produce MIM diodes with high‐quality, pinhole‐free Al2O3 films more rapidly than by conventional vacuum‐based approaches. This work demonstrates that clean room fabrication is not a prerequisite for quantum‐enabled devices. In fact, the MIM diodes fabricated by AP‐CVD show a lower effective barrier height (2.20 eV) at the electrode–insulator interface than those fabricated by conventional plasma‐enhanced atomic layer deposition (2.80 eV), resulting in a lower turn on voltage of 1.4 V, lower zero‐bias resistance, and better asymmetry of 107. 相似文献
Wireless Networks - In traditional Mobile Adhoc Networks routing algorithms, the existence of a sustainable path between the source and destination is a crucial issue. These algorithms are shown to... 相似文献
A novel technique for designing analog CMOS integrated filters is proposed. The technique uses digitally controlled current amplifiers (DCCAs) to provide precise frequency and/or gain characteristics that can be digitally tuned over a wide range. This paper provides an overview of the possibilities of using the DCCA as the core element in programmable filters. In mixed analog/digital systems, the digital tuning feature of the proposed approach allows direct interfacing with the digital signal processing (DSP) part. Basic building blocks such as digitally programmable amplifiers, integrators, and simulated active inductors are given. Systematic designs of second-order filters are presented. Fully differential architectures of the proposed circuits are developed. Experimental results obtained from 0.5 μm standard CMOS chips are provided. 相似文献
In this paper, we propose an interference aware expanding region search algorithm to locate a destination in mobile ad hoc networks. In the proposed approach, signal to interference plus noise ration (SINR) is used in place of TTL field of a route request packet. The source node initializes the search query with a threshold value of SINR. Each relay node forwards the packet if its SINR satisfies the threshold criteria provided by the source node in RREQ packet. As a result, the low SINR nodes are removed in route discovery phase prior to the establishment of routes. The simulation results show that proposed algorithm provides significant improvement in performance of reactive routing protocol in terms of reduced routing overhead, reduced energy consumption, and increased network throughput.
Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates. 相似文献
Moments have been used in all sorts of object classification systems based on image. There are lots of moments studied by many researchers in the area of object classification and one of the most preference moments is the Zernike moment. In this paper, the performance of object classification using the Zernike moment has been explored. The classifier based on neural networks has been used in this study. The results indicate the best performance in identifying the aggregate is at 91.4% with a ten orders of the Zernike moment. This encouraging result has shown that the Zernike moment is a suitable moment to be used as a feature of object classification systems. 相似文献
In a wide area campus, a university provides Wireless Local Area Network (WLAN) for users to connect to the Internet. Most
users take advantage of this WLAN benefit by using their laptops. However, the number of smart phone users is growing fast.
Since a smart phone is able to get an Internet connection using WLAN, users can use their smart phones without having to pay
for a cellular operator. Users tend to use their smart phones more, due to their higher mobility compared to a laptop. This
capability enables new services in the market, such as Fixed-Mobile Convergence (FMC), which integrates a fixed network (traditional
telephony, WLAN) and a mobile network (cellular) to provide seamless voice communications anytime, anywhere. These new applications
require a WLAN connection availability nearly everywhere. However, due to limited budgets, a university can only install APs
in places with a high connection demand. We propose a novel WLAN AP placement technique that takes user mobility into consideration.
This new approach is more complete than previous approaches, which mainly focus on coverage area and throughput data. Our
technique has been implemented in our university. The results show the suitability of the WLAN access point locations in our
university campus based on user mobility and activities. 相似文献
In the present study, experiment and simulation studies were conducted on the fluid/structure interaction (FSI) analysis of integrated circuit (IC) packaging. The visualisation of FSI phenomenon in the actual package is difficult due to limitations of package size, available equipment, and the high cost of the experimental setup. However, the experimental data are necessary to validate the simulation results in the FSI analysis of IC packaging. Scaled-up package size was fabricated to emulate the encapsulation of IC packaging and to study the effects of FSI phenomenon in the moulded package. The interaction between the fluid and the structure was observed. The deformation of the imitated chip was studied experimentally. The air-trap mechanism that occurred during the experiment is also presented in this paper. Simulation technique was utilised to validate the experimental result and to describe the physics of FSI. The predicted flow front was validated well by the experiment. Hence, the virtual modelling technique was proven to be excellent in handling this problem. The study also extends FSI modelling in actual-size packaging. 相似文献