Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of 23
To view the access options for this content please click here
Article
Publication date: 5 September 2008

Adaptive attenuation factor model for localization in wireless sensor networks

Yung‐Chien Shih, Yuan‐Ying Hsu, Chien‐Hung Chen, Chien‐Chao Tseng and Edwin Sha

The accuracy of sensor location estimation influences directly the quality and reliability of services provided by a wireless sensor network (WSN). However, current…

HTML
PDF (239 KB)

Abstract

Purpose

The accuracy of sensor location estimation influences directly the quality and reliability of services provided by a wireless sensor network (WSN). However, current localization methods may require additional hardware, like global positioning system (GPS), or suffer from inaccuracy like detecting radio signals. It is not proper to add extra hardware in tiny sensors, so the aim is to improve the accuracy of localization algorithms.

Design/methodology/approach

The original signal propagation‐based localization algorithm adopts a static attenuation factor model and cannot adjust its modeling parameters in accordance with the local environment. In this paper an adaptive localization algorithm for WSNs that can dynamically adjust ranging function to calculate the distance between two sensors is presented. By adjusting the ranging function dynamically, the location of a sensor node can be estimated more accurately.

Findings

The NCTUNs simulator is used to verify the accuracy and analyze the performance of the algorithm. Simulation results show that the algorithm can indeed achieve more accurate localization using just a small number of reference nodes in a WSN.

Research limitations/implications

There is a need to have accurate location information of reference nodes.

Practical implications

This is an effective low‐cost solution for the localization of sensor nodes.

Originality/value

An adaptive localization algorithm that can dynamically adjust ranging function to calculate the distance between two sensors for sensor network deployment and providing location services is described.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 3
Type: Research Article
DOI: https://doi.org/10.1108/17427370810911621
ISSN: 1742-7371

Keywords

  • Wireless
  • Sensors
  • Simulation
  • Signal processing

To view the access options for this content please click here
Article
Publication date: 27 June 2008

A simple dynamic clustering approach to achieve energy efficiency for wireless sensor networks

Giljae Lee, Yoonjoo Kwon, Woojin Seok and Minsun Lee

Recent wireless communication and electronics technology has enabled the development of low‐cost, low‐power, and multi‐functional sensor nodes. However, the fact that…

HTML
PDF (159 KB)

Abstract

Purpose

Recent wireless communication and electronics technology has enabled the development of low‐cost, low‐power, and multi‐functional sensor nodes. However, the fact that sensor nodes are severely energy‐constrained has been an issue and many energy‐efficient routing protocols have been proposed to resolve it. Cluster‐based routing protocol is one of them. To achieve longer lifetime, some cluster‐based routing protocols use information on GPS‐based location of each sensor node. However, because of high cost, not all sensor nodes can be GPS‐enabled. The purpose of this paper is to propose a simple dynamic clustering approach to achieve energy efficiency for wireless sensor networks (WSN).

Design/methodology/approach

Instead of using location information of each sensor node, this approach utilizes information of remaining energy of each sensor node and changes in the number of cluster head nodes dependent on the number of sensor nodes alive. Performance results are presented and compared with some related protocols.

Findings

The simulations described in the paper show that both residual energy of each sensor node and changing cluster head nodes depending on the number of sensor nodes alive are very critical factors to obtain performance enhancement in terms of lifetime and data transmission. Especially, in some special environment, the proposal has better performance than GPS‐enabled protocol.

Originality/value

The paper is of value in proposing a simple dynamic clustering approach to achieve energy efficiency for WSN.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/17427370810890373
ISSN: 1742-7371

Keywords

  • Wireless
  • Sensors
  • Circuit theory
  • Telecommunication network routing
  • Energy technology

To view the access options for this content please click here
Article
Publication date: 27 June 2008

Scalable and adaptive context delivery mechanism for context‐aware computing

Lenin Mehedy, Sungyoung Lee, Salahuddin Muhammad Salim Zabir and Young‐Koo Lee

Presence of innumerable sensors, complex deduction of contexts from sensor data, and reusability of contextual information impose the requirement of middleware for context…

HTML
PDF (346 KB)

Abstract

Purpose

Presence of innumerable sensors, complex deduction of contexts from sensor data, and reusability of contextual information impose the requirement of middleware for context aware computing. Smart applications, hosted in myriad devices (e.g. PDA, mobile, PCs), acquire different contexts from the middleware and act intelligently based on the available contexts in a context‐aware computing environment. As the system grows larger, scalable delivery of contexts from the middleware to numerous context‐aware applications will be inevitable. However, pure unicast based or pure broadcast‐based dissemination cannot provide high scalability as well as low‐average latency. The purpose of this paper is to present a scalable context delivery mechanism for the middlewares to facilitate the development of larger context‐aware computing systems.

Design/methodology/approach

The proposed scheme is based on hybrid data dissemination technique where the most frequently requested data (e.g. HOT contexts) are delivered through multicast and the rest (e.g. COLD contexts) are delivered through unicast to reduce network traffic. The paper dynamically prioritizes and classifies the HOT and COLD context data depending on the number of requests and longest waiting time. Moreover, the division of bandwidth between the delivery of HOT and COLD contexts reduces average latency. Polling traffic is decreased by incorporating leasing mechanism. Extensive simulation is conducted to evaluate the proposed scheme.

Findings

The mechanism dynamically prioritizes and classifies the hot and cold context data depending on the request rate and longest waiting time. The solution addresses the push popularity problem that occurs in the passive as the passive clients access data without sending explicit requests. The leasing mechanism is incorporated to reduce the periodical requests (polling) for better performance.

Originality/value

The paper is of value in presenting a scalable context delivery mechanism for the middlewares to facilitate the development of larger context‐aware computing systems and also in presenting implementation details of a prototype that is developed using Jini framework and Java reliable multicast service (JRMS) library.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/17427370810890265
ISSN: 1742-7371

Keywords

  • Computer software
  • Data communication equipment
  • Bandwidths
  • Computer applications
  • Adaptability

To view the access options for this content please click here
Article
Publication date: 27 June 2008

A speech and character combined recognition engine for mobile devices

Soo‐Young Suk and Hyun‐Yeol Chung

The purpose of this paper is to describe a speech and character combined recognition engine (SCCRE) developed for working on personal digital assistants (PDAs) or on…

HTML
PDF (506 KB)

Abstract

Purpose

The purpose of this paper is to describe a speech and character combined recognition engine (SCCRE) developed for working on personal digital assistants (PDAs) or on mobile devices. Also, the architecture of a distributed recognition system for providing a more convenient user interface is discussed.

Design/methodology/approach

In SCCRE, feature extraction for speech and for character is carried out separately, but the recognition is performed in an engine. The client recognition engine essentially employs a continuous hidden Markov model (CHMM) structure and this CHMM structure consists of variable parameter topology in order to minimize the number of model parameters and to reduce recognition time. This model also adopts the proposed successive state and mixture splitting (SSMS) method for generating context independent model. SSMS optimizes the number of mixtures through splitting in mixture domain and the number of states through splitting in time domain.

Findings

The recognition results show that the developed engine can reduce the total number of Gaussian up to 40 per cent compared with the fixed parameter models at the same recognition performance when applied to speech recognition for mobile devices. It shows that SSMS can reduce the size of memory for models to 65 per cent and that for processing to 82 per cent. Moreover, the recognition time decreases 17 per cent with the SMS model while maintaining the recognition rate.

Originality/value

The proposed system will be very useful for many on‐line multimodal interfaces such as PDAs and mobile applications.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/17427370810890409
ISSN: 1742-7371

Keywords

  • Speech recognition
  • Character recognition
  • Mobile communication systems
  • User interfaces

To view the access options for this content please click here
Article
Publication date: 27 June 2008

Broadcasting four types of reports to read only transactions in mobile computing environments

Daein Kim and Buhyun Hwang

Recently the advances in wireless communication technology and the popularity of portable computers have rendered mobile computing environments from which mobile users…

HTML
PDF (280 KB)

Abstract

Purpose

Recently the advances in wireless communication technology and the popularity of portable computers have rendered mobile computing environments from which mobile users with battery‐operated palmtops can access the information via wireless channels, without space and time restriction. In mobile computing environments, mobile users cache the data items to use the bandwidth efficiently and improve the response time of mobile transactions. If the data items cached in mobile users are updated at the server, the server broadcasts an invalidation report for maintaining the cache consistency of mobile users. However, this method has an obstacle that does not guarantee the serializable execution of mobile transactions. The purpose of this paper is to propose the four types of reports for mobile transaction (FTR‐MT) method for ensuring the serializable execution of mobile transactions.

Design/methodology/approach

The paper describes the FTR‐MT method, which is composed of four types of algorithms, e.g. group report composition algorithm, immediate commit decision algorithm, cache consistency algorithm, and disconnection cache consistency algorithm. FTR‐MT method for improving the response time of mobile transactions makes a commit decision by using the four types of reports.

Findings

With the FTR‐MT method, mobile users can make a commit decision by using the four types of reports. The response time of mobile transactions can be reduced. Furthermore, the FTR‐MT method can improve the cache efficiency in the case that the disconnection of mobile users is longer than the broadcast interval of the window report.

Originality/value

This paper proposes a new method for guaranteeing the serializable execution of mobile transactions, called FTR‐MT, using four types of reports. Also, it can prevent the entire cache dropping, even though the disconnection of a mobile host is longer than the broadcast interval of a window report. Through the analytical model, this method is felt to be superior to other methods, in terms of the average response time and the commit rate of mobile transactions, and bandwidth usage.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/17427370810890391
ISSN: 1742-7371

Keywords

  • Portable computers
  • Wireless
  • Bandwidths
  • Systems and control theory

To view the access options for this content please click here
Article
Publication date: 27 June 2008

A fuzzy service adaptation engine for context‐aware mobile computing middleware

Ronnie Cheung, Gang Yao, Jiannong Cao and Alvin Chan

Context‐aware mobile computing extends the horizons of the conventional computing model to a ubiquitous computing environment that serves users at anytime, anywhere. To…

HTML
PDF (339 KB)

Abstract

Purpose

Context‐aware mobile computing extends the horizons of the conventional computing model to a ubiquitous computing environment that serves users at anytime, anywhere. To achieve this, mobile applications need to adapt their behaviors to the changing context. The purpose of this paper is to present a generalized adaptive middleware infrastructure for context‐aware computing.

Design/methodology/approach

Owing to the vague nature of context and uncertainty in context aggregation for making adaptation decisions, the paper proposes a fuzzy‐based service adaptation model (FSAM) to improve the generality and effectiveness of service adaptation using fuzzy theory.

Findings

By the means of fuzzification of the context and measuring the fitness degree between the current context and the predefined optimal context, FSAM selects the most suitable policy to adopt for the most appropriate service. The paper evaluates the middleware together with the FSAM inference engine by using a Campus Assistant application.

Originality/value

The paper is of value in presenting a generalized adaptive middleware infrastructure for context‐aware computing and also comparing the performance of the fuzzy‐based solution with a conventional threshold‐based approach for context‐aware adaptation.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/17427370810890256
ISSN: 1742-7371

Keywords

  • Mobile communication systems
  • Fuzzy control
  • Fuzzy logic
  • Network operating systems
  • Computer software
  • Portable computers

To view the access options for this content please click here
Article
Publication date: 27 June 2008

Traffic adaptive IEEE 802.15.4 medium access control

Yohan Chae and Younggoo Kwon

IEEE 802.15.4 is a new standard uniquely designed for low‐rate wireless sensor networks (WSNs). It targets low data rate, low power consumption and low‐cost wireless…

HTML
PDF (268 KB)

Abstract

Purpose

IEEE 802.15.4 is a new standard uniquely designed for low‐rate wireless sensor networks (WSNs). It targets low data rate, low power consumption and low‐cost wireless networking, and offers device level wireless connectivity. The purpose of this paper is to propose a traffic adaptive power control algorithm for beacon relayed distributed WSNs.

Design/methodology/approach

A general coordinated sleeping algorithm and the traffic adaptive algorithm are combined in an IEEE 802.15.4 MAC protocol to achieve high‐energy efficiency and high performance at the same time.

Findings

By observing the sporadic traffic and beacon relaying characteristics of WSNs, the paper proposes a traffic‐adaptive IEEE 802.15.4 MAC with a coordinated sleeping algorithm. Based on various performance studies, it was found that the proposed algorithm can significantly improve power consumptions in wireless sensor networks.

Originality/value

The paper is of value in proposing a traffic adaptive power control algorithm showing highly efficient power consumptions in low‐traffic conditions as well as with an acceptable degree of adaptation to high‐traffic conditions. In delay performance, it shows longer delay performance compared with other schemes because of the beacon relay procedure while the proposed algorithm reduces the power consumptions dramatically.

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/17427370810890382
ISSN: 1742-7371

Keywords

  • Sensors
  • Wireless
  • Adaptability
  • Remote control systems
  • Protocols

Content available
Article
Publication date: 27 June 2008

Guest editorial

HTML

Abstract

Details

International Journal of Pervasive Computing and Communications, vol. 4 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/ijpcc.2008.36104baa.001
ISSN: 1742-7371

To view the access options for this content please click here
Book part
Publication date: 4 February 2011

References

HTML
PDF (176 KB)
EPUB (42 KB)

Abstract

Details

Contributions to Economic Analysis
Type: Book
DOI: https://doi.org/10.1108/S0573-8555(2011)0000291027
ISBN: 978-0-85724-721-6

To view the access options for this content please click here
Article
Publication date: 1 April 1985

The Psychology of Disability—A Bibliographic Essay

Penny Passikoff

The intent of this essay is to offer a range of resources on the psychology of disability to the serious researcher in the field. The researcher may be an upper‐college…

HTML
PDF (1.1 MB)

Abstract

The intent of this essay is to offer a range of resources on the psychology of disability to the serious researcher in the field. The researcher may be an upper‐college level or graduate student. This individual may be researching for academic purposes, or for personal reasons associated with the disability of himself or herself, or a loved one. Although the individual with a disability can be psychologically or physically disabled, or both, this essay will focus more heavily on the physically disabled.

Details

Collection Building, vol. 7 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/eb023183
ISSN: 0160-4953

Access
Only content I have access to
Only Open Access
Year
  • Last 6 months (1)
  • Last 12 months (1)
  • All dates (23)
Content type
  • Article (20)
  • Book part (2)
  • Earlycite article (1)
1 – 10 of 23
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here