Journal of Electrical and Computer Engineering The latest articles from Hindawi Publishing Corporation © 2016 , Hindawi Publishing Corporation . All rights reserved. A Searching Method of Candidate Segmentation Point in SPRINT Classification Mon, 24 Oct 2016 12:25:53 +0000 SPRINT algorithm is a classical algorithm for building a decision tree that is a widely used method of data classification. However, the SPRINT algorithm has high computational cost in the calculation of attribute segmentation. In this paper, an improved SPRINT algorithm is proposed, which searches better candidate segmentation point for the discrete and continuous attributes. The experiment results demonstrate that the proposed algorithm can reduce the computation cost and improve the efficiency of the algorithm by improving the segmentation of continuous attributes and discrete attributes. Zhihao Wang, Junfang Wang, Yonghua Huo, Yanjun Tuo, and Yang Yang Copyright © 2016 Zhihao Wang et al. All rights reserved. Joint Radio Resource Allocation and Base Station Location Selection in OFDMA Based Private Wireless Access Networks for Smart Grid Sun, 23 Oct 2016 12:33:24 +0000 This paper studies the base stations deployment problem in orthogonal frequency-division multiple access (OFDMA) based private wireless access networks for smart grid (SG). Firstly, we analyze the differences between private wireless access networks for SG and public cellular access networks. Then, we propose scheduling and power control based algorithms for the radio resource allocation subproblem and K-means, simulated annealing (SA), and particle swarm optimization (PSO) based algorithms for the base station (BS) location selection subproblem and iterate over these two sets of algorithms to solve the target problem. Simulation results show that the proposed method can effectively solve the target problem. Specifically, the combination of power control based resource allocation algorithm and PSO based location selection algorithm is recommended. Peng Du and Yuan Zhang Copyright © 2016 Peng Du and Yuan Zhang. All rights reserved. A Novel Framework for Interactive Visualization and Analysis of Hyperspectral Image Data Thu, 13 Oct 2016 11:55:41 +0000 Multispectral and hyperspectral images are well established in various fields of application like remote sensing, astronomy, and microscopic spectroscopy. In recent years, the availability of new sensor designs, more powerful processors, and high-capacity storage further opened this imaging modality to a wider array of applications like medical diagnosis, agriculture, and cultural heritage. This necessitates new tools that allow general analysis of the image data and are intuitive to users who are new to hyperspectral imaging. We introduce a novel framework that bundles new interactive visualization techniques with powerful algorithms and is accessible through an efficient and intuitive graphical user interface. We visualize the spectral distribution of an image via parallel coordinates with a strong link to traditional visualization techniques, enabling new paradigms in hyperspectral image analysis that focus on interactive raw data exploration. We combine novel methods for supervised segmentation, global clustering, and nonlinear false-color coding to assist in the visual inspection. Our framework coined Gerbil is open source and highly modular, building on established methods and being easily extensible for application-specific needs. It satisfies the need for a general, consistent software framework that tightly integrates analysis algorithms with an intuitive, modern interface to the raw image data and algorithmic results. Gerbil finds its worldwide use in academia and industry alike with several thousand downloads originating from 45 countries. Johannes Jordan, Elli Angelopoulou, and Andreas Maier Copyright © 2016 Johannes Jordan et al. All rights reserved. Cross-Layer Control with Worst Case Delay Guarantees in Multihop Wireless Networks Mon, 10 Oct 2016 12:15:25 +0000 The delay guarantee is a challenge to meet different real-time requirements in applications of backpressure-based wireless multihop networks, and therefore, researchers are interested in the possibility of providing bounded end-to-end delay. In this paper, a new cross-layer control algorithm with worst case delay guarantees is proposed. The utility maximization algorithm is developed using a Lyapunov optimization framework. Virtual queues that ensure the worst case delay of nondropped packets are designed. It is proved through rigorous theoretical analyses and verified by simulations that the time average overall utility achieved by the new algorithm can be arbitrarily close to the optimal solution with finite queue backlogs. The simulation results evaluated with Matlab show that the proposed algorithm achieves higher throughput utility with fewer data dropped compared with the existing work. Shu Fan and Honglin Zhao Copyright © 2016 Shu Fan and Honglin Zhao. All rights reserved. A Novel Method for Constructing Grid Multi-Wing Butterfly Chaotic Attractors via Nonlinear Coupling Control Wed, 05 Oct 2016 12:34:41 +0000 A new method is presented to construct grid multi-wing butterfly chaotic attractors. Based on the three-dimensional Lorenz system, two first-order differential equations are added along with one linear coupling controller, respectively. And a piecewise linear function, which is taken into the linear coupling controller, is designed to form a nonlinear coupling controller; thus a five-dimensional chaotic system is produced, which is able to generate gird multi-wing butterfly chaotic attractors. Through the analysis of the equilibrium points, Lyapunov exponent spectrums, bifurcation diagrams, and Poincaré mapping in this system, the chaotic characteristic of the system is verified. Apart from the research above, an electronic circuit is designed to implement the system. The circuit experimental results are in accordance with the results of numerical simulation, which verify the availability and feasibility of this method. Yun Huang Copyright © 2016 Yun Huang. All rights reserved. Innovations in Communications Security Tue, 04 Oct 2016 11:46:44 +0000 Mazdak Zamani, Isao Echizen, and Arash Habibi Lashkari Copyright © 2016 Mazdak Zamani et al. All rights reserved. An Optimization Synchronization Algorithm for TDDM Signal Mon, 26 Sep 2016 16:41:55 +0000 The time division data modulation (TDDM) mechanism is recommended to improve the communications quality and enhance the antijamming capability of the spread spectrum communication system, which will be used in the next generation global navigation satellite (GNSS) systems. According to the principle and the characteristics of TDDM signal, an optimization synchronization algorithm is proposed. In the new algorithm, the synchronization accuracy and environmental adaptability have been improved with the special local sequence structure, the multicorrelation processing, and the proportion threshold mechanism. Thus, the inversion estimation formula was established. The simulation results demonstrate that the new algorithm can eliminate the illegibility threat in the synchronization process and can adapt to a lower SNR. In addition, this algorithm is better than the traditional algorithms in terms of synchronization accuracy and adaptability. Fang Liu and Yongxin Feng Copyright © 2016 Fang Liu and Yongxin Feng. All rights reserved. Low Actuating Voltage Spring-Free RF MEMS SPDT Switch Mon, 26 Sep 2016 11:15:09 +0000 RF MEMS devices are known to be superior to their solid state counterparts in terms of power consumption and electromagnetic response. Major limitations of MEMS devices are their low switching speed, high actuation voltage, larger size, and reliability. In the present paper, a see-saw single pole double throw (SPDT) RF MEMS switch based on anchor-free mechanism is proposed which eliminates the above-mentioned disadvantages. The proposed switch has a switching time of 394 nsec with actuation voltage of 5 V. Size of the SPDT switch is reduced by utilizing a single series capacitive switch compared to conventional switches with capacitive and series combinations. Reliability of the switch is improved by adding floating metal and reducing stiction between the actuating bridge and transmission line. Insertion loss and isolation are better than −0.6 dB and −20 dB, respectively, for 1 GHz to 20 GHz applications. Deepak Bansal, Anuroop Bajpai, Prem Kumar, Maninder Kaur, and Kamljit Rangra Copyright © 2016 Deepak Bansal et al. All rights reserved. A Low Noise, Low Power Phase-Locked Loop, Using Optimization Methods Mon, 19 Sep 2016 14:09:48 +0000 A divider-less, low power, and low jitter phase-locked loop (PLL) is presented in this paper. An extra simple open loop phase frequency detector (PFD) is proposed which reduces the power consumption and increases the overall speed. A novel bulk driven Wilson charge pump circuit, whose performance is enhanced by some optimization algorithms, is also introduced to get high output swing and high current matching. The designed PLL is utilized in a CMOS process with a 1.8 V power supply. It has a wide locking range frequency of 500 MHz to 5 GHz. In addition, through the use of a dead-zone-less PFD and a divider-less PLL, the overall jitter is decreased significantly. Noushin Ghaderi, Hamid Reza Erfani-jazi, and Mehdi Mohseni-Mirabadi Copyright © 2016 Noushin Ghaderi et al. All rights reserved. Adaptive Complex-Valued Independent Component Analysis Based on Second-Order Statistics Thu, 08 Sep 2016 17:37:19 +0000 This paper proposes a two-stage fast convergence adaptive complex-valued independent component analysis based on second-order statistics of complex-valued source signals. The first stage constructs a cost function by extending the real-valued whiten cost function to a complex-valued domain and optimizes the cost function using a complex-valued gradient. The second stage uses the restriction that the pseudocovariance matrix of the separated signal is a diagonal matrix to construct the cost function and the geodesic method is used to optimize the cost function. Compared with other adaptive complex-valued independent component analysis, the proposed method shows a faster convergence rate and smaller error. Computer simulations were performed on synthesized signals and communications signals. The simulation results demonstrate the validity of the proposed algorithm. Yanfei Jia and Xiaodong Yang Copyright © 2016 Yanfei Jia and Xiaodong Yang. All rights reserved. Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations Thu, 08 Sep 2016 08:33:32 +0000 Mobile multihop relay (MMR) WiMAX networks have attracted lots of interest in the wireless communication industry recently because of its scalable coverage, improved data rates, and relatively low cost. However, security of MMR WiMAX networks is the main challenge to be addressed. In this paper, we first identify several possible attacks on MMR WiMAX networks in which a rogue base station (BS) or relay station (RS) can get authenticated and gain control over the connections and show that the current standard does not address this problem well. We then propose a set of new authentication protocols for protecting MMR WiMAX networks from rogue BS attack, rogue RS attack, and suppress-replay attack. Our protocols can provide centralized authentication by using a trusted authentication server to support mutual authentication between RS and BS, between RS and RS, and between mobile station (MS) and RS. Moreover, our protocols can also provide distributed authentication with a license issued by the trusted server. We use a formal tool called Scyther to analyze and verify the security properties of our protocols. The results show that our protocols can counter rogue BS and RS attacks and suppress-replay attack and are not susceptible to any known attacks. Jie Huang and Chin-Tser Huang Copyright © 2016 Jie Huang and Chin-Tser Huang. All rights reserved. User Adaptive and Context-Aware Smart Home Using Pervasive and Semantic Technologies Tue, 30 Aug 2016 16:33:30 +0000 Ubiquitous Computing is moving the interaction away from the human-computer paradigm and towards the creation of smart environments that users and things, from the IoT perspective, interact with. User modeling and adaptation is consistently present having the human user as a constant but pervasive interaction introduces the need for context incorporation towards context-aware smart environments. The current article discusses both aspects of the user modeling and adaptation as well as context awareness and incorporation into the smart home domain. Users are modeled as fuzzy personas and these models are semantically related. Context information is collected via sensors and corresponds to various aspects of the pervasive interaction such as temperature and humidity, but also smart city sensors and services. This context information enhances the smart home environment via the incorporation of user defined home rules. Semantic Web technologies support the knowledge representation of this ecosystem while the overall architecture has been experimentally verified using input from the SmartSantander smart city and applying it to the SandS smart home within FIRE and FIWARE frameworks. Aggeliki Vlachostergiou, Georgios Stratogiannis, George Caridakis, George Siolas, and Phivos Mylonas Copyright © 2016 Aggeliki Vlachostergiou et al. All rights reserved. Two Improved Cancellation Techniques for Direct-Conversion Receivers Tue, 30 Aug 2016 09:29:45 +0000 To solve the problems of carrier leakage and DC offset in direct-conversion receiver (DCR) system, the paper proposed two kinds of improved technology to overcome the problems in DCR system. One is the RF carrier cancellation technology; the traditional cancellation technology based on lumped parameter filter can be easily influenced by distribution parameters, the improved circuits use a 3 db bridge to realize a 180-degree phase shifter, and the method can adapt to a wider range of RF frequency. Another is DC offset cancellation technique; a novel DC servo loop circuit is proposed to replace the traditional AC-coupled amplifier circuit. It can improve the integrity of the baseband signal and reduces the complexity of the subsequent software algorithm. Experimental results show that two kinds of improved technology can improve the performance of DCR and expand its scope of application. Xueyuan Hao and Xiaohong Yan Copyright © 2016 Xueyuan Hao and Xiaohong Yan. All rights reserved. Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization Wed, 24 Aug 2016 06:25:53 +0000 In view of the digital image transmission security, based on laser chaos synchronization and Arnold cat map, a novel image encryption scheme is proposed. Based on pixel values of plain image a parameter is generated to influence the secret key. Sequences of the drive system and response system are pretreated by the same method and make image blocking encryption scheme for plain image. Finally, pixels position are scrambled by general Arnold transformation. In decryption process, the chaotic synchronization accuracy is fully considered and the relationship between the effect of synchronization and decryption is analyzed, which has characteristics of high precision, higher efficiency, simplicity, flexibility, and better controllability. The experimental results show that the encryption algorithm image has high security and good antijamming performance. Shu-Ying Wang, Jian-Feng Zhao, Xian-Feng Li, and Li-Tao Zhang Copyright © 2016 Shu-Ying Wang et al. All rights reserved. Hand Depth Image Denoising and Superresolution via Noise-Aware Dictionaries Thu, 18 Aug 2016 13:55:39 +0000 This paper proposes a two-stage method for hand depth image denoising and superresolution, using bilateral filters and learned dictionaries via noise-aware orthogonal matching pursuit (NAOMP) based K-SVD. The bilateral filtering phase recovers singular points and removes artifacts on silhouettes by averaging depth data using neighborhood pixels on which both depth difference and RGB similarity restrictions are imposed. The dictionary learning phase uses NAOMP for training dictionaries which separates faithful depth from noisy data. Compared with traditional OMP, NAOMP adds a residual reduction step which effectively weakens the noise term within the residual during the residual decomposition in terms of atoms. Experimental results demonstrate that the bilateral phase and the NAOMP-based learning dictionaries phase corporately denoise both virtual and real depth images effectively. Huayang Li, Dehui Kong, Shaofan Wang, and Baocai Yin Copyright © 2016 Huayang Li et al. All rights reserved. A Chaos-Based Encryption Scheme for DCT Precoded OFDM-Based Visible Light Communication Systems Wed, 17 Aug 2016 08:37:30 +0000 This paper proposes a physical encryption scheme for discrete cosine transform (DCT) precoded OFDM-based visible light communication systems by employing chaos scrambling. In the proposed encryption scheme, the Logistic map is adopted for the chaos mapping. The chaos scrambling strategy can allocate the two scrambling sequences to the real () and imaginary () parts of OFDM frames according to the initial condition, which enhance the confidentiality of the physical layer. The simulation experimental results prove the efficiency of the proposed encryption method for DCT precoded OFDM-based VLC systems. The experimental results show that the proposed security scheme can protect the DCT precoded OFDM-based VLC from eavesdropper, while keeping the advantage of the DCT precoding technique, which can reduce the PAPR and improve the BER performance of OFDM-based VLC. Zhongpeng Wang and Shoufa Chen Copyright © 2016 Zhongpeng Wang and Shoufa Chen. All rights reserved. Multiband Circular Polarizer Based on Fission Transmission of Linearly Polarized Wave for X-Band Applications Tue, 16 Aug 2016 08:25:12 +0000 A multiband circular polarizer based on fission transmission of linearly polarized wave for x-band application is proposed, which is constructed of 2 × 2 metallic strips array. The linear-to-circular polarization conversion is obtained by decomposing the linearly incident x-polarized wave into two orthogonal vector components of equal amplitude and 90° phase difference between them. The innovative approach of “fission transmission of linear-to-circular polarized wave” is firstly introduced to obtain giant circular dichroism based on decomposition of orthogonal vector components through the structure. It means that the incident linearly polarized wave is converted into two orthogonal components through lower printed metallic strips layer and two transmitted waves impinge on the upper printed strips layer to convert into four orthogonal vector components at the end of structure. This projection and transmission sequence of orthogonal components sustain the chain transmission of electromagnetic wave and can achieve giant circular dichroism. Theoretical analysis and microwave experiments are presented to validate the performance of the structure. The measured results are in good agreement with simulation results. In addition, the proposed circular polarizer exhibits the optimal performance with respect to the normal incidence. The right handed circularly polarized wave is emitted ranging from 10.08 GHz to 10.53 GHz and 10.78 GHz to 11.12 GHz, while the left handed circular polarized wave is excited at 10.54 GHz–10.70 GHz and 11.13 GHz–11.14 GHz, respectively. Farman Ali Mangi, Shaoqiu Xiao, Ghulam Ali Mallah, Deedar Ali Jamro, Imran Memon, and Ghulam Fatima Kakepoto Copyright © 2016 Farman Ali Mangi et al. All rights reserved. Investigation of Improved Methods in Power Transfer Efficiency for Radiating Near-Field Wireless Power Transfer Sun, 14 Aug 2016 11:52:57 +0000 A metamaterial-inspired efficient electrically small antenna is proposed, firstly. And then several improving power transfer efficiency (PTE) methods for wireless power transfer (WPT) systems composed of the proposed antenna in the radiating near-field region are investigated. Method one is using a proposed antenna as a power retriever. This WPT system consisted of three proposed antennas: a transmitter, a receiver, and a retriever. The system is fed by only one power source. At a fixed distance from receiver to transmitter, the distance between the transmitter and the retriever is turned to maximize power transfer from the transmitter to the receiver. Method two is using two proposed antennas as transmitters and one antenna as receiver. The receiver is placed between the two transmitters. In this system, two power sources are used to feed the two transmitters, respectively. By adjusting the phase difference between the two feeding sources, the maximum PTE can be obtained at the optimal phase difference. Using the same configuration as method two, method three, where the maximum PTE can be increased by regulating the voltage (or power) ratio of the two feeding sources, is proposed. In addition, we combine the proposed methods to construct another two schemes, which improve the PTE at different extent than classical WPT system. Hesheng Cheng and Huakun Zhang Copyright © 2016 Hesheng Cheng and Huakun Zhang. All rights reserved. Development of Testing Platform and Comparison Studies for Wood Nondestructive Testing Thu, 11 Aug 2016 16:16:00 +0000 Stress wave based techniques have been developed for evaluating the quality of the wooden materials nondestructively. However the existing techniques have some shortcomings due to the significant variation of the wood properties and are now in need of updating. There are also stress wave based instruments which have been widely used for nondestructive testing of wood. But most of them are inflexible and unsuitable for the tentative studies. This paper proposed and implemented a wood nondestructive testing platform based on NI virtual instrument. Three wood nondestructive testing methods, including peak time interval measurement, cross-correlation, and spectrum analysis, were also tested on this platform with serious decay sample, early decay sample, and defect-free sample. The results show that new methods can be verified easily and the researches of wood nondestructive testing will be accelerated with the designed platform. Jian Li, Yiming Fang, Jiyong Tang, Hailin Feng, and Xiongwei Lou Copyright © 2016 Jian Li et al. All rights reserved. A Novel Hybrid Method for Short-Term Power Load Forecasting Thu, 11 Aug 2016 13:41:27 +0000 Influenced by many uncertain and random factors, nonstationary, nonlinearity, and time-variety appear in power load series, which is difficult to forecast accurately. Aiming at locating these issues of power load forecasting, an innovative hybrid method is proposed to forecast power load in this paper. Firstly, ensemble empirical mode decomposition (EEMD) is used to decompose the power load series into a series of independent intrinsic mode functions (IMFs) and a residual term. Secondly, genetic algorithm (GA) is then applied to determine the best weights of each IMF and the residual term named ensemble empirical mode decomposition based on weight (WEEMD). Thirdly, least square support vector machine (LSSVM) and nonparametric generalized autoregressive conditional heteroscedasticity (NPGARCH) are employed to forecast the subseries, respectively, based on the characteristics of power load series. Finally, the forecasted power load of each component is summed as the final forecasted result of power load. Compared with other methods, the forecasting results of this proposed model applied to the electricity market of Pennsylvania-New Jersey-Maryland (PJM) indicate that the proposed model outperforms other models. Huang Yuansheng, Huang Shenhai, and Song Jiayin Copyright © 2016 Huang Yuansheng et al. All rights reserved. Object Tracking via 2DPCA and -Regularization Wed, 10 Aug 2016 14:23:26 +0000 We present a fast and robust object tracking algorithm by using 2DPCA and -regularization in a Bayesian inference framework. Firstly, we model the challenging appearance of the tracked object using 2DPCA bases, which exploit the strength of subspace representation. Secondly, we adopt the -regularization to solve the proposed presentation model and remove the trivial templates from the sparse tracking method which can provide a more fast tracking performance. Finally, we present a novel likelihood function that considers the reconstruction error, which is concluded from the orthogonal left-projection matrix and the orthogonal right-projection matrix. Experimental results on several challenging image sequences demonstrate that the proposed method can achieve more favorable performance against state-of-the-art tracking algorithms. Haijun Wang, Hongjuan Ge, and Shengyan Zhang Copyright © 2016 Haijun Wang et al. All rights reserved. Performance Estimation Based Multicriteria Partitioning Approach for Dynamic Dataflow Programs Sun, 07 Aug 2016 08:41:57 +0000 The problem of partitioning a dataflow program onto a target architecture is a difficult challenge for any application design. In general, since the problem is NP-complete, it consists of looking for high quality solutions in terms of maximizing the achievable data throughput. The difficulty is given by the exploration of the design space which results in being extremely large for parallel platforms. The paper describes a heuristic partitioning methodology applicable to dynamic dataflow programs. The methodology is based on two elements: an execution model of the dynamic dataflow program which is used as estimation of the performance for the exploration of the large design space and several partitioning algorithms competing to lead to specific high quality solutions. Experimental results are validated with executions on a virtual platform. Małgorzata Michalska, Nicolas Zufferey, and Marco Mattavelli Copyright © 2016 Małgorzata Michalska et al. All rights reserved. Multialgorithmic Frameworks for Human Face Recognition Wed, 03 Aug 2016 11:59:41 +0000 This paper presents a critical evaluation of multialgorithmic face recognition systems for human authentication in unconstrained environment. We propose different frameworks of multialgorithmic face recognition system combining holistic and texture methods. Our aim is to combine the uncorrelated methods of the face recognition that supplement each other and to produce a comprehensive representation of the biometric cue to achieve optimum recognition performance. The multialgorithmic frameworks are designed to combine different face recognition methods such as (i) Eigenfaces and local binary pattern (LBP), (ii) Fisherfaces and LBP, (iii) Eigenfaces and augmented local binary pattern (A-LBP), and (iv) Fisherfaces and A-LBP. The matching scores of these multialgorithmic frameworks are processed using different normalization techniques whereas their performance is evaluated using different fusion strategies. The robustness of proposed multialgorithmic frameworks of face recognition system is tested on publicly available databases, for example, AT & T (ORL) and Labeled Faces in the Wild (LFW). The experimental results show a significant improvement in recognition accuracies of the proposed frameworks of face recognition system in comparison to their individual methods. In particular, the performance of the multialgorithmic frameworks combining face recognition methods with the devised face recognition method such as A-LBP improves significantly. Radhey Shyam and Yogendra Narain Singh Copyright © 2016 Radhey Shyam and Yogendra Narain Singh. All rights reserved. Image Edge Detection Based on Gaussian Mixture Model in Nonsubsampled Contourlet Domain Thu, 28 Jul 2016 14:27:24 +0000 In order to get accurate location and continuous edges, Gaussian mixture model and local direction modulus nonmaxima suppression are used in high frequency subbands of nonsubsampled Contourlet transform. The distribution of NSCT high frequency subbands coefficients has the “high spikes, long tail” non-Gaussian statistical characteristic. Gaussian mixture model (GMM) is used to distinguish the linear singular signal and the nonlinear singular signal on the high frequency subbands. Local direction modulus nonmaxima suppression is used to refine the linear singular signal. An appropriate threshold is used to distinguish edge pixels and nonedge pixels to get binary image. The experimental results demonstrate that the proposed method can capture more continuous edges in multiple directions and has accurate edge location. And the edges are with great convenience for the image recognition. Li Yang, Chang Xia, and Chang Juan Copyright © 2016 Li Yang et al. All rights reserved. An Analysis of QoS in ZigBee Network Based on Deviated Node Priority Thu, 28 Jul 2016 07:40:49 +0000 ZigBee is an IEEE 802.15.4 standardized communication protocol. It forms a flawless Wireless Sensor Network (WSN) standard for interoperability at all levels of the network, particularly the application level which most closely touches the user. A large number of devices from different vendors can work seamlessly. These devices act as a network and send huge data traffic to the Coordinator. End devices at different zones have different roles in communication with each other. There has been a lack in executing their requests in a synchronized way based on task priority. This lack leads to massive data traffic loss and degrades the Quality of Service (QoS). One of the challenges is to analyze the QoS parameters in ZigBee network that help to detect the overall network performance. The contribution of this paper is twofold; first, a ZigBee Network is implemented based on node priority. It demonstrates a method to generate a new priority of devices with respect to their existing priority and zones’ priority as well. Second, the QoS is analyzed based on the new priority status for tasks preference purposes. The outcome of this paper shows that the QoS of the network is more conspicuous than non-priority based network. Md. Jaminul Haque Biddut, Nazrul Islam, Md. Maksudul Karim, and Mohammad Badrul Alam Miah Copyright © 2016 Md. Jaminul Haque Biddut et al. All rights reserved. Communication Behaviour-Based Big Data Application to Classify and Detect HTTP Automated Software Wed, 27 Jul 2016 13:45:38 +0000 HTTP is recognized as the most widely used protocol on the Internet when applications are being transferred more and more by developers onto the web. Due to increasingly complex computer systems, diversity HTTP automated software (autoware) thrives. Unfortunately, besides normal autoware, HTTP malware and greyware are also spreading rapidly in web environment. Consequently, network communication is not just rigorously controlled by users intention. This raises the demand for analyzing HTTP autoware communication behaviour to detect and classify malicious and normal activities via HTTP traffic. Hence, in this paper, based on many studies and analysis of the autoware communication behaviour through access graph, a new method to detect and classify HTTP autoware communication at network level is presented. The proposal system includes combination of MapReduce of Hadoop and MarkLogic NoSQL database along with xQuery to deal with huge HTTP traffic generated each day in a large network. The method is examined with real outbound HTTP traffic data collected through a proxy server of a private network. Experimental results obtained for proposed method showed that promised outcomes are achieved since 95.1% of suspicious autoware are classified and detected. This finding may assist network and system administrator in inspecting early the internal threats caused by HTTP autoware. Manh Cong Tran and Yasuhiro Nakamura Copyright © 2016 Manh Cong Tran and Yasuhiro Nakamura. All rights reserved. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks Tue, 26 Jul 2016 11:42:21 +0000 The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs). With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks. Yasmin M. Amin and Amr T. Abdel-Hamid Copyright © 2016 Yasmin M. Amin and Amr T. Abdel-Hamid. All rights reserved. Compressive Imaging of Moving Object Based on Linear Array Sensor Thu, 14 Jul 2016 16:06:41 +0000 Using the characteristics of a moving object, this paper presents a compressive imaging method for moving objects based on a linear array sensor. The method uses a higher sampling frequency and a traditional algorithm to recover the image through a column-by-column process. During the compressive sampling stage, the output values of the linear array sensor are multiplied by a coefficient that is a measurement matrix element, and then the measurement value can be acquired by adding all the multiplication values together. During the reconstruction stage, the orthogonal matching pursuit algorithm is used to recover the original image when all the measurement values are obtained. Numerical simulations and experimental results show that the proposed compressive imaging method not only effectively captures the information required from the moving object for image reconstruction but also achieves direct separation of the moving object from a static scene. Changjun Zha, Yao Li, Jinyao Gui, Huimin Duan, and Tailong Xu Copyright © 2016 Changjun Zha et al. All rights reserved. The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios Wed, 13 Jul 2016 08:35:15 +0000 Varied P2P trust models have been proposed recently; it is necessary to develop an effective method to evaluate these trust models to resolve the commonalities (guiding the newly generated trust models in theory) and individuality (assisting a decision maker in choosing an optimal trust model to implement in specific context) issues. A new method for analyzing and comparing P2P trust models based on hierarchical parameters quantization in the file downloading scenarios is proposed in this paper. Several parameters are extracted from the functional attributes and quality feature of trust relationship, as well as requirements from the specific network context and the evaluators. Several distributed P2P trust models are analyzed quantitatively with extracted parameters modeled into a hierarchical model. The fuzzy inferring method is applied to the hierarchical modeling of parameters to fuse the evaluated values of the candidate trust models, and then the relative optimal one is selected based on the sorted overall quantitative values. Finally, analyses and simulation are performed. The results show that the proposed method is reasonable and effective compared with the previous algorithms. Jingpei Wang and Jie Liu Copyright © 2016 Jingpei Wang and Jie Liu. All rights reserved. Augmented Reality for Assistance of Total Knee Replacement Mon, 04 Jul 2016 09:17:49 +0000 The aim of this work was the development of a surgical assistance system based on augmented reality to support joint replacement procedures and implantation of prosthetic knee. Images of the scene were captured in order to detect the visual markers located on the lateral surface of the patient’s leg for overlapping the 3D models of the prosthesis and the joint, as well as the tool used by the medical specialist. With the marker identification, it was possible to compute its position and orientation for locating the virtual models, obtaining a monitoring system for giving accurate information about the procedure. Also it can be used as training platform for surgeons, without having volunteers or patients for performing real surgeries; instead they can train in a virtual environment. The results have shown an efficient system in terms of cost-benefit relation, taking into account the materials used for developing the system; nevertheless, the accuracy of the algorithm decreases according to the distance between the markers. Castillo Daniel and Olga Ramos Copyright © 2016 Castillo Daniel and Olga Ramos. All rights reserved.