FUZZY TECHNIQUES FOR ACCESS AND DATA MANAGEMENT IN HOME AUTOMATION ENVIRONMENTS

Authors

  • MARIO COLLOTTA Facoltà di Ingegneria, Architettura e delle Scienze Motorie Università degli Studi di Enna - Kore Cittadella Universitaria, 94100 Enna, ITALY
  • VINCENZO CONTI Facoltà di Ingegneria, Architettura e delle Scienze Motorie Università degli Studi di Enna - Kore Cittadella Universitaria, 94100 Enna, ITALY
  • GIOVANNI PAU Facoltà di Ingegneria, Architettura e delle Scienze Motorie Università degli Studi di Enna - Kore Cittadella Universitaria, 94100 Enna, ITALY
  • GIANFRANCO SCATA Facoltà di Ingegneria, Architettura e delle Scienze Motorie Università degli Studi di Enna - Kore Cittadella Universitaria, 94100 Enna, ITALY
  • SALVATORE VITABILE Dipartimento di Biopatologia e Biotecnologie Mediche e Forensi Università degli Studi di Palermo Via del Vespro, 90127 Palermo, ITALY

Keywords:

Wireless Sensor Networks, Real-time scheduling, Biometric Authentication, Data Management, Fuzzy Techniques

Abstract

Home Automation Environments are characterized by the integration of electronic devices as well as by the performance of communication and control systems. Environment infrastructure has to meet several requirements including Quality of Service (QoS), safety, security, and energy saving. However, Home Automation deals with complex environments, so that advanced data management systems are required to meet the above constraints. Fuzzy Logic based techniques can be successful used to improve system performance management. This work proposes and describes the use and application of fuzzy rules on a two-tiered architecture integrating a biometric authentication module and communication real-time constraints. The goal is to combine the advantages of wired and wireless networks as well as the biometric recognition accuracy to increase the flexibility and the performance of the proposed deadline oriented architecture. The experimental results of the user authentication module, the energy consumption module and the scheduling module for real-time mobile communication are also outlined.

 

Downloads

Download data is not yet available.

References

S. Vitabile, V. Conti, M. Collotta, G. Scatà, S. Andolina, A. Gentile, F. Sorbello, “A Real-Time

Network Architecture for Biometric Data Delivery in Ambient Intelligence”, Journal of Ambient Intelligence

and Humanized Computing (AIHC), © Springer-Verlag Editor, 2012, ISSN (Print) 1868-5137 - ISSN

(Online) 1868-5145

IEEE Std 802.11-2007 for Information technology - Telecommunications and information

exchange between systems - Local and metropolitan area networks - Specific requirements - Part

: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,

C1-1184, June 2007.

Chun Wai Lau, Bin Ma, Helen M. Meng, Y.S. Moon and Yeung Yam, “Fuzzy Logic

Decision Fusion in a Multimodal Biometric System”, proc. of Interspeech, 2004

Md. Maruf Monwar, Marina Gavrilova, and Yingxu Wang, “A Novel Fuzzy Multimodal

Information Fusion Technology for Human Biometric Traits Identification”, proc. of 10th IEEE

conference on Cognitive Computing, 2011, pp. 112-119

Girija Chetty, “Biometric Liveness Checking Using Multimodal Fuzzy Fusion”, proc. of

IEEE International Conference on Fuzzy Systems (FUZZ), pp. 1-8, 2010

Abdul Wahab, Chai Quek, Chin Keong Tan, and Kazuya Takeda, “Driving Profile

Modeling and Recognition Based on Soft Computing Approach”, IEEE Transactions on Neural

Networks, Vol. 20, no. 4, pp. 563-582, april 2009

A. Azzini, E. Damiani, S. Marrara, “Ensuring the identity of a user in time: a multi-modal

fuzzy approach”, proc. of IEEE International Conference on Computational Intelligence for

Measurement Systems and Applications, pp. 94-99, 2007

C. Militello, V. Conti, S. Vitabile and F. Sorbello, “Embedded Access Points for Trusted

Data and Resources Access in HPC Systems”, The Journal of Supercomputing - An international

journal of High-Performance Computer Design, Analysis and Use, Springer Netherlands

Publisher, 2011, ISSN 0920-8542, Vol. 55, N° 1, pp. 4 – 27, (ISSN Online 1573-0484),

doi:10.1007/s11227-009-0379-1

V. Conti, C. Militello, F. Sorbello, S. Vitabile. “A Frequency-based Approach for Features

Fusion in Fingerprint and Iris Multimodal Biometric Identification Systems”, IEEE Transactions

on Systems, Man, and Cybernetics (SMC) Part C: Applications & Reviews, Vol., 40 issue 4, pp.

-395. 2010, ISSN 1094-6977, doi:10.1109/TSMCC.2010.2045374

C. Militello, V. Conti, S. Vitabile, F. Sorbello, “An Embedded Iris Recognizer for Portable

and Mobile Devices”, Special Issue on "Frontiers in Complex, Intelligent and Software Intensive

Systems" of International Journal of Computer Systems Science & Engineering, Vol. 25, n° 2, pp.

-131, © 2010 CRL Publishing Ltd., ISSN: 0267-6192

V. Conti, C. Militello, S. Vitabile and F. Sorbello, “A Multimodal Technique for an

Embedded Fingerprint Recognizer in Mobile Payment Systems”, International Journal on Mobile

Information Systems - Vol. 5, No. 2, 2009, pp. 105-124, IOS Press Ed., ISSN: 1574-017X,

doi:10.3233/MIS-2009-0076

S. Vitabile, V. Conti, G. Lentini, F., Sorbello, “An Intelligent Sensor for Fingerprint

Recognition”, Proc. of on International Conference on Embedded and Ubiquitous Computing

(EUC-05), Lecture Note in Computer Science (LNCS), Springer-Verlag, vol. 3824, pp. 27-36,

ISBN 3-540-30807-5, 2005

G.Milici, G.Raia, S.Vitabile, F.Sorbello, “Fingerprint Image Enhancement Using

Morphological Filter”, IEEE EUROCON 2005 - The 8th International Conference on Computer

as a tool. Belgrade, Serbia & Montenegro 21-24 November 2005. (pp. 967-970).

A.K. Jain, A. Ross, and S. Prabhakar, “An Introduction to Biometric Recognition”, IEEE

Transactions on Circuits and Systems for Video Technology, Vol.14, NO. 1, January 2004.

Uwe M.Bubeck, “Multibiometric Authentication – An Overview of Recent Developments”

San Diego University, Spring 2003, www.thuktun.org/cs574/papers/multibiometrics.pdf.

N. Poh, S. Bengio, and J. Korczak, "A multi-sample multi-source model for biometric

authentication," in Proc. IEEE 12th Workshop on Neural Networks for Signal Processing, 2002,

pp. 375--384. URL: http://citeseer.ist.psu.edu/thian02multisample.html.

A. Jain, L. Hong, Y. Kulkarni, “A Multimodal Biometric System Using Fingerprint, Face

and Speech”, Conference on Audio-Video based Biometric Person Authentication 1999.

C.W. Lau, B. Ma, H.M. Meng, Y.S. Moon, Y.Yam, “Fuzzy Logic Decision Fusion in a

Multimodal Biometric System”, Proceedings of the 8th International Conference on Spoken

Language Processing (ICSLP), Korea, October 2004.

S. Prabhakar, A.K.Jain, “Decision-level Fusion in Biometric Verification”, Pattern

Recognition, Vol. 35 (4), 2002, pp. 861-874.

K. Dahel, Q.Xiao, “Accuracy Performance Analysis of Multimodal Biometrics”,

Proceedings of the 2003 IEEE, Workshop on Information Assurance.

P. Verlinde, G. Chollet, and M. Acheroy, “Multi-Modal Identity Verification Using Expert

Fusion”, Information Fusion, 1(1):17-33, July 2000.

http://bias.csr.unibo.it/fvc2002/

L.A. Zadeh, “Fuzzy sets”, Information and Control 8, 338-353 (1965)

O. Khader, A. Willig, A. Owlish, “Distributed wakeup scheduling scheme for supporting

periodic traffic WSNs” European wireless, 2009

I.F. Acidly, W. Su, Y. Sankarasubramanian, E. Cayirci “Wireless sensor network: a survey”

Computer Networks Volume 38, Issue 4, 15 March 2002, Pages 393-422

Feng Xia , Wenhong Zhao, Youxian Sun and Yu-Chu Tian, “Fuzzy Logic Control Based

QoS Management in Wireless Sensor/Actuator Networks”, Sensors 2007, 7, pp. 3179-3191.

I. Gupta, D. Riordan, S. Sampalli, “Cluster-head election using fuzzy logic for wireless

sensor networks”, Proceedings of the 3rd Annual Communication Networks and Services

Research Conference. pp. 255-260, 2005

S. S. Kumar, M. N. Kumar, V.S. Sheeba, “Fuzzy Logic based Energy Efficient Hierarchical

Clustering in Wireless Sensor Networks”, International Journal of Research and Reviews in

Wireless Sensor Networks (IJRRWSN), Vol.1, N° 4, pp. 53-57, Dec 2011

G. Ran, H. Zhang. S. Gong, “Improving on LEACH Protocol of Wireless Sensor Networks

Using Fuzzy Logic”, Journal of Information & Computational Science”, Vol.7 N° 3, pp. 767-775,

W.B. Heinzelman, A.P. Chandrakasan, H. Balakrishnan, “An application-specific protocol

architecture for wireless microsensor networks” IEEE Transaction on Wireless Communications,

Vol. 1, Issue 4, pp. 660-670, 2002

M. R. Tripathy, K. Gaur, S. Sharma. G.S. Virdi, “Energy Efficient Fuzzy Logic Based

Intelligent Wireless Sensor Network”, Progress In Electromagnetics Research Symposium

Proceedings, pp. 91-95, 2010

M. Collotta, G Pau, V. M. Salerno, G. Scatà, “A fuzzy based algorithm to Manage Power

Consumption in Industrial Wireless Sensor Network”, 9th IEEE International Conference on

Industrial Informatics (INDIN), pp. 151-156, 2011

M. Yusuf, “Energy-aware fuzzy routing for wireless sensor networks”, Proceedings of the

IEEE Symposium on Emerging Technologies, pp. 63-69, 2005.

L. Chengfa, “An energy-efficient unequal clustering mechanism for wireless sensor

networks”, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, pp.

-612, 2005

P. Codara, D. Maccari, V. Marra, “A logical analysis of Mamdani-type fuzzy inference, I

theoretical bases”, IEEE International Conference on Fuzzy Systems (FUZZ), pp. 1-8, 2010

G.C.Buttazzo, “Hard Real-Time Computing Systems – Predictable Scheduling Algorithms

and Applications”, Springer, ISBN 978-1-4614-0675-4, Third edition, 2011.

“802.15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY)

Specifications for Low-Rate Wireless Personal Area Networks (LR- WPANs)” – June 2006

IEEE standard for information technology. Part 15.4.

IEEE Standard for Information technology--Telecommunications and information exchange

between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless

LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications

IEEE Standard for Information technology--Telecommunications and information exchange

between systems Local and metropolitan area networks--Specific requirements Part 3: Carrier

sense multiple access with Collision Detection (CSMA/CD) Access Method and Physical Layer

Specifications

http://www.control.lth.se/truetime/

http://www.omnetpp.org/

Downloads

Published

2012-05-23

How to Cite

COLLOTTA, M. ., CONTI, V. ., PAU, G. ., SCATA, G. ., & VITABILE, S. . (2012). FUZZY TECHNIQUES FOR ACCESS AND DATA MANAGEMENT IN HOME AUTOMATION ENVIRONMENTS. Journal of Mobile Multimedia, 8(3), 181–203. Retrieved from https://journals.riverpublishers.com/index.php/JMM/article/view/4661

Issue

Section

Articles