ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (2,761)
  • 2010-2014  (2,761)
  • 1950-1954
  • International Journal of Distributed Sensor Networks  (1,234)
  • 163708
  • Electrical Engineering, Measurement and Control Technology  (2,761)
  • Medicine
  • 1
    Publication Date: 2013-09-10
    Description: This work provides a distributed fault-tolerant event region detection algorithm for wireless sensor networks. The proposed algorithm can identify faulty and fault-free sensors and ignore the abnormal readings to avoid false alarm. Moreover, every event region can also be detected and identified. Simulation results show that fault detection accuracy (FDA) is greater than 92%, false alarm rate (FAR) is near 0%, and event detection accuracy (EDA) is greater than 99% under uniform distribution. FDA is greater than 92%, FAR is less than 1.2%, and EDA is greater than 88% under random distribution when sensor fault probability is less than 0.3.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2013-09-13
    Description: The components and claddings of low-rise buildings are usually destroyed first during typhoon disasters in coastal areas. Roof accessory structures can change the flow pattern on the roof, thus effectively reducing the wind load on the roof surface and the damage to the low-rise buildings. Three types of aerodynamic mitigation plates, that is, (1) 0.3 m high full-length roof-edge plate, (2) 0.3 m high and 0.5 m + 0.5 m long roof-corner plate, and (3) discrete roof-edge plates with different spaces (which can be used as advertisement boards), are studied on the basis of the field measurement results under roof pitches of 10° and 18.4°. By comparing the results of the roof with and without constructed plates, it is implied that the three types of plates can affect the formation of conical vortexes and can significantly reduce the mean and fluctuating pressure coefficients in the windward corner. Compared with the constructed plate, the roof ridge has a larger influence on the wind loads on leeward roof.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2013-09-15
    Description: Cooperative communications that take advantage of the broadcasting nature of wireless environments can help to increase system throughput in wireless ad hoc networks. However, the promised throughput might be lost in presence of the error transmission and the interference caused by relay transmission in cooperative communication. In this paper, we introduced the relay selection schemes that can control the interference at the relay to prevent the relay that may harm other pairs. Then, we proposed the throughput-optimal scheduling that takes into account error probability in decision and maximizes throughput, that is, the amount of packets transmitted without error in network. In addition, we derive a simple and lightweight framework to implement the proposed policy in distributed manner. The simulation results show that the proposed scheduling policy outperforms the noncooperative policy and multihop relay policy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2013-09-19
    Description: A novel preference ranking organization method by similarity to ideal solution (PROMSIS) vertical handoff algorithm is proposed for heterogeneous wireless networks, and its essential idea includes the preference structure of the PROMETHEE and the concept of Euclid distance of the TOPSIS. Four 3GPP defined traffic classes are considered in performance evaluation. An attribute matrix is constructed considering some major attributes. Handoff decision meeting multiattribute QoS requirement is made according to the traffic features. The weight relation of decision elements is determined with the least square (LS) approach. The final decision is made using the proposed PROMSIS algorithm based on the attribute matrix and weight vector. The simulation results have manifested that the proposed PROMSIS algorithm can provide satisfactory vertical handoff performance, and the LS-PROMSIS algorithm can be fit to the characteristics of the traffic.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2013-09-22
    Description: With the growing interest in ubiquitous technologies recently, many studies have been conducted in order to manage wireless sensor network, which is the central component in ubiquitous environment. To manage a certain wireless sensor network, a variety of techniques can be applied and thereby the network can be managed. However, it is very complicated and time-consuming to incorporate and manage more than a heterogeneous wireless sensor network since each network has different data, meanings, and terms. Instead of conducting verification through examining the detailed technology or simulation in order to manage a variety of wireless sensor networks, we suggest a methodology which manages data coming from the various sensors mentioned above, a technique by which those data from various sensor networks are managed in each different network, and a methodology which manages sensor networks where management languages exist. This paper defined the network-related terminology using Protégé for the tools and definitions necessary for ontology-based methodology, thereby defined OWL and the related rules, and suggested a methodology for incorporated management. In addition, this study showed that the methodology presented in this study has expandability and it can incorporate and manage a variety of wireless sensor networks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2013-09-26
    Description: Wireless sensor networks (WSNs) are becoming bigger, and with this growth comes the need for new automatic mechanisms for initializations done by hand. One of those mechanisms is the assignment of addresses to nodes. Several solutions were already proposed for mobile ad hoc networks but they either (i) do not scale well for WSN; (ii) have no energy constraints; (iii) have no security considerations; (iv) or have no mechanisms to handle fusion of network partitions. We proposed an address self-assignment protocol which uses negative acknowledgements and an improved version of a flood control mechanism to minimize the energy spent; uses a technique named whispering to achieve robustness against malicious nodes; is able to detect dynamic network re-joint and dynamic node addition without exchanging specific messages; and handles both dynamic events without compromising routing tables.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2013-09-27
    Description: Seismic sensors are invaluable for intruder detection and perimeter security. In a typical wireless sensor network application of seismic sensors, the units are battery powered and low power consumption becomes critical while fulfilling system requirements. Although many systems utilize 24-bit ADC for seismic signal processing, we employed 12-bit ADC for low power consumption. Because of this relatively low resolution ADC, preamplifier and filters require careful hardware design. We employ bidirectional T-type filtering, noise reduction, and distributed filtering between gain stages before the signal is input to ADC. The proposed design was verified with measurements. Seismic data signals due to footsteps at varying distances were successfully measured.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2013-09-27
    Description: In ad hoc and sensor networks, reputation-based trust management schemes have been widely used to identify the malicious nodes. These schemes leverage each node’s behaviors for malicious node detection and thus require a certain amount of time to observe the behaviors of nodes. In mobile sensor networks, however, malicious nodes frequently move to different locations, and thus it is likely difficult to collect enough evidence for them. Moreover, when reputation-based schemes are employed, it is not easy to revoke the malicious nodes due to the risk of false positives. To mitigate these limitations of reputation-based schemes, we propose mobile malicious node detection schemes based on software attestation technique, which virtually fulfills zero false positives. In particular, we propose a probabilistic detection scheme in which each node attests its neighboring node with a certain probability. In order to reduce the attestation overhead of the probabilistic detection scheme, we also propose the SPRT (Sequential Probability Ratio Test) based detection scheme that uses the SPRT to determine when to perform the attestations. Through analysis and simulation, we show that our proposed schemes detect mobile malicious nodes through software attestations in robust and efficient manner.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2013-10-01
    Description: The wireless sensor networks are usually deployed in various application-specific contexts, which can be treated as distributed databases with big data. The event-involved query responses can be obtained by issuing query requests to this kind of database. However, the constraints of the energy and delay have had a great impact on the operation of wireless sensor networks. How to design the query-involved network model and the corresponding query processing algorithms is extremely challenging. This work investigates query processing problem in resource-constrained wireless sensor networks with the two-tier architecture and multiple query agents, where the multiple nodes of query agents are configured in the networks and the corresponding source cluster-heads send collected events to only one optimum query agent. To reduce the energy consumption and shorten the delivery delay, an efficient query processing algorithm inspired by the swarm intelligence of ants is proposed, which takes advantage of the beneficial clustering and routing emerging in a hybrid self-organized way from the positive interaction of ants. The experimental results demonstrated that the proposed algorithm can deliver collected events to the optimum query agents efficiently. Not only is the energy cost reduced but also the delivery delay is shortened significantly when transmitting the named events to the appropriate query agents.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2013-10-01
    Description: This paper presents a nonuniform node configuration of wireless sensor networks (WSNs) for long-span bridge health monitoring. The methodology and strategy of two-phase node arrangement for nonuniform WSN configuration are firstly presented, and then numerical examples are carried out by a long-span suspension bridge. Three cases, which are four sensor nodes distributed on one side of the girder, ten sensor nodes distributed on one side of the girder, and eight sensor nodes distributed averagely on two sides of the girder, are employed. In case I and case II, three schemes that are the nonuniform node configuration arranged by the two-phase node arrangement method, the uniform nodes configuration, and the independent sensor nodes configuration are used for comparison. And in case III, two schemes that are nonuniform nodes configuration and the independent sensor nodes configuration are adopted. The results indicate that the nonuniform node configuration can balance energy consumption, eliminate “energy hole,” and maximize network performance effectively, which shows the most outstanding performance when compared with other conventional node configurations. So, the efficiency of the two-phase node arrangement method is validated.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Publication Date: 2013-10-02
    Description: This paper proposes a noncoherent spectrum sensing scheme for the cognitive coexistent heterogeneous networks with the assistance of geolocation information of primary and secondary nodes. Different from the conventional networks with single secondary network, the spectrum sensing scheme in the coexistence scenario should not only detect the primary signal but also detect the secondary signals to avoid the interference with both the primary network and the operating coexistent secondary networks. Therefore, the sensing scheme in this case should be able to differentiate the primary signal from each kind of the secondary signals. However, in the coexistent heterogeneous scenarios, the secondary signals may exploit different PHY modes (some of them may be the same as the primary PHY mode), which imposes difficulties in the coherent signal detection schemes. Aiming to tackle this problem, the parallel detection of both primary signal and each kind of secondary signals is implemented through a proposed noncoherent power decomposition scheme. In this scheme, the power decomposition is formulated into a problem of solving a nonhomogeneous linear equation matrix. During the signal detection, the characteristics of both primary and secondary signals are not required. Both the analysis and the simulation results show the feasibility and efficiency of the proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2013-10-02
    Description: The existing electronic tagging system traces the location of a sex offender using triangulation by communicating with Global Positioning System (GPS) satellites and mobile phone base stations. The acquired location information is used to prevent the offenders from perpetrating repeat crimes. However, the battery resources of such a system are inadequate as it has to trace the location of the moving target in real time and consumes a large amount of battery power while communicating with GPS satellites and mobile phone base stations. In addition, the systems cannot infer the mental state of the targets or detect their alcohol consumption levels, which may be necessary for the prevention of a repeat crime. The purpose of this study is to connect the Ubiquitous System Network (USN), which consumes little electricity, and Android mobile platforms, which are commonly used for machine-to-machine communication. Thus, this system will legally facilitate the protection of minors by providing information only about the target’s approach to certain facilities. In addition, the system uses an Android platform to process data measured by the USN’s sensors, which can also detect alcohol intake and infer the mental state of the target, and then initiates the corresponding real-time context-awareness services.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2013-10-03
    Description: Intrusion detection is a challenging problem in wireless networks due to the broadcast nature of the wireless medium. Physical layer information is increasingly used to protect these vulnerable networks. Meanwhile, reconfigurable antennas are gradually finding their way into wireless devices due to their ability to improve data throughput. In this paper, the capabilities of reconfigurable antennas are used to devise an intrusion detection scheme that operates at the physical layer. The detection problem is posed as a GLRT problem that operates on the channels corresponding to the different modes of a reconfigurable antenna. The performance of the scheme is quantified through field measurements taken in an indoor environment at the 802.11 frequency band. Based on the measured data, we study the achievable performance and the effect of the different control parameters on the performance of the intrusion detection scheme. The effect of pattern correlation between the different modes on the scheme’s performance is also analyzed, based on which general guidelines on how to design the different antenna modes are provided. The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Publication Date: 2013-10-03
    Description: Network coding (NC) is significant for the spectral efficiency promotion of the multiple-source multiple-relay wireless sensor networks (WSNs). However, the existing scheme ignored further exploitation of the communications between relays. To address this issue, a relay ordering algorithm based on finite field NC (FFNC) is proposed in this paper. In the scheme, the relays who initially fail to decode from sources are kept listening and searching for the opportunity to decode the signals from other relays, so as to recover the failure links. The outage probability of the scheme and the corresponding lower bound are theoretically deduced under two-source two-relay assumption. Moreover, the scheme is proved to own the merit of diffusion effect, which makes the diversity improvement more efficient by simply increasing the relay number in the network. Simulation results correspond well with the analysis and demonstrate that the proposed scheme always outperforms FFNC in outage behavior and attains more opportunities to supply full diversity for the network. Moreover, it shows that the diffusion effect enables this scheme to be very suitable for the multiple-relay WSN.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Publication Date: 2013-10-04
    Description: In wireless sensor networks (WSN), sensor deployment is one of the main topics for enhancing the sensor’s coverage rate. In this paper, by modifying updating equation of onlooker bee and scout bee of original artificial bee colony (ABC) algorithm, a sensor deployment algorithm based on the modified ABC algorithm is proposed. Some new parameters such as forgetting and neighbor factor for accelerating the convergence speed and probability of mutant for maximizing the coverage rate are introduced. Simulation results showed that comparing with the deployment method based on original ABC and particle swarm optimization (PSO) algorithm, the proposed approach can achieve a better performance in coverage rate and convergence speed while needing a less total moving distance of sensors.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Publication Date: 2013-10-04
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Publication Date: 2013-10-04
    Description: In wireless sensor network, when these sensors are wrongly placed in an observation region, they can quickly run out of batteries or be disconnected. These incidents may result in huge losses in terms of sensing data from numerous sensors and their costs. For this reason, a number of simulators have been developed as tools for effective design and verification before the actual arrangement of sensors. While a number of simulators have been developed, simulation results can be fairly limited and the execution speed can be markedly slow depending on the function of each simulator. In this regard, to improve the performance of existing simulators, this research aimed to develop a parallel calculation simulator for independent sensor (PCSIS) that enables users to selectively use the GPU mode and, based on this mode, enables parallel and independent operations by matching GPU with many cores in order to resolve the slowdown of the execution speed when numerous sensor nodes are used for simulations. The PCSIS supports the GPU mode in an environment that allows the operation of compute unified device architecture (CUDA) and performs the parallel simulation calculation of multiple sensors using the mode within a short period of time.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Publication Date: 2013-09-12
    Description: Due to advances in microelectromechanical system (MEMS), many smart sensors have been developed. A large number of sensors build a wireless sensor network and can communicate with each other. Wireless sensor networks help monitor objects in our environment, and many researches about this technology are in progress. Condensation is a phenomenon that water vapor contained in the air condenses and makes water droplets. This is caused by the complex action of a variety of factors, including the temperature difference between indoor and outdoor and excessive indoor moisture, so it is never easy to identify the cause and establish measures for the actual building. In this paper, a system is presented to predict and alert condensation promptly and accurately, considering the causes and prevention of condensation. In this paper, a system will be developed to collect and monitor environmental information causing condensation, in real time using a wireless sensor network in order to build a system to prevent condensation. The users are expected to use this system to easily identify the cause of condensation and take actions based on the cause-specific alarm messages in order to alleviate aesthetics and hygiene problems due to condensation.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2013-09-13
    Description: We discuss the problem of maximizing the sensor field coverage for a specific number of sensors while minimizing the distance traveled by the sensor nodes. Thus, we define the movement task as an optimization problem that involves the adjustment of sensor node positions in a coverage optimization mission. We propose a coverage optimization algorithm based on sampling to enhance the coverage of 3D underwater sensor networks. The proposed coverage optimization algorithm is inspired by the simple random sampling in probability theory. The main objective of this study is to lessen computation complexity by dimension reduction, which is composed of two detailed steps. First, the coverage problem in 3D space is converted into a 2D plane for heterogeneous networks via sampling plane in the target 3D space. Second, the optimization in the 2D plane is converted into an optimization in a line segment by using the line sampling method in the sample plane. We establish a quadratic programming mathematical model to optimize the line segment coverage according to the intersection between sensing circles and line segments while minimizing the moving distance of the nodes. The intersection among sensors is decreased to increase the coverage rate, while the effective sensor positions are identified. Simulation results show the effectiveness of the proposed approach.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Publication Date: 2013-09-13
    Description: Wireless sensor networks (WSNs) are a fundamental building block of many pervasive applications. Nevertheless the use of such technology raises new challenges regarding the development of reliable and fault-tolerant systems. One of the most critical issues is the detection of corrupted readings amidst the huge amount of gathered sensory data. Indeed, such readings could significantly affect the quality of service (QoS) of the WSN, and thus it is highly desirable to automatically discard them. This issue is usually addressed through “fault detection” algorithms that classify readings by exploiting temporal and spatial correlations. Generally, these algorithms do not take into account QoS requirements other than the classification accuracy. This paper proposes a fully distributed algorithm for detecting data faults, taking into account the response time besides the classification accuracy. We adopt the Bayesian networks to perform classification of readings and the Pareto optimization to allow QoS requirements to be simultaneously satisfied. Our approach has been tested on a synthetic dataset in order to evaluate its behavior with respect to different values of QoS constraints. The experimental evaluation produced good results, showing that our algorithm is able to greatly reduce the response time at the cost of a small reduction in classification accuracy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Publication Date: 2013-09-17
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Publication Date: 2013-09-19
    Description: We consider the problem of data aggregation for nonuniform and evolving wireless sensor networks. We introduce a new data aggregation algorithm that is able to run on uniform, non-uniform, and evolving networks while maintaining the data accuracy. In addition, the algorithm is able to handle sudden bursts in the underlying data by recording the data in the area of interest for the whole event duration. Experimental results on real and synthetic data show that the algorithm performs well in terms of extending the lifetime of the network, maintaining the original distribution of the sensors as long as possible, maintaining the accuracy of the sensed data, and being able to detect and handle sudden bursts of data.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Publication Date: 2013-09-19
    Description: The congestion control algorithm based on the weighted directed graph is designed for the network congestion over the wireless sensor network. The congestion problem is modeled as a distributed dynamic system with time-varying delay, and it can be proven that the sent rate for all nodes converges to the available bandwidth of the sink by the proposed congestion control algorithm. Via Lyapunov function, the validity of the proposed algorithm is shown under the varying network topologies. Ns simulation results indicate that the proposed algorithm restrains the congestion over the wireless sensor network, maintains a high throughput and a low delay time, and also improves the quality of service for the whole network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Publication Date: 2013-09-24
    Description: In order to achieve the equal usage of limited resources in the wireless sensor networks (WSNs), we must aggregate the sensor data before passing it to the base station. In WSNs, the aggregator nodes perform a data aggregation process. Careful selection of the aggregator nodes in the data aggregation process results in reducing large amounts of communication traffic in the WSNs. However, network conditions change frequently due to sharing of resources, computation load, and congestion on network nodes and links, which makes the selection of the aggregator nodes difficult. In this paper, we study an aggregator node selection method in the WSNs. We formulate the selection process as a top-k query problem, where we efficiently solve the problem by using a modified Sort-Filter-Skyline (SFS) algorithm. The main idea of our approach is to immediately perform a skyline query on the sensor nodes in the WSNs, which enables to extract a set of sensor nodes that are potential candidates to become an aggregator node. The experiments show that our method is several times faster compared to the existing approaches.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Publication Date: 2013-09-24
    Description: In wireless distributed sensor networks, one open problem is how to guarantee the reliable relay selection based on the quality of services diversity. To address this problem, we focus on the reliable adaptive relay selection approach and adaptive QoS supported algorithm, based on which we present a Markov chain model, in consideration of different packet states and error control algorithm assignment. The mathematical analyses and NS-2 simulation results show that the proposed relay selection approach could perform better in terms of saturation throughput, reliability, and energy efficiency, compared with the traditional approaches. More importantly, the quality of real-time multimedia streaming is improved significantly, in terms of decodable frame ratio and delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Publication Date: 2013-09-24
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2013-09-24
    Description: Automatic recognition of personal comfort is critical in realizing autonomous control of building utilities. We can infer human comfort level based on indoor environmental conditions, such as temperature and humidity, collected through sensor networks. However, the majority of methods for optimally deploying sensor networks in indoor climate monitoring mainly focused on achieving accurate measurements such as temperature distribution map with the minimum cost. Indeed, for automatic recognition of comfort using machine learning, we need to collect datasets preserving as much of the discriminatory information for inferring personal comfort with the minimum cost. In this paper, we present a novel method of placing and minimizing sensor nodes for sensor networks in smart energy systems. We have developed ZigBee-based sensor nodes and collected temperature, humidity, and illumination dataset from 13 nodes for a week. Using the dataset, we group the sensor nodes into coherent clusters, and then select a representative node which has the maximum value of RSSI for each cluster and remove the other redundant sensors, reducing the number of sensor nodes deployed. To show the feasibility of the proposed method, we perform a classification analysis of building environment. The recognition accuracy decreased by 13 percent with 6 selected sensor nodes, compared to the result with all 13 sensor nodes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2013-09-25
    Description: In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. However, most present schemes developed for WSNs don’t consider the Internet scenario while traditional mechanisms developed for the Internet are not suitable due to the resource constraint of sensor nodes. In this paper, we propose a scheme, which we refer to as Data Authentication and En-route Filtering (DAEF), for WSNs in the context of IoT. In DAEF, signature shares are generated and distributed based on verifiable secret sharing cryptography and an efficient ID-based signature algorithm. Our security analysis shows that DAEF can defend against node compromise attacks as well as denial of service (DoS) attacks in the form of report disruption and selective forwarding. We also analyze energy consumption to show the advantages of DAEF over some comparable schemes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Publication Date: 2013-09-25
    Description: This paper presents a dynamic adaptive machine-to-machine (M2M) service rate allocation scheme for optimum traffic distribution in heterogeneous wireless environments (HWEs). According to the M2M service characteristics, it proposes the utility function, which forms a convex optimization problem that maximizes the utility of M2M service and can be solved by the Lagrange multiplier. The simulation results show the proposed method convergence, and it can achieve load balance with maximized throughput and minimized cost.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Publication Date: 2013-09-25
    Description: In many surveillance application scenarios of wireless video sensor networks (WVSNs), a number of video sensors are deployed, and multidimension monitored the visual information in a region of interest, forming multiview videos. Since the power, computing capability, and bandwidth are very limited in WVSNs, the conventional multiview video coding method is no longer applicable. So multiview distributed video coding (MDVC) emerged and developed rapidly. In this paper, we propose a new multiview video coding and postprocessing framework for multiview videos. First, in coding scheme, motion intense regions (MIRs) and nonmotion intense regions (NMIRs) based on sum of absolute difference (SAD) criteria are distinguished. For the MIR, the side information (SI) is generated by fusion temporal SI and interview spatial SI at the pixel level. But for the NMIR, the temporal SI is directly use as the ultimate SI. Then, to further improve the quality of the decoded image, an image postprocessing scheme is designed by using deblocking and deringing artifact filters on decoded image. Finally, a set of experimental results show that the proposed fusion SI approach can bring improvements up to 0.2–0.5 dB when compares with only temporal SI used. The subsequent decoded videos postprocessing simulation proves that the proposed postprocessing scheme can provide an additional improvement of about 0.1 dB to the decoded video sequences.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Publication Date: 2013-09-25
    Description: Duty-cycled operation has been introduced as an efficient way to preserve nodes energy and prolong network lifetime for wireless sensor networks. However, such networks are often logically disconnected since there is a limited number of active nodes within a period of time. Traditional routing algorithms, which have been designed for always-awake wireless networks, suffer excessive waiting time incurred by asynchronous schedule of nodes and cannot be applied to these time-dependent sensor networks. In this work, we study the optimization of delivery delay for low-duty-cycle sensor networks. Specially, we theoretically analyze the sleep latency in low-duty-cycle networks and present a new routing metric, which takes both lossy link and asynchronous schedule of nodes into consideration. Based on the metric, we propose delay-driven routing algorithms to find optimal forwarder in order to reduce delivery delay for source-to-sink communication. We compare our design against state-of-the-art routing algorithms derived in wireless networks through large-scale simulations and testbed experiments, which show that our algorithms can achieve a significant reduction in delivery delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Publication Date: 2013-09-25
    Description: It is very important to detect a collapse hole for coal mine workers. The possibility of detecting the collapse hole using WSN is presented because the tunnel in coal mine is narrow and has poor working condition. Comparing three types of the hole detection methods, it is seen that the connectivity-based methods are used to detect coal mine collapse better than other methods. By establishing a 2D model of the collapse hole in coal mine, a class of algorithms for detecting the collapse hole in coal mine is described. Based on log-normal shadowing channel model, the accuracy of detecting the collapse hole in coal mine using Fisher information is analyzed. Numerical calculation shows that connectivity-based localization schemes are better to detect collapse hole of coal mine.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Publication Date: 2013-09-27
    Description: Nowadays, the fractal is used widely everywhere. Then, its creating time becomes an important study area for complex iteration functions because the escape-time algorithm (ETA), which is the most used algorithm in fractal creating, performs not so well in this condition. In this paper, in order to solve this problem, we improve ETA into the parallel environment and reach well performance. At first, we provide a separation method of ETA to reform it into a SIMC-MC2 grid. Secondly, we prove its correctness and compute the complexity of this novel parallel algorithm. Meantime, we separate an improved ETA which we have presented into the same parallel environment and compute its complexity. Additionally, theoretical and experimental results show the characteristics of this novel algorithm. Finally, the computational result shows that a novel environment is needed to decrease large manual allocation strategies, which block the improved benefit.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2013-09-27
    Description: To improve the energy efficiency and the transmission performance of a sensor network MAC protocol under time varying traffic conditions, recent researches have adopted a variable duty cycle operation that makes each node dynamically adjust its own wakeup and sleep schedule according to a predefined trigger condition. However, most of the existing protocols still waste energy on a long preamble packet for waking up a receiver or long idle listening for checking potential communications. To address the energy waste problem, this paper introduces a hybrid MAC protocol called A+MAC that exploits a complementary cooperation between CSMA/CA and preamble sampling. In A+MAC CSMA/CA is used for carrying out communication processes, and preamble sampling is used for checking potential communications. Therefore, A+MAC minimizes both idle listening and the length of a preamble packet by exploiting a short preamble that makes nodes check only the event occurrence. A+MAC also optimizes control packet formats and eliminates both virtual carrier sensing and a separate clock synchronization period from conventional CSMA/CA based MAC protocols. We evaluated both the energy and the network performance of the protocol by using both NS-2 and MICA2 platforms. Our experimentation results show that A+MAC can achieve an order of magnitude energy savings while providing near optimal latency compared to the existing solutions.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Publication Date: 2013-09-30
    Description: In this paper, we introduce a novel design of high-performance smart card with HF/UHF dual-band RFID tag to overcome frequency interference problem. Firstly, we have designed and tested a UHF RFID tag using a simulation software system. In the smart card hardware design stage, we connect a HF antenna and a UHF antenna and place them in one inlay sheet. Using a spectrum analyzer, we systematically adjust the antenna pattern to detect the optimal patterns that fit the impedance of the RFID chip. We evaluate the performance of the resulting smart card with standard RFID testers. The experiments show that our proposed RFID tag outperforms other dual-band RFID tags and maintains itself in a reasonable size. Moreover, we increase IC chip's memory capacity to resolve security-related problems when RFID tags are used in a financial transaction. We firstly exploit an IC contact protruded from the card to add an additional memory, and we integrate functions of the RFID tag to use the equipped memory through the induced current of the contact. The implemented prototype of our proposal can accommodate an extended memory ranging from one gigabyte up to four gigabytes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Publication Date: 2013-09-30
    Description: This paper presents an integer linear programming model devoted to optimize the energy consumption efficiency in heterogeneous wireless sensor networks. This model is based upon a schedule of sensor allocation plans in multiple time intervals subject to coverage and connectivity constraints. By turning off specifics sets of redundant sensors in each time interval, it is possible to reduce the total energy consumption in the network and, at the same time, avoid partitioning the whole network by losing some strategic sensors too prematurely. Since the network is heterogeneous, sensors can sense different phenomena from different demand points, with different sample rates. By resorting to this model, it is possible to provide extra lifetime to heterogeneous wireless sensor networks, reducing their setup and maintenance costs. This is an important issue to be considered when deploying sensor devices in hostile and inaccessible environments.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2013-09-30
    Description: Frame synchronization time of geostationary Earth orbit (GEO) satellites is faster than that of incline geosynchronous satellite orbit and medium Earth orbit satellites in Beidou navigation satellite system (BDS). So time to first fix can be reduced greatly with GEO satellites (GEOs) to provide emergency positioning service during the cold start process. Meanwhile, GEOs can also be utilized to provide radio determination satellite services. Therefore, it is meaningful to research the emergency positioning algorithm based on GEOs. However, due to the poor geometry of the GEOs, the availability and accuracy degrade distinctly. To solve this problem, a low-cost high resolution MS5534B barometric (baro-) module is applied to BDS. Firstly, the principle of emergency positioning based on a baro-altimeter sensor and its performance such as the accuracy are elaborated. Then the effects of baro-altimeter sensor measurement error on positioning are analyzed. Finally, after analyzing the limitation of the conventional algorithms, a new high-accuracy emergency positioning algorithm with baro-altimeter sensor aiding is proposed, which is not limited by the integration and user’s altitude. In comparison to the conventional algorithms, the stimulant and experimental results validate the effectiveness, robustness, and higher performance of the proposed algorithms incorporated with sensors.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2013-10-01
    Description: In self-organized wireless sensor networks (WSNs), any two sensor nodes can connect if they are placed in each other's communication range. Therefore, the physical topology of WSNs is usually a strongly connected topology. Sensor nodes should frequently receive and process data from their large number of neighbors, which will consume great amounts of energy. Shocking wireless channel collision also causes low throughput and high loss packets ratio during data transmission. To improve the transmission performance and save scarce energy, a logical topology generating from the physical one is necessary for the self-organized WSNs. Based on the complex network theory, this paper proposed a novel betweenness addition edges expansion algorithm (BAEE). With betweenness calibration, BAEE algorithm expanded the minimum-cost edges to optimize the network topology. Two performance metrics-connectivity functions, robustness function and efficiency function , were utilized to evaluate the network capability of the robustness and invulnerability. is the parameter to measure the topology connectivity, and is the parameter to evaluate the network exchanging information capability. Based on the simulation under various random failures and intentional attack scenarios, BAEE can effectively optimize WSNs' topology and improve the network's robust connectivity and extremely efficient exchanging information capability.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Publication Date: 2013-10-01
    Description: In many sensor network applications, energy efficiency and latency are major design criteria because battery-operated sensor nodes limit network lifetime. In this paper, we propose a new contention-based duty-cycle MAC protocol using a synchronized approach for use in wireless sensor networks. In the proposed MFT-MAC protocol, we use a control frame that considers the number of DATA frames to be transmitted to the next node in order to improve the energy efficiency and reduce the end-to-end delay. During the SLEEP period, each node transmits multiple DATA frames to the next node through the use of the control frame. The performance of the proposed MAC protocol is confirmed through the use of NS-2 simulator.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Publication Date: 2013-10-02
    Description: PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In this paper, we analyze the security of PP-1 by using truncated differential cryptanalysis. As concrete examples, we consider four versions of PP-1, PP-1/64, PP-1/128, PP-1/192, and PP-1/256. Our attack is applicable to full-round versions of them, respectively. The proposed attacks can recover a secret key of PP-1 with the computational complexity which is faster than the exhaustive search. These are the first known cryptanalytic results on PP-1.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Publication Date: 2013-10-04
    Description: To eliminate the location error of MS/AE (microseismic/acoustic emission) monitoring systems caused by the measurement deviations of the wave velocity, a MS/AE source location method using P-wave and S-wave arrivals for unknown velocity system (PSAFUVS) was developed. Arrival times of P-wave and S-wave were used to calculate and fit the MS/AE source location. The proposed method was validated by numerical experimentations. Results show that the proposed method without the need for a premeasured wave velocity has a reasonable and reliable precision. Effects of arrival errors on location accuracy were investigated, and it shows location errors enlarged rapidity with the increase of arrival errors. It is demonstrated the proposed method can not only locate the MS/AE source for unknown velocity system but also determine the real time PS waves velocities for each event in rockmass.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Publication Date: 2013-06-07
    Description: Body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications in many fields, such as health monitoring. The services in BAN usually have a high requirement on security, especially for the medical diagnosis, which involves private information. With limitations of power and computation capabilities, one of the main challenges to ensure security in BAN is how to generate or distribute a shared key between nodes for lightweight symmetric cryptography. The current research almost exploits the randomness and distinctiveness (characteristics) of physiological signals to solve the key generation problem. However, it needs the help of additional hardware support and has the constraint on positions deployment, to acquire vital signals, which will bring the high cost and hardness to implementation of real system. To avoid the above problems, this paper presents a novel key generation scheme and a key distribution protocol, both of which are only based on wireless modules equipped on sensors. By exploiting the high correlation of received signal strength index (RSSI) between peer-to-peer communications, our scheme can provide a shared symmetric cryptographic key under the presence of an eavesdropper. We conduct experiments on the real Telosb nodes, and the results demonstrate that our proposed methods have a good performance on security.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Publication Date: 2013-06-10
    Description: Message delivery in a mobile social network (MSN) is difficult due to the fact that the topology of such network is sparse and unstable. Various routing schemes for MSNs were proposed to make the message delivery robust and efficient. However, little research has been conducted to explore how much delay has to be tolerated for the message delivery from the source to the destination. Since the social relationships among nodes are stable during a certain period of time, it is expected that the delay of message delivery in MSNs could be modeled with a probability model. In this paper, we take the first step to address this issue. We firstly extract three routing models from the existing routing schemes for MSNs and then develop the probability models of the message transmission delay for each abstract routing model. The simulation results show that the theoretical models match very well the simulation trace statistics.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Publication Date: 2013-06-13
    Description: Data aggregation techniques have been proposed for wireless sensor networks (WSNs) to address the problems presented by the limited resources of sensor nodes. The provision of efficient data aggregation to preserve data privacy is a challenging issue in WSNs. Some existing data aggregation methods for preserving data privacy are CPDA, SMART, the Twin-Key based method, and GP2S. These methods, however, have two limitations. First, the communication cost for network construction is considerably high. Second, they do not support data integrity. There are two methods for supporting data integrity, iCPDA and iPDA. But they have high communication cost due to additional integrity checking messages. To resolve this problem, we propose a novel Hilbert-curve based data aggregation scheme that enforces data privacy and data integrity for WSNs. To minimize communication cost, we utilize a tree-based network structure for constructing networks and aggregating data. To preserve data privacy, we make use of both a seed exchange algorithm and Hilbert-curve based data encryption. To support data integrity, we use an integrity checking algorithm based on the PIR technique by directly communicating between parent and child nodes. Finally, through a performance analysis, we show that our scheme outperforms the existing methods in terms of both energy efficiency and privacy preservation.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Publication Date: 2013-06-11
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Publication Date: 2013-06-07
    Description: Wireless sensor networks (WSNs) are subject to various attacks because of the vulnerable environment, limited recourse, and open communication channel. To protect WSNs, in this paper, we present a Secret sharing-based key management (SSKM). SSKM utilizes the advantages of hierarchical architecture and adopts two-level key management and authentication mechanism, which can efficiently protect the allover network communication security and survivability. Different from previous works, the SSKM distributes keys based on secret sharing mechanism by the clustered architecture, which not only localizes the key things but also keeps scalability. The SSKM provides various session keys, the network key for base station (BS) and cluster heads (CHs); the cluster key between the cluster head and member nodes. The SSKM dynamically generates different keys based on different polynomials from BS in different periods which can protect the network from the compromised nodes and reduce the high probability of the common keys. The security analysis shows that the SSKM can prevent several attacks effectively and reduce the energy consumption.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Publication Date: 2013-06-10
    Description: EPCglobal network is used to share product data between trading partners, which was proposed by EPCglobal. Object Name Service (ONS) in EPCglobal framework raises two critical security risks: the authenticity of IP addresses for Physical Markup Language (PML) servers and the privacy of Electronic Product Codes (EPCs). Existing work considers either the IP address authentication or the EPC privacy. In addition, that work mainly relies on cryptographic tools, in which key distribution is not a trivial task and also causes a large amount of computation overhead. In this paper, we make the first attempt to solve those two security risks together without relying cryptography. We propose a scheme, namely, APP (authenticate ONS and protect EPC privacy), to guarantee the authenticity of IP addresses for PML servers as well as EPC privacy and to maintain ultralightweight computation cost. Moreover, we give formal definition of the authenticity and the privacy in ONS context. The security achievements are strictly analyzed and proved. The extensive analysis results justify the applicability of the proposed scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Publication Date: 2013-06-10
    Description: Wireless Sensor Network (WSN) has proved its presence in various real time applications and hence the security of such embedded devices is a vital issue. Certificateless cryptography is one of the recent paradigms to provide security. Certificateless public key cryptography (CL-PKC) deals effectively with the twin issues of certificate management in traditional public key cryptography and key escrow problem in identity-based cryptography. CL-PKC has attracted special attention in the field of information security as it has opened new avenues for improvement in the present security architecture. Recently, Tsai et al. proposed an improved certificateless signature scheme without pairing and claimed that their new construction is secure against different kinds of attacks. In this paper, we present a security analysis of their scheme and our results show that scheme does not have resistance against malicious-KGC attack. In addition, we have found some security flaws in the certificateless signature scheme of Fan et al. and proved the scheme vulnerable to Strong Type I attack.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Publication Date: 2013-04-10
    Description: This paper addresses the energy efficiency of cooperative communication in WSN. We first establish the energy model of single-hop WSN. It is found that the cooperative communication is more suitable for harsh transmission environment with long-haul distance. The energy consumption per bit is numerically minimized by finding the optimal broadcasting BER and the number of cooperative nodes. Then, we expand the conclusion to the multihop scenario where “energy hole” dominates the longevity of WSN. To mitigate the energy consumption in the hotspots, as well as to keep the promised reliability, we adjust the transmission BER of the clusters according to the hops between the sink and cluster. On one hand, the statistical reliability is met. On the other hand, the energy consumed is converted from the nearer cluster (from the sink) to the farther ones. The network lifetime is thus optimized.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2013-03-22
    Description: Body sensor networks (BSNs) carry heterogeneous traffic types having diverse QoS requirements, such as delay, reliability and throughput. In this paper, we design a priority-based traffic load adaptive medium access control (MAC) protocol for BSNs, namely, PLA-MAC, which addresses the aforementioned requirements and maintains efficiency in power consumption. In PLA-MAC, we classify sensed data packets according to their QoS requirements and accordingly calculate their priorities. The transmission schedules of the packets are determined based on their priorities. Also, the superframe structure of the proposed protocol varies depending on the amount of traffic load and thereby ensures minimal power consumption. Our performance evaluation shows that the PLA-MAC achieves significant improvements over the state-of-the-art protocols.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Publication Date: 2013-04-03
    Description: Wireless sensor network (WSN) experiment platforms are used for teaching, research, and development of WSN. However, existing WSN experiment platforms generally have the following disadvantages: tedious manual operations, invasive measurement method, poor sensor self-awareness, and low resource utilization rate. To address the above problems, this paper proposes OPCPP, an online Plug-Configure-Play experiment platform for WSN. It has four prominent strongpoints: in-application programming in batch, noninvasive measurement method, sensor self-awareness, and remote operation. OPCPP has been used in eight colleges in China for teaching course of “internet of things” till now. We also develop a sensor-aware ZigBee-based smart home system prototype based on OPCPP.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Publication Date: 2013-04-10
    Description: We propose a middleware platform built on wireless USB (WUSB) over wireless body area networks (WBAN) hierarchical protocol for wearable health-monitoring systems (WHMS). The proposed middleware platform is composed of time-synchronization and localization solutions. It is executed on the basis of WUSB over WBAN protocol at each wearable sensor node comprising the WHMS. In the platform, firstly, the time-synchronization middleware is executed. After that, a WHMS host calculates the location of a receiving sensor node by using the difference between the times at which the sensor node received different WBAN beacon frames sent from the WHMS host. The WHMS host interprets the status and motion of the wearable body-sensor objects.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2013-04-08
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Publication Date: 2013-04-09
    Description: An ultrasonic sensor-based personalized multichannel audio rendering method is proposed for multiview broadcasting services. Multiview broadcasting, a representative next-generation broadcasting technique, renders video image sequences captured by several stereoscopic cameras from different viewpoints. To achieve realistic multiview broadcasting, multichannel audio that is synchronized with a user’s viewpoint should be rendered in real time. For this reason, both a real-time person-tracking technique for estimating the user’s position and a multichannel audio rendering technique for virtual sound localization are necessary in order to provide realistic audio. Therefore, the proposed method is composed of two parts: a person-tracking method using ultrasonic sensors and a multichannel audio rendering method using MPEG Surround parameters. In order to evaluate the perceptual quality and localization performance of the proposed method, a MUSHRA listening test is conducted, and the directivity patterns are investigated. It is shown from these experiments that the proposed method provides better perceptual quality and localization performance than a conventional multichannel audio rendering method that also uses MPEG Surround parameters.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Publication Date: 2013-04-01
    Description: Low data delivery efficiency and high energy consumption are the inherent problems in Underwater Wireless Sensor Networks (UWSNs) characterized by the acoustic channels. Existing energy-efficient routing algorithms have been shown to reduce energy consumption of UWSNs to some extent, but still neglect the correlation existing in the local data of sensor nodes. In this paper, we present a Multi-population Firefly Algorithm (MFA) for correlated data routing in UWSNs. We design three kinds of fireflies and their coordination rules in order to improve the adaptability of building, selecting, and optimization of routing path considering the data correlation and their sampling rate in various sensor nodes. Different groups of fireflies conduct their optimization in the evolution in order to improve the convergence speed and solution precision of the algorithm. Moreover, after the data packets are merged during the process of routing path finding, MFA can also eliminate redundant information before they are sent to the sink node, which in turn saves energy and bandwidth. Simulation results have shown that MFA achieves better performance than existing protocols in metrics of packet delivery ratio, energy consumption, and network throughput.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Publication Date: 2013-04-01
    Description: In recent years, the Mobile Ad hoc Network (MANET) is getting more important and is being utilized in various fields. However, routing-disruption attacks have become a serious problem for MANET. In various routing-disruption attack detection methods, transmission time-based methods can detect wormhole attacks efficiently. Attackers might fabricate a time stamp for a Route Request Packet (RREQ) or Route Reply Packet (RREP) to evade wormhole detection methods. To resolve this weakness, we propose a counterattack-detection scheme in transmission time-based wormhole detection methods. In this paper, we show that it is possible for an attacker to find an effective counterattack against wormhole detection methods, so we provide a counterattack-detection scheme. In the first phase, our proposed method uses the transmission time per hop extracted from a RREQ. If the attackers fabricate the RREQ’s starting time to evade our proposed method, we can detect this counterattack using the RREQ’s transmission time in the second phase, because the fabricated starting time makes the transmission time shorter than the original transmission time. The simulation shows that our proposed method has high reliability for detecting both wormhole attacks and the attacker’s counterattack.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Publication Date: 2013-04-01
    Description: Target tracking is a typical and important application of wireless sensor networks (WSNs). In consideration of the network scalability and energy efficiency for target tracking in large-scale WSNs, it has been employed as an effective solution by organizing the WSNs into clusters. However, tracking a moving target in cluster-based WSNs suffers a boundary problem when the target moves across or along the boundaries of clusters, as the static cluster membership prevents sensors in different clusters from sharing information. In this paper, we propose a novel mobility management protocol, called hybrid cluster-based target tracking (HCTT), which integrates on-demand dynamic clustering into a cluster-based WSN for target tracking. By constructing on-demand dynamic clusters at boundary regions, nodes from different static clusters that detect the target can temporarily share information, and the tracking task can be handed over smoothly from one static cluster to another. As the target moves, static clusters and on-demand dynamic clusters alternately manage the target tracking task. Simulation results show that the proposed protocol performs better in tracking the moving target when compared with other typical target tracking protocols.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Publication Date: 2013-04-01
    Description: Network based sensing has become an important field of research, and it is expected that new applications of remote sensing will be developed. A fuzzy collaborative sensor network is developed in this study to predict the cycle time of a job in a semiconductor manufacturing factory, which is an important task for the factory. In the fuzzy collaborative sensor network, each sensor detects the status of a particular job as well as various environmental conditions present in the factory and uses a fuzzy neural network to analyze the received information. Each sensor communicates its settings and forecasting results to other sensors with the aid of a central control unit. According to the experimental results, the aggregate forecasting performance was considerably improved through the sensors’ collaboration.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Publication Date: 2013-04-01
    Description: Being one of the main technologies for Internet of Things (IoT), wireless sensor network is absolutely critical and plays an increasingly important role in the development of Internet of Things. Wireless sensor network is mobile network composed of sensor nodes with limited resources, like computation capability, energy, memory storage, and communication capability. Its characteristic results in that the security of wireless sensor network faces a great challenge. Hence, the security of wireless sensor network is an important issue for the development of IoT and shall be focused on. In this paper, a novel authentication scheme is proposed for wireless sensor networks based on theory of quadratic residues. It is making the use of master key to achieve simple symmetric cryptographic primitives and authentication operation and reach the aims of great resistance against the attacks and low energy consumption. Then the proposed scheme is compared with other network-wide key management schemes, obtaining better results in the aspects of security, efficiency, and scalability.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2013-04-01
    Description: Wireless sensor networks (WSNs) have limited energy and transmission capacity, so data compression techniques have extensive applications. A sensor node with multiple sensing units is called a multimodal or multivariate node. For multivariate stream on a sensor node, some data streams are elected as the base functions according to the correlation coefficient matrix, and the other streams from the same node can be expressed in relation to one of these base functions using linear regression. By designing an incremental algorithm for computing regression coefficients, a multivariate data compression scheme based on self-adaptive regression with infinite norm error bound for WSNs is proposed. According to error bounds and compression incomes, the self-adaption means that the proposed algorithms make decisions automatically to transmit raw data or regression coefficients, and to select the number of data involved in regression. The algorithms in the scheme can simultaneously explore the temporal and multivariate correlations among the sensory data. Theoretically and experimentally, it is concluded that the proposed algorithms can effectively exploit the correlations on the same sensor node and achieve significant reduction in data transmission. Furthermore, the algorithms perform consistently well even when multivariate stream data correlations are less obvious or non-stationary.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2013-04-01
    Description: In recent years, some approaches have been presented for the seamless integration of WSNs with the existing, widely deployed SOA technologies such as XML, Web services, and the Business Process Execution Language (BPEL) to build a wireless sensor networks service application. However, there a great challenge on fault tolerant in WSNs. In this paper, we present our framework and approach to enhance the reliability of service composition applications in WSNs through modeling and analyzing a wireless sensor networks service application based on BPEL with exception handler and compensation mechanism. At first, we analyze all possible states during the execution of BPEL instance in WSNs. Then, we present a state framework for modeling execution context in BPEL instance in WSNs. Based on this framework, we analyze state transition and operational semantics in the case of both correct execution and exceptional execution of BPEL instance in WSNs. Furthermore, we propose the state transition models for three types of activities in BPEL instance. In the end, we present a formal approach to model the execution context in BPEL for WSNs. Using this formal model, one can describe and analyze the control flow result from the exception handler and compensation mechanism in BPEL instance for WSNs.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Publication Date: 2013-04-01
    Description: Energy efficiency is one of the most important issues for WSNs, because the battery of each wireless sensor node cannot be recharged or replaced. Therefore, all batteries have to be well managed, in order to provide a long network lifetime, as well as to reduce energy consumption for WSNs, particularly in clustering and routing. In this paper, we propose an energy-efficient self-organized clustering model with splitting and merging (EECSM), which performs clustering and then splits and merges clusters for energy-efficient cluster-based routing. EECSM uses information of the energy state of sensor nodes, in order to reduce energy consumption and maintain load balance. We show the validity of splitting and merging of clusters and then compare the performance of the proposed EECSM with that of a well-known cluster-based self-organization routing protocol for WSNs. The results of our experiment show good performance of EECSM, in terms of network lifetime, residual energies, scalability, and robustness.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Publication Date: 2013-04-01
    Description: Depending upon the technological developments, the same fast evolution has occurred in the structures of sensor networks, their composing devices which are sensor nodes, and their application areas. Those tiny, energy-constrained, mostly non-real-time data transmitting sensor nodes have evolved to more energy-containing, camera-adapted, real-time multimedia-data-transmitting devices. Developments in the usage areas and the capabilities have revealed some other problems such as time limited data transmission. In this paper, we propose a multichannel cross-layer architecture for Quality of Service (QoS) constrained multimedia sensor networks. The proposed architecture considers both the time and energy efficiency concepts. Energy efficiency is succeeded by ensuring the fair load distribution among the nodes during a real-time multimedia packet stream transmission. Besides ensuring the fair load distribution, on-time packet transmission is also assured by constructing the paths with a hard reservation technique depending on the predetermined QoS constraints. Simulations show that the proposed architecture provides higher performance than the Greedy approach and the LEERA scheme.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Publication Date: 2013-04-04
    Description: In vehicular networks, the multihop message delivery from information source to moving vehicles presents a challenging task due to many factors, including high mobility, frequent disconnection, and real-time requirement for applications. In this paper, we propose a moving target oriented opportunistic routing algorithm in vehicular networks for message delivery from information source to a moving target vehicle. In order to adapt the constantly changing topology of networks, the forwarding decisions are made locally by each intermediate vehicle based on the trajectory information of the target vehicle. The simulation and real trace experiment show that our design provides an efficient message delivery with a higher success ratio, shorter success time, and lower transmission overhead compared with other reference approaches.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Publication Date: 2013-09-06
    Description: Due to the advances in memory and processing capacity of embedded systems, wireless communications, and size of the devices, many researchers are growing more and more interested in wireless sensor networks (WSN). WSN have a large number of nodes with a sensor board, and wireless communication board, and have been applied to many fields. Summer is the season when much personal and property damage arises from various natural disasters such as the heat being reminiscent of subtropical climate and flooding from heavy rain due to global warming. This unusual temperature affects our lives much besides causing natural disasters. Recently, many problems have occurred with respect to hygiene and beauty of view especially due to growing of various molds in the residential environment. In the heat of summer, the damages from molds become serious due to the effect of temperature and humidity according to seasonal characteristics. In this paper, we build a wireless sensor network with some sensors such as temperature and humidity. And then we design and implement the prevention system of molds growth which can predict and prevent molds production in indoor environment.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2013-09-09
    Description: Wireless sensor networks offer a distributed processing environment. Many sensor nodes are deployed in fields that have limited resources such as computing power, network bandwidth, and electric power. The sensor nodes construct their own networks automatically, and the collected data are sent to the sink node. In these traditional wireless sensor networks, network congestion due to packet flooding through the networks shortens the network life time. Clustering or in-network technologies help reduce packet flooding in the networks. Many studies have focused on saving energy in the sensor nodes because the limited available power leads to an important problem of extending the operation of sensor networks as long as possible. However, we focus on the execution time because clustering and local distributed processing already contribute to saving energy by local decision making. In this paper, we present a cooperative processing model based on the processing timeline. Our processing model includes validation of the processing, prediction of the total execution time, and determination of the optimal number of processing nodes for distributed processing in wireless sensor networks. The experiments demonstrate the accuracy of the proposed model, and a case study shows that our model can be used for the distributed application.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2013-09-10
    Description: This paper presents a QoS-aware routing protocol suitable for distribution of smart electricity grids based on heterogeneous machine to machine communications. The distribution Smart Grid needs high performance communication networks capable of handling QoS, an issue that is addressed by the present paper. The proposed algorithm is a merger between a genetic algorithm (GA) and Ticket-Based Routing (TBR), which is an on-demand routing protocol for ad hoc networks that provide quality of service. A suitable parameterization of the GA parameters is needed in order to use this protocol in the coming Smart Grid networks. The resulting routing protocol, named genetic algorithm with TBR algorithm for Smart Grids (GATAS), is an adapted intelligent evolution of the TBR. The performance of TBR has been improved by reducing the overhead of routing packets in the network and by minimizing the communication latency due to its on-demand behavior. Experimental evidence indicates that the likelihood of finding the optimum route using multiobjective dynamic metrics increases when the genetic algorithm is applied. In this paper, the main simulation results on the parameterization carried out are discussed, and the proposed attributes of the GA are described.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2013-09-13
    Description: For long-span bridges located in wind-prone regions, it is a trend to install in situ Wind and Structural Health Monitoring System (WASHMS) for long-term real-time performance assessment. One of the functions of the WASHMS is to provide information for the assessment of wind-induced fatigue damage. Considering the randomness of wind, it is more reasonable to describe wind-induced fatigue damage of bridge in a probabilistic way. This paper aims to establish a probabilistic fatigue model of fatigue damage based on Bayesian learning, and it is applied to a wind-excited long-span bridge installed with a WASHMS. Wind information recorded by the WASHMS is utilized to come up with the joint probability density function of wind speed and direction. A stochastic wind field and subsequently wind-induced forces are introduced into the health monitoring oriented finite element model (FEM) of the bridge to predict the statistics of stress responses in local bridge components. Bayesian learning approach is then applied to determine the probabilistic fatigue damage model. The Tsing Ma suspension bridge in Hong Kong and its WASHMS are finally utilized as a case study. It shows that the proposed approach is applicable for the probabilistic fatigue assessment of long-span bridges under random wind loadings.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Publication Date: 2013-09-15
    Description: Wireless sensor networks (WSNs) consist of thousands of nodes that need to communicate with each other. However, it is possible that some nodes are isolated from other nodes due to limited communication range. This paper focuses on the influence of communication range on the probability that all nodes are connected under two conditions, respectively: (1) all nodes have the same communication range, and (2) communication range of each node is a random variable. In the former case, this work proves that, for , if the probability of the network being connected is , by means of increasing communication range by constant , the probability of network being connected is at least . Explicit function is given. It turns out that, once the network is connected, it also makes the WSNs resilient against nodes failure. In the latter case, this paper proposes that the network connection probability is modeled as Cox process. The change of network connection probability with respect to distribution parameters and resilience performance is presented. Finally, a method to decide the distribution parameters of node communication range in order to satisfy a given network connection probability is developed.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Publication Date: 2013-09-17
    Description: We consider a distributed power control scheme for wireless sensor networks. To derive decentralized solutions that do not require complete information and any cooperation among the users, we formulate this problem as a supermodular game, which each user maximizes its utility function provided transmission rate constraints. Through analyzing the supermodular property of the game, the existence and uniqueness of the Nash equilibrium (NE) are established. Furthermore, we propose a distributed price and power update algorithm (DPPA) to compute the solution of the game which is based on myopic best response. Performance evaluations via numerical simulations verify the existence of theNE and the convergence property of the DPPA algorithm.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Publication Date: 2013-09-19
    Description: Putting forward an efficient routing algorithm in DTN (delay tolerant network) has become a focus of attention due to the existing phenomena that the connections between nodes in the network change dramatically over time and the communications suffer from frequent disruptions. In this paper, the meeting time span between nodes is predicted using the Markov model, and the relay node holding the shortest meeting time span with the destination node is determined as the most efficient node. In the two phases, spray phase and wait phase, the message is routed according to the utility value. Thus, the routing algorithm based on Markov meeting time span prediction model is provided. Simulation results suggest that this algorithm efficiently improves the delivery rate and reduces the average delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2013-09-19
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2013-09-23
    Description: Node location is of great significance as a supporting technology of wireless sensor network (WSN). The information without position would be greatly devalued. So this paper is about location algorithm for nodes of ship-borne WSN based on research on structure of ship and work environment of ship-borne WSN. The whole location process consists of two steps: one is location algorithm among cabins (LAAC), and the other one is location algorithm in the cabin (LAIC). LAAC refers to location with the topology of ship-borne WSN. We can learn which cabin the node lies in. LAIC refers to location based on received signal strength indication (RSSI), we can get distance relationship between nodes by RSSI, and then obtain the specific location by solving this distance relationship. In the last part, this paper verifies the designed location algorithm by experimenting on “A” ship. Experiments show that the location algorithm designed by this paper is feasible.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2013-09-23
    Description: A new wireless sensing network paradigm is presented for face recognition applications. In addition to the flexibility the face recognition system gains by integrating into a wireless sensor network, we take it further by introducing mobility into the network to improve the sensing coverage area and cost efficiency. To implement these goals, a multilayered network structure and Gauss-Markov mobility model are proposed. Furthermore, analysis of the sensing coverage area is given. Besides, some of the potential application scenarios based on the proposed paradigm are also presented. According to the simulation, the whole system achieves high recognition rate and energy efficiency compared to stationary network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Publication Date: 2013-09-25
    Description: The volume array coil in the magnetic resonance imaging (MRI) system is a typical application of the distributed sensor network in the biomedical area. Each coil provides a large coverage of the imaged object, and the signals are largely overlapped during the data acquisition. The intercoil image similarities can be explored for the distributed compressed sensing (CS) based image reconstruction. In this work, a singular value decomposition (SVD) based sparsity basis was developed for the CS-MRI with a volume array coil configuration. In this novel imaging method, the spatial correlation both of intracoil and intercoil exploited. The experimental results showed that is with eightfold undersampled -space data acquisition, the target images could still be faithfully reconstructed using the proposed method, which offered a better imaging performance compared to conventional CS schemes.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2013-09-27
    Description: There is a wide variation in the energy consumption between different educational institutions due to the adoption of different management strategies and different levels of occupants’ environmental understanding. The presence of large amounts of information and communication technology (ICT) equipment and heating, ventilation, and air conditioning (HVAC) system causes a major consumption of energy in higher education institution (HEI) buildings. The main objective of this research is to investigate the use of ICT to optimize the energy consumption in HEI buildings and reduce carbon dioxide (CO2) emission. The first phase of the system has been implemented at King Saud University to measure energy consumption through sensors that read energy consumption of electrical appliances and devices every 10 seconds. The analysis of collected data allows us to develop and employ energy saving strategies that lead to a reduction in total energy consumption. Our preliminary results show that up to 17% of energy consumption can be reduced by simply dealing with standby energy loss of labs’ computers. The novelty of this research comes from the use of a functional database approach to deal with high volume of data and query performance and the incorporation of a timetabling system in energy management system.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2013-09-27
    Description: In large-scale networks, the structure of the underlying network changes frequently, and thus the power iteration method for Personalized PageRank computation cannot deal with this kind of dynamic network efficiently. In this paper, we design a Monte Carlo-based incremental method for Personalized PageRank computation. In a dynamic network, first, we do a random walk starting from each node and save the performed walks into a fingerprint database; second, we update the fingerprint database in a fixed time interval with our proposed update algorithm; finally, when a query is issued by a user, we estimate the Personalized PageRank vector by our proposed approximation algorithm. Experiments on real-world networks show that our method can handle multichanges of the underlying network at a time and is more efficient than related work, so it can be used in real incremental Personalized PageRank-based applications.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Publication Date: 2014-12-17
    Description: Currently, electricity distributors make use of various types of equipment divided into levels of automation. This automation enables the integration of elements such as Intelligent Electronic Devices (IEDs) to the supervision of the distribution electrical system, but there is not an appropriate environment to increase the scale of these elements. In this context, the smart grid comes with specifications that allow adding new elements to the intelligence of the power grid operation. However, the cost of communication is still an impediment to the scalability of the integration of these elements into the current structure. In this paper, we propose a middleware that optimizes the communication of this integration using wireless sensor networks (WSN). The goal is to ensure a gradual integration of new elements taking advantage of the increase in the number of sensor nodes in the network due to the scalability of the system itself. The conversion solutions have been used to allow easy communication between the WSN and the smart grid system, and we also have used data aggregation and compression techniques to increase the lifetime of the wireless sensor network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Publication Date: 2014-12-18
    Description: The sunlight intensity-based global positioning system (SGPS) is able to geolocate outdoor objects by means of the sunlight intensity detection. This paper presents the integration of SGPS into a sensor network in order to improve the overall accuracy using evolutionary algorithms. Another contribution of the paper is to theoretically solve both global and relative positioning of the sensors composing the network within the same framework without satellite-based GPS technology. Results show that this approach is promising and has potential to be improved further.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Publication Date: 2014-12-18
    Description: Indoor localization based on existent WiFi signal strength is becoming more and more prevalent and ubiquitous. Unfortunately, the WiFi received signal strength (RSS) is susceptible by multipath, signal attenuation, and environmental changes, which is the major challenge for accurate indoor localization. To overcome these limitations, we propose the cluster -nearest neighbor (KNN) algorithm with 5 G WiFi signal to reduce the environmental interference and improve the localization performance without additional equipment. In this paper, we propose three approaches to improve the performance of localization algorithm. For one thing, we reduce the computation effort based on the coarse localization algorithm. For another, according to the detailed analysis of the 2.4 G and 5 G signal fluctuation, we expand the real-time measurement RSS before matching the fingerprint map. More importantly, we select the optimal nearest neighbor points based on the proposed cluster KNN algorithm. We have implemented the proposed algorithm and evaluated the performance with existent popular algorithms. Experimental results demonstrate that the proposed algorithm can effectively improve localization accuracy and exhibit superior performance in terms of localization stabilization and computation effort.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Publication Date: 2014-11-05
    Description: Advancement in wireless sensor network (WSN) technology makes it more attractive technology to be adopted in real world applications including home and industrial automation and e-health or infrastructure monitoring. However the mobility consideration in these applications makes the security requirements an essential and challenging task. To make the communication secure and the network robust against attacks, a proper key management scheme should be used. This paper presents a secure online key establishment and authentication scheme for mobility supported heterogeneous sensor networks. The performance evaluation of the proposed scheme is done using OMNET++ simulator while AVISPA tool is used to validate the security of the proposed scheme. It is clear from the obtained results that the proposed scheme provides better network connectivity at a low cost of memory occupation and communication overhead during the authentication and key establishment phases while improving its network resilience against attacks.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Publication Date: 2014-12-09
    Description: This paper investigates a combination of fingerprinting (FP) and extended Kalman filter (EKF) based tracking aiming to tackle conventional problems related to implementation of either tracking or fingerprinting separately. One of the common drawbacks of FP belongs to large data size and consequent large search space. By taking advantage of latest position estimate got from EKF, a virtual surveillance area (VSA) is defined around the estimate. The dimension of this defined surveillance area is much smaller than the size of indoor environment. Consequently, there will be a possibility for FP to be applied in larger areas maintaining the possibility of adding necessary grid points in order to achieve a desired localization performance. Additionally, in order to improve accuracy of ranging, we investigate the impact of a priori knowledge related to the clusters impulse responses and other features; the applied so called soft ranging algorithm for time of arrival (TOA) estimation is modified in order to take advantage of this a priori information and to make its decision variables more accurate. Simulation results show a promising performance improvement via using the proposed hybrid tracking technique and applying a priori information to soft ranging. The tradeoff is along a reasonable increased implementation complexity.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Publication Date: 2014-12-09
    Description: Mobile wireless sensor networks (MWSNs) comprise a collection of mobile sensor nodes with confined and finite resources. They commonly operate in hostile environments such as battle fields and surveillance zones. Owing to their operating nature, MWSNs are often unattended and generally are not equipped with tamper-resistant tools. With little effort, an adversary may capture the nodes, analyze and replicate them, and surreptitiously insert these replicas at strategic locations within the network. Keeping in view of the above, this paper places an emphasis on this aforementioned attack, known as node replication attack in MWSNs. Specifically, the current state-of-the-art of node replication attack in MWSNs is discussed, where this paper provides a detailed description of various existing detection and prevention mechanisms in literature with an aim to provide better understanding of the factors that need to be considered when designing defence mechanism of node replication attack. A detailed categorization of various detection techniques is provided in the paper with critical discussion on each categorization with respect to its advantages, disadvantages, and various constraints. To conclude the paper, a number of parameters are selected for comparison and analysis of all the existing detection schemes in the literature.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Publication Date: 2014-12-01
    Description: The railway is one of the most important facilities for freight logistics. This paper suggests the use of the container security devices (CSDs), which has been adopted for the marine transportation so far, to enhance the security of railway freight transportation. The proposed protocol, CSD Chain Network Protocol (CCNP), was designed for a chain-form network of CSDs, each of which is attached to a container. In CCNP, unauthorized access to freight is reliably reported to the reader deployed at the locomotive. CCNP also cares about the fairness in energy consumption. In a usual chain network, a tag closer to the reader consumes more energy since it ought to forward packets coming from rear tags as well. However, in CCNP, the tag energy consumption for packet forwarding is always the same regardless of the position in a chain owing to an efficient data fusion scheme. In our simulation using QualNet, CCNP reduces the number of disconnections between tags by 59.5% as compared to general chain networks. The energy consumption also decreases by 91.3% of other networks not using an aggregation method.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Publication Date: 2012-12-25
    Description: Many real-time routing mechanisms have been proposed to support the newly developed wireless sensor networks (WSNs) applications such as the transmission and retrieval of multimedia traffic. However, the inherent source constraints of sensor network and instability of wireless communication set quite a problem for the existing routing mechanisms to meet the quality of service (QoS) requirements of some specific QoS-aware applications. Hence, real-time fault-tolerant schemes are highly desired for WSNs to address these challenges. In this paper, we propose an -firm-based real-time fault-tolerant mechanism, which helps routing mechanisms to achieve specific QoS requirement by employing a local status indicator (LSI) at each sensor node to monitor and evaluate the local conditions of node and network. Therefore, specific fault recovery mechanisms could be implemented for ensuring an acceptable QoS performance, according to the evaluated LSI values. By using this fault-tolerant scheme, each node dynamically adjusts its transmission capability to mitigate the performance degradation of real-time service caused by network faults and to maintain the desired reliability and timeliness. Simulation result shows that LSI cannot only help to reduce the effects of congestion, link failure, and void, but also reach higher successful transmission ratio and smaller transmission delay.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Publication Date: 2012-12-31
    Description: With the booming of video devices ranging from low-power visual sensors to mobile phones, the video sequences captured by these simple devices must be compressed easily and reconstructed by relatively more powerful servers. In such scenarios, distributed compressed video sensing (DCVS), combining distributed video coding (DVC) and compressed sensing (CS), is developed as a novel and powerful signal-sensing and compression algorithm for video signals. In DCVS, video frames can be compressed to a few measurements in a separate manner, while the interframe correlation is explored by the joint recovery algorithm. In this paper, a new DCVS joint recovery scheme using side-information-based belief propagation (SI-BP) is proposed to exploit both the intraframe and interframe correlations, which is particularly efficient over error-prone channels. The DCVS scheme using SI-BP is designed over two frame signal models, the mixture Gaussian (MG) model and the wavelet hidden Markov tree (WHMT) model. Simulation results evaluated on two video sequences illustrate that the SI-BP-based DCVS scheme is error resilient when the measurements are transmitted through the noisy wireless channels.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Publication Date: 2013-01-01
    Description: Due to such requirements as low power consumption and low cost, sensor nodes commonly do not include advanced H/W features. The absence of the features such as the memory management unit enforces several tasks to share a memory address domain on a small data memory space (1~16 KB). It exposes each task to the stack overflow causing the corruption of other memory areas. In this paper, we propose a robust and efficient stack memory management method (RESM) that dynamically assigns and releases a preestimated amount of stack memory to each function call at runtime. RESM maintains the stack memory usage with the similar amount of the stack usage that the system actually requires, and the stack memory area of each task is individually protected from corruption by the stack overflow. RESM can also anticipate a saturated condition in data memory at runtime. When the memory state is unsafe from the saturated condition, it conditionally allows function calls to operate tasks without any memory fault by using the proposed function call deferring algorithm. From the analytical and experiment results, it is proven that the performance of RESM outperforms the other mechanisms and RESM can provide more robust stack operation environment.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Publication Date: 2013-02-21
    Description: Fault-tolerant systems are expected to operate in a variety of devices ranging from standard PCs to embedded devices. In addition, the emergence of new software technologies has required these applications to meet the needs of heterogeneous software platforms. However, the existing approaches to build fault-tolerant systems are often targeted at a particular platform and software technology. The objective of this paper is to discuss the use of —a generic component-based framework for the construction of adaptive fault-tolerant systems that can integrate and reuse technologies and deploy them across heterogeneous devices. Furthermore, provides a standardized and interoperable interface for sensor observations by relying upon the “Sensor Web” paradigm established by the Open Geospatial Consortium (OGC). We have implemented a Java prototype of our framework and evaluated the potential benefits by carrying out case studies and performance measurements. By implementing and deploying these case studies in standard PCs as well as in sensor nodes, we show that can cope with the problem of a wide degree of heterogeneity with minimal resource overheads.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2013-02-21
    Description: Saving energy while preserving accuracy is of paramount importance to target tracking in wireless sensor networks. This paper presents an energy-efficient selection of cooperative nodes. In the proposed method, the target detection probability is estimated by single-node processing based on particle filter. Then, an objective function for collaborative target tracking in wireless sensor networks is constructed according to the information utility and the remaining energy of sensor nodes. With this understanding, a dynamic node selection scheme based on genetic algorithms is proposed, which can optimize the tradeoff between the accuracy of tracking and the energy cost of nodes. Simulations demonstrate its superior performance in estimating the target location and saving sensor nodes energy.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2013-02-22
    Description: Recent advances in embedded systems and wireless sensor networks (WSNs) made it possible to realize low-cost monitoring and automation systems for smart grids. This paper presents opportunities and design challenges of WSNs for smart grid applications. WSN-based smart grid applications have been introduced, and some WSN standards and communication protocols have been discussed for smart grid applications. Importantly, node lifetime and link reliability in wireless sensor networking for smart grid applications have been evaluated through case studies based on field tests in electric power system environments.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2013-03-07
    Description: Maritime search and rescue (MSR), as the last defense line for the life at sea, plays a great role in shipping industry and ocean environment protection. MSR is attracting more and more attention from technical and scientific aspects which are expected to help locate the victim goals quickly, precisely, and efficiently. So far, there have been some new techniques applied to MSR, such as computer vision. However, these techniques have a common drawback that they are too dependent on the effort of the search and rescue party, so that the victim goals can only passively wait for their search. To change this kind of passive status, wireless sensor network (WSN) is the deficiencies of the current maritime search and rescue. To make WSN localization suitable for the MSR, an improved microelectromechanical systems MEMS aided algorithm on the basis of triangle and centroid algorithm is proposed to locate and track the search targets in real time and more precisely. Finally, the simulation results show that the proposed method and algorithm are feasible and efficient.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2013-03-07
    Description: Currently, maritime search and rescue (MSR) is mainly depending on the search party, while the searching objects are waiting passively. Therefore, a new method of MSR which is based on the wireless sensor network (WSN) techniques is proposed in this paper. WSN could be self-organized into network and transmit nodes information, such as position information, for search party to accomplish the search and rescue work. However, the application encounters the problems of dynamic adaptability and life cycle limitation at sea. An energy dynamic distribution and optimization algorithm (EDDO), which is based on genetic algorithm (GA), is presented to handle with these problems. The algorithm satisfies the connectivity and energy saving of the network, and the GA with elitism-based immigrants approach is put forward to optimize the poor individuals when the positions of some nodes have changed. Simulation results show that the algorithm can quickly adapt to a dynamic network and reduce energy consumption at the same time.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2013-03-07
    Description: The Internet of Things (IoT) is growing at a fast pace with new devices getting connected all the time. A new emerging group of these devices is the wearable devices, and the wireless sensor networks are a good way to integrate them in the IoT concept and bring new experiences to the daily life activities. In this paper, we present an everyday life application involving a WSN as the base of a novel context-awareness sports scenario, where physiological parameters are measured and sent to the WSN by wearable devices. Applications with several hardware components introduce the problem of heterogeneity in the network. In order to integrate different hardware platforms and to introduce a service-oriented semantic middleware solution into a single application, we propose the use of an enterprise service bus (ESB) as a bridge for guaranteeing interoperability and integration of the different environments, thus introducing a semantic added value needed in the world of IoT-based systems. This approach places all the data acquired (e.g., via internet data access) at application developers disposal, opening the system to new user applications. The user can then access the data through a wide variety of devices (smartphones, tablets, and computers) and operating systems (Android, iOS, Windows, Linux, etc.).
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2013-03-07
    Description: In vehicular networks, sparse roadside vehicular communication (RVC) systems on highways are difficult to provide full coverage of existing roadways because the distance between the roadside units (RSUs) is farther than the RSU’s transmission range. In sparse RVC, collision-free communication is required because the time available for communication is very short. In addition, the collision-free communication has an energy-efficient feature. Therefore, we propose an energy-efficient broadcast MAC protocol in order to expand the service coverage in RVC systems and collision-free communication. The proposed protocol performs a hybrid vehicular communication (HVC). It has a rebroadcast mechanism using a vehicle’s velocity, distance, and angle from nearby vehicle for collision-free communication. Then, we show our protocol’s performance evaluation using ns-2.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2013-03-07
    Description: The paper studies the cooperative spectrum sharing among multiple secondary users (SUs) in a clustering cognitive ad hoc network. The problem is formulated as a repeated game with the aim of maximizing the total transmission rate of SUs. Firstly, a clustering formation procedure is proposed to reduce the overhead and delay of game process in cognitive radio network (CRN). Then the repeated game-inspired model for SUs is introduced. With the model, the convergence condition of the proposed spectrum-sharing algorithm is conducted, and the convergence performance is investigated by considering the effects of three key factors: transmission power, discount factor, and convergence coefficient. Furthermore, the fairness of spectrum sharing is analyzed, and numerical results show a significant performance improvement of the proposed strategy when compared to other similar spectrum-sharing algorithms.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2013-03-07
    Description: A novel circle fitting algorithm is proposed in this paper. The key points of this paper are given as follows: (i) it formulates the circle fitting problem into the special source localization one in wireless sensor networks (WSN); (ii) the multidimensional scaling (MDS) analysis is applied to the data points, and thus the propagator-like method is proposed to represent the circle center parameters as the functions of the circle radius; (iii) the virtual source localization model can be rerepresented as special nonlinear equations of a unique variable (the circle radius) rather than the original three ones (the circle center and radius), and thus the classical fixed-point iteration algorithm is applied to determine the radius and the circle center parameters. The effectiveness of the proposed circle fitting approach is demonstrated using the simulation and experimental results.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2013-03-07
    Description: In designing wireless sensor networks, it is important to reduce energy dissipation and prolong network lifetime. This paper presents research on the existing clustering algorithm applied in heterogeneous sensor networks and then puts forward an energy-efficient prediction clustering algorithm, which is adaptive to sensor networks with energy and objects heterogeneous. This algorithm enables the nodes to select the cluster head according to factors such as energy and communication cost, thus the nodes with higher residual energy have higher probability to become a cluster head than those with lower residual energy, so that the network energy can be dissipated uniformly. In order to reduce energy consumption when broadcasting in clustering phase and prolong network lifetime, an energy consumption prediction model is established for regular data acquisition nodes. Simulation results show that compared with current clustering algorithms, this algorithm can achieve longer sensor network lifetime, higher energy efficiency, and superior network monitoring quality.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2012-10-04
    Description: Area coverage is one of the key issues for wireless sensor networks. It aims at selecting a minimum number of sensor nodes to cover the whole sensing region and maximizing the lifetime of the network. In this paper, we discuss the energy-efficient area coverage problem considering boundary effects in a new perspective, that is, transforming the area coverage problem to the target coverage problem and then achieving full area coverage by covering all the targets in the converted target coverage problem. Thus, the coverage of every point in the sensing region is transformed to the coverage of a fraction of targets. Two schemes for the converted target coverage are proposed, which can generate cover sets covering all the targets. The network constructed by sensor nodes in the cover set is proved to be connected. Compared with the previous algorithms, simulation results show that the proposed algorithm can prolong the lifetime of the network.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Publication Date: 2012-08-17
    Description: An improved algorithm is put forward to improve the poor locating performance of the DV-Hop algorithm, which is one of the range-free algorithms in wireless sensor networks. Firstly, we set some anchor nodes at the border land of monitoring regions. Secondly, the average one-hop distance between anchor nodes is modified, and the average one-hop distance used by each unknown node for estimating its location is modified through weighting the received average one-hop distances from anchor nodes. Finally, we use the particle swarm optimization to correct the position estimated by the 2D hyperbolic localization algorithm, which makes the result closer to the actual position. The simulation results show that the proposed algorithm has better localization performance in the localization precision and stability than the basic DV-Hop algorithm and some existing improved algorithms.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2012-10-18
    Description: Energy efficiency is a critical issue for sensor network since the network lifetime depends on efficient management of the energy resource of sensor nodes. Particularly, designing energy efficient MAC protocol has a significant influence on the performance of wireless sensor network with regards to the energy. The existing MAC protocols developed for sensor network try to avoid energy waste during idle listening time by controlling the duty cycle of the transmission period. Since the traffic conditions are diverse, they may not always display improvements in energy consumption. In this paper we propose a new energy efficient MAC protocol called dynamic threshold MAC (DT-MAC), which employs a dynamic threshold for the buffer of each sensor node to maximize the energy efficiency regardless of specific network traffic condition. Here the packets are stored in the buffer, and then transmitted when the number of packets in the buffer exceeds the threshold dynamically decided according to the number of hops of the node from the source in the path of packet forwarding. The simulation results using OMNnet++ show that DT-MAC enables significant improvement in energy consumption compared to the existing MAC protocols. The proposed DT-MAC protocol also reduces the number of transmissions of control packets.
    Print ISSN: 1550-1329
    Electronic ISSN: 1550-1477
    Topics: Electrical Engineering, Measurement and Control Technology
    Published by Hindawi
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...