• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 273
  • 88
  • 43
  • 37
  • 25
  • 11
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 567
  • 567
  • 468
  • 95
  • 82
  • 81
  • 79
  • 79
  • 78
  • 63
  • 62
  • 61
  • 53
  • 49
  • 47
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Energy Saving Methods in Wireless Sensor Networks

JAWAD ALI, SYED, ROY, PARTHA January 2008 (has links)
<p>To predict the lifetime of wireless sensor networks before their installation is an important concern. The IEEE 802.15.4 standard is specifically meant to support long battery life time; still there are some precautions to be taken by which a sensor network system application based on the standard can be made to run for longer time periods.</p><p>This thesis defines a holistic approach to the problem of energy consumption in sensor</p><p>networks and suggests a choice of node architecture, network structure and routing</p><p>algorithm to support energy saving in the network. The idea and thrust of the thesis is that stand-alone measures such as selecting a low-power microcontroller with embedded transceiver will not alone be sufficient to achieve energy saving over the entire network. A comprehensive design study with energy saving as a primary task must be made. Focus given on the design objectives needs to look at different aspects – application code, network configuration code, routing algorithms etc to come up with an energy efficient network.</p>
22

Remote Surveillance and Measurement

Rashid, Muhammad, Mutarraf, Mumtaz January 2008 (has links)
<p>Wireless Sensor Network (WSN), a collection of “sensor nodes” promises to change the scientist’s approach of gathering the environmental data in various fields. Sensor nodes can be used for non-stop sensing, event detection, location sensing and local control of actuators, this concept gives surety to many latest application areas like agriculture, military, home or factory automation, logistics and so on. Remote surveillance and measurement missions can be performed by using WSNs. The hot research topic now-a-days is to make such networks remotely controllable and adaptive to the environment and mission.</p><p> </p><p>The work carried out in this thesis is the development of a surveillance application using TinyOS/nesC. The purpose of this application is to perform event-detection mission by using any one of the built-in sensor on Mica2 motes as well as a setup protocol is designed to make the WSN remotely controllable and adaptive to the mission. In this thesis, an experimental work is also performed using TinyDB to build up a surveillance system whose purpose is to detect and count the total number of person present at any time in a given room and to view the results at a remote place. Besides these two system applications, a comparative study between TinyDB and nesC is described which concludes that more hardware control can be achieved through nesC which is a more power efficient platform for long-term applications.</p>
23

ZigBee suitability for Wireless Sensor Networks in Logistic Telemetry Applications

Javed, Kamran January 2006 (has links)
<p>There has been a quick development in the wireless network area during the last decade. Mostly </p><p>these days the focus in the wireless area is on very high speed and long range applications. This </p><p>thesis describes how ZigBee is suitable for wireless sensor networks in logistic telemetry </p><p>applications for global managing and monitoring of goods. ZigBee has been developed by the </p><p>organization named as ‘ZigBee Alliance’ as a new wireless standard for the wireless solutions </p><p>based upon the IEEE 802.15.4 Standard [2]. ZigBee is a new technology as compared to the other </p><p>wireless technologies such as Bluetooth, but it has certain characteristics such as low cost, low </p><p>power, support for mesh networking e.t.c which makes its chances to be more successful than </p><p>others. </p><p> </p><p>The other aim of this thesis is to examine different issues related to ZigBee to see its fitness for </p><p>logistic telemetry applications like multi-hop routing issues, routing strategies and design </p><p>requirements. ZigBee is relatively new wireless technology, so there are great deals of promises </p><p>associated with it. In this thesis, a comparison between ZigBee and Bluetooth technologies will </p><p>also be made.</p>
24

Remote Surveillance and Measurement

Rashid, Muhammad, Mutarraf, Mumtaz January 2008 (has links)
Wireless Sensor Network (WSN), a collection of “sensor nodes” promises to change the scientist’s approach of gathering the environmental data in various fields. Sensor nodes can be used for non-stop sensing, event detection, location sensing and local control of actuators, this concept gives surety to many latest application areas like agriculture, military, home or factory automation, logistics and so on. Remote surveillance and measurement missions can be performed by using WSNs. The hot research topic now-a-days is to make such networks remotely controllable and adaptive to the environment and mission. The work carried out in this thesis is the development of a surveillance application using TinyOS/nesC. The purpose of this application is to perform event-detection mission by using any one of the built-in sensor on Mica2 motes as well as a setup protocol is designed to make the WSN remotely controllable and adaptive to the mission. In this thesis, an experimental work is also performed using TinyDB to build up a surveillance system whose purpose is to detect and count the total number of person present at any time in a given room and to view the results at a remote place. Besides these two system applications, a comparative study between TinyDB and nesC is described which concludes that more hardware control can be achieved through nesC which is a more power efficient platform for long-term applications.
25

ZigBee suitability for Wireless Sensor Networks in Logistic Telemetry Applications

Javed, Kamran January 2006 (has links)
There has been a quick development in the wireless network area during the last decade. Mostly these days the focus in the wireless area is on very high speed and long range applications. This thesis describes how ZigBee is suitable for wireless sensor networks in logistic telemetry applications for global managing and monitoring of goods. ZigBee has been developed by the organization named as ‘ZigBee Alliance’ as a new wireless standard for the wireless solutions based upon the IEEE 802.15.4 Standard [2]. ZigBee is a new technology as compared to the other wireless technologies such as Bluetooth, but it has certain characteristics such as low cost, low power, support for mesh networking e.t.c which makes its chances to be more successful than others. The other aim of this thesis is to examine different issues related to ZigBee to see its fitness for logistic telemetry applications like multi-hop routing issues, routing strategies and design requirements. ZigBee is relatively new wireless technology, so there are great deals of promises associated with it. In this thesis, a comparison between ZigBee and Bluetooth technologies will also be made.
26

Wireless Sensor Network for Monitoring of Historic Structures under Rehabilitation

Samuels, Julie Marie 2010 December 1900 (has links)
The use of a wireless sensor network (WSN) to monitor an historic structure under rehabilitation is the focus of this research. To thoroughly investigate the issue, two main objectives are addressed: the development of a reliable WSN tailored for use in historic structures, and the implementation of the monitoring system in the field to test the feasibility of the WSN and its applicability for structural health monitoring (SHM). Three field studies are undertaken in this research. The Frankford Church, an historic wooden church which required foundation replacement, is the first field study. Sensors monitor tilt of the church’s walls throughout construction. During the construction process, the entire floor of the church is removed and the tree stump foundations are replaced by concrete masonry unit (CMU) blocks and steel pedestals. The tilt in the walls is correlated to the construction process. St. Paul Lutheran, an historic masonry church with timber-framed roof, constitutes the second field study. In this structure, the foundations along the exterior walls are underpinned and the floors are removed and replaced with a floating concrete slab. Detected movements are also correlated to the construction efforts. The Johanniskirche, an historic masonry church with moisture problems, is the final field study case. Real-time and past measured WSN climate data is used to determine the most appropriate solution for the humid climate and resulting condensation problems in this structure. From these results, a moisture migration risk analysis protocol is created for use with a WSN to address condensation issues. The results of the tilt monitoring indicate that the approach is realistic to monitor tilt in the walls of historic structures. For future research, it is recommended to implement motes with higher tilt sensitivity. Also, further development of energy saving algorithms and energy harvesting methods will improve the WSN’s performance. Climate monitoring results show it is feasible to monitor climate conditions of historic structures. The moisture migration protocol provides a basis for further improvement. Implementation of this tool will help predict condensation events and prevent future damage to the historic structure.
27

Duality and Genetic Algorithms for the Worst-Case-Coverage Deployment Problem in Wireless Sensor Networks

Peng, Yi-yang 21 July 2005 (has links)
In this thesis, we propose and evaluate algorithms for solving the worst-case-coverage deployment problem in ad-hoc wireless sensor networks. The worst-case-coverage deployment problem is to deploy additional sensors in the wireless sensor field to optimize the worst-case coverage. We derive a duality theorem that reveals the close relation between the maximum breach path and the minimum Delaunay cut. The duality theorem is similar to the well-known max-flow-min-cut theorem in the field of network optimization. The major difference lies in the fact that the object function we study in this paper is nonlinear rather than linear. Based on the duality theorem, we propose an efficient dual algorithm to solve the worst-case-coverage deployment problem. In addition, we propose a genetic algorithm for deploying a number of additional sensors simultaneously. We use analytical proofs and simulation results to justify the usage of the proposed approaches.
28

The Baseband Signal Processing and Circuit Design for 2.45GHz Mode of the IEEE802.15.4 Low Rate-Wireless Personal Area Network (LR-WPAN)

Liu, Tung-yu 11 August 2005 (has links)
The baseband part of IEEE 802.15.4 operated in 2.45 GHz mode is designed and implemented in this essay. First, the features of IEEE 802.15.4 WPAN(Wireless Personal Area Network), PHY layer and MAC Layer are introduced. Then the algorithm and VHDL of the baseband part of transceiver are designed and verified by FPGA board and logical analyzer.
29

Connectivity improvement scheme in wireless sensor network

Chen, Chi-chang 17 July 2007 (has links)
Under the current environment of Wireless Senor Networks (WSN), security is always one of the topics that everyone discussed about. Because of the limitations of WSN¡¦s unique resource, this results in the security of WSN needs to especially consider the calculating ability, memory capacity, characteristics of wireless communication, limited battery power supply, etc. Random key pre-distribution (RKP) is the one of the key distribution that is developed for the sake of safe communication of WSN, the characteristic of RKP is that there must have at least one common pre-distributed key in the two independent nodes in order to compose a pair-wise key, so that the safe communication can be carried out. However, if the nodes are distributed in the loose environment, the numbers of neighbors would be lower due to the decrease of average node degree. Then the connectivity of the entire network would decrease because it is not easy for the RKP to establish the pair-wise key. This paper would set the improvement of the entire network¡¦s connectivity under the loose environment as the starting point to extend the RKP-DE that only considers one-hop neighbor information, and reverse the flow path of RKP-DE and propose RKP- DEinverse from the viewpoint of two-hop neighbor information. Then RKP-DE and RKP- DEinverse are merged and become a new method ¡V RKP- DEtwo_hop, so as to try to prove that we can raise the connectivity of the whole network effectively.
30

The Improved Broadcast Authentication Schemes in Wireless Sensor Networks

Yang, Li-Wei 15 July 2008 (has links)
In the environment of wireless sensor network, while one node want to send a message to another node, the most natural way is used broadcasting to distribute the message to the whole network. In the other words, as long as one node sends messages to the other node, its neighbor nodes can also listen to these messages, and then receive them. The advantage of broadcast networks is that can efficiently distribute data to multiple receivers. However, it has some drawbacks. A sensor network may be deployed in hostile environment where there are malicious attacks. The malicious attacker can send false messages to his neighbor nodes, and then rely on these neighbor nodes to distribute over the network. So if there are not any schemes of the security authentication in the message when a node wants to use broadcast, everyone can impersonate the sender and broadcast false messages. We call this a packet injection attack. So security is a main challenge in broadcast network. In order to authenticate a broadcast message¡Ait would conform to two conditions. First, insure that the data is transmitted from the claimed source. Second, the messages are not be modified en route. TESLA has been proposed to provide such services for sensor networks¡Ait mainly use time synchronization and delay disclosure key to protect encryption key¡CHowever, this scheme still has some drawbacks, so we propose some schemes to modify TESLA in this paper, and we will show these schemes can achieve better performance than previous ones.

Page generated in 0.0359 seconds