• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 168
  • 79
  • 30
  • 16
  • 12
  • 7
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 367
  • 367
  • 367
  • 79
  • 77
  • 70
  • 65
  • 53
  • 52
  • 51
  • 46
  • 40
  • 40
  • 39
  • 35
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Cooperative Context-Aware Setup and Performance of Surveillance Missions Using Static and Mobile Wireless Sensor Networks

Pignaton de Freitas, Edison January 2011 (has links)
Surveillance systems are usually employed to monitor wide areas in which their usersaim to detect and/or observe events or phenomena of their interest. The use ofwireless sensor networks in such systems is of particular interest as these networks can provide a relative low cost and robust solution to cover large areas. Emerging applications in this context are proposing the use of wireless sensor networks composed of both static and mobile sensor nodes. Motivation for this trend is toreduce deployment and operating costs, besides providing enhanced functionalities.The usage of both static and mobile sensor nodes can reduce the overall systemcosts, by making low-cost simple static sensors cooperate with more expensive andpowerful mobile ones. Mobile wireless sensor networks are also desired in somespecific scenarios in which mobility of sensor nodes is required, or there is a specificrestriction to the usage of static sensors, such as secrecy. Despite the motivation,systems that use different combinations of static and mobile sensor nodes are appearing and with them, challenges in their interoperation. This is specially the case for surveillance systems.This work focuses on the proposal of solutions for wireless sensor networks including static and mobile sensor nodes specifically regarding cooperative andcontext aware mission setup and performance. Orthogonally to the setup and performance problems and related cooperative and context aware solutions, the goalof this work is to keep the communication costs as low as possible in the executionof the proposed solutions. This concern comes from the fact that communication increases energy consumption, which is a particular issue for energy constrained sensor nodes often used in wireless sensor networks, especially if battery supplied. Inthe case of the mobile nodes, this energy constraint may not be valid, since their motion might need much more energy. For this type of node the problem incommunicating is related to the links’ instabilities and short time windows availableto receive and transmit data. Therefore, it is better to communicate as little as possible. For the interaction among static and mobile sensor nodes, all thesecommunication constraints have to be considered.For the interaction among static sensor nodes, the problems of dissemination and allocation of sensing missions are studied and a solution that explores local information is proposed and evaluated. This solution uses mobile software agentsthat have capabilities to take autonomous decisions about the mission dissemination and allocation using local context information so that the mission’s requirementscan be fulfilled. For mobile wireless sensor networks, the problem studied is how to perform the handover of missions among the nodes according to their movements.This problem assumes that each mission has to be done in a given area of interest. In addition, the nodes are assumed to move according to different movement patterns,passing through these areas. It is also assumed that they have no commitment in staying or moving to a specific area due to the mission that they are carrying. To handle this problem, a mobile agent approach is proposed in which the agents implement the sensing missions’ migration from node to node using geographical context information to decide about their migrations. For the networks combining static and mobile sensor nodes, the cooperation among them is approached by abiologically-inspired mechanism to deliver data from the static to the mobile nodes.The mechanism explores an analogy based on the behaviour of ants building and following trails to provide data delivery, inspired by the ant colony algorithm. It is used to request the displacement of mobile sensors to a given location according tothe need of more sophisticated sensing equipment/devices that they can provide, so that a mission can be accomplished.The proposed solutions are flexible, being able to be applied to different application domains, and less complex than many existing approaches. The simplicity of the solutions neither demands great computational efforts nor large amounts of memory space for data storage. Obtained experimental results provide evidence of the scalability of these proposed solutions, for example by evaluatingtheir cost in terms of communication, among other metrics of interest for eachsolution. These results are compared to those achieved by reference solutions (optimum and flooding-based), providing indications of the proposed solutions’ efficiency. These results are considered close to the optimum one and significantly better than the ones achieved by flooding-based solutions.
82

Förening av trådlösa mesh-nätverk och PLC-miljö för industriella behov / Composition of wireless mesh networks and PLC for industrial needs

Polya, Alexander, Lindén, Anders January 2015 (has links)
In conjunction with the possibility of inexpensive wireless communication, many products of tomorrow are developed with the support for wireless communication. The technology enables the possibilty of wireless communication to small plattforms at a realistic price. The cheap connectivity allows for great creativity and gives the developers imagination a wide discretion in the development of new products. This thesis aims to evaluate how the serial communication protocol Modbus RTU - RS232, performs and behaves when transported through meshed networks (Atmel lightweight mesh will be used in this thesis). The work was commissioned by M2M Solutions in J¨onk¨oping. The report will answer the following questions1. How does Modbus RTU behaves when transported through a meshed network. 2. How does Modbus RTU preform when transported through Atmel Lightweight Mesh.The authors have chosen to conduct action research to answer established questions. A test system consisting of both hardware and software was designed and created. With this system, several different tests were conducted and the results were observed and subjected to reflection. The different tests varied the distance, the network’s composition and location of the network infrastructure. Through observation of the test system and evaluation of the recorded data conclusions concering Modbus RTU’s performance and behavior during transport in Atmel lightweigh mesh has been drawn. The test system has been designed with the help of clients and previously made research. Modbus behaves nominally during transportation through Atmel lightweight mesh. Before the network is fully established, an inability to transport data has beend observed. The performance is evaluated by the time it takes to send data, the time is greatly affected by the following factors; Network composition and changes in signal strength (that creates changes in transport routes). For each additional node that traffic is transported through an increase of 5-10ms in the responstime was noted. The network’s ability to change the transport route is also expected to increase performance. The wireless communication provides a longer range than during transportation by standard conventional cable.Considering the results, the authors believe that Modbus RTU has the potential for use in transportation through wireless, meshed networks. One possible scenario is when several Modbus RTU masters are beeing used and data needs to be transported over large distances.
83

MESH : a maximum power point tracker for a wireless sensor network

Kobdish, Stephen Matthew 21 February 2011 (has links)
Energy harvesting is becoming increasingly important in low-power applications where energy from the environment is used to power the system alone, or to supplement a battery. For example, pulse oximeter sensors inside helmets of road racing cyclists are powered by the sun. These sensors have become smaller and more practical without the limitation of a finite energy supply. Harvested energy from an energy transducer (solar, piezoelectric, etc.) must be maximized to ensure these devices can survive periods where environmental energy is scarce. The conversion process from the transducer to usable power for the device is not perfectly efficient. Specifically, the output voltage of a solar cell is a function of the light intensity, and by extension the load it powers. A small perturbation of the light source quickly diminishes the available power. The wasted power reduces the energy available for the application, and can be improved using an approach called maximum power point tracking (MPPT). This technique maximizes harvesting efficiency by dynamically impedance matching the transducer to its load. This report introduces the Maximum Efficient Solar Harvester (MESH), an MPPT algorithm tuned for a specific Wireless Sensor Network (WSN) application. MESH specifically controls the operation of the DC-DC converter in a solar power management unit (PMU). The control is done by monitoring the available light and feeding that information to choose the optimal operating point DC-DC converter. This operating point has a direct dependency on the overall efficiency of the system. For MESH to be practical, the cost and power overhead of adding this functionality must be assessed. Empirical results indicate that MESH improves the maximum efficiency of the popular Texas Instruments (TI) RF2500-SEH WSN platform by an average of 20%, which far exceeds the power overhead it incurs. The cost is also found to be minimal, as WSN platforms already include a large portion of the hardware required to implement MESH. The report was done in collaboration with Shahil Rais. It covers the hardware components and the bench automation environment; Rais's companion report focuses on software implementation and MESH architecture definition. / text
84

Σχεδιασμός, υλοποίηση και πειραματική αξιολόγηση πρωτοκόλλων συλλογής δεδομένων σε δίκτυα αισθητήρων με κινητά κέντρα ελέγχου

Πατρούμπα, Δήμητρα 03 August 2009 (has links)
Τα Δίκτυα Αισθητήρων αποτελούνται από ένα μεγάλο αριθμό μικρών αυτόνομων συσκευών, που αλληλεπιδρούν με το άμεσο περιβάλλον τους μέσω αισθητήρων, επικοινωνούν μεταξύ τους ασύρματα και συνεργάζονται φέροντας εις πέρας εργασίες που δε θα μπορούσε να ολοκληρώσει μία μόνο συσκευή. Κάθε συσκευή του δικτύου διαθέτει περιορισμένη υπολογιστική δύναμη και ενεργειακούς πόρους, επομένως η όσο το δυνατόν λιγότερη κατανάλωση ενέργειας είναι βασικό πρόβλημα των δικτύων αισθητήρων για τη μεγιστοποίηση του χρόνου ζωής τους. Συνήθως τα δίκτυα αισθητήρων αναπτύσσονται σε μεγάλες περιοχές ενδιαφέροντος για την υποστήριξη σημαντικών εφαρμογών του πραγματικού κόσμου. Η πληροφορία που ανιχνεύεται από τους κόμβους αισθητήρων προωθείται προς ένας σταθερό, συνήθως, κέντρο ελέγχου, με αναμεταδόσεις των δεδομένων στους ενδιάμεσους κόμβους. Η διαδικασία αυτή έχει ως αποτέλεσμα τη μεγάλη κατανάλωση ενέργειας στις συσκευές, ιδιαίτερα σε αυτές που βρίσκονται κοντά στο κέντρο ελέγχου, αφού πρέπει να αναμεταδίδουν και τα δεδομένα που φτάνουν από το υπόλοιπο δίκτυο προς το κέντρο ελέγχου. Για την επίτευξη μιας πιο ισορροπημένης και αποδοτικής διαδικασίας συλλογής δεδομένων, τα τελευταία χρόνια έχει υιοθετηθεί μια νέα προσέγγιση, όπου το κέντρο ελέγχου είναι κινητό. Η βασική ιδέα είναι ότι το κέντρο ελέγχου διαθέτει σημαντικά και εύκολα ανανεώσιμα αποθέματα ενέργειας, επομένως μπορεί να κινείται στην περιοχή όπου έχει αναπτυχθεί το δίκτυο αισθητήρων, αναλαμβάνοντας να συλλέξει τα δεδομένα από τους κόμβους με πολύ μικρό κόστος. Ωστόσο, η μετάδοση των δεδομένων μπορεί να παρουσιάζει σημαντικές καθυστερήσεις. Στην παρούσα εργασία αναπτύχθηκαν πρωτόκολλα ελέγχου της κίνησης ενός κέντρου ελέγχου σε δίκτυο αισθητήρων με ανομοιογενή ανάπτυξη των κόμβων αισθητήρων, με στόχο την αποδοτική, ως προς την ενέργεια και τον χρόνο παράδοσης, συλλογή των δεδομένων. Συγκεκριμένα, το κέντρο ελέγχου διαιρεί νοητά το δίκτυο σε περιοχές τις οποίες και επισκέπτεται διαδοχικά, σταματώντας σε κάθε περιοχή για ένα συγκεκριμένο χρονικό διάστημα, ώστε να συλλέξει τα δεδομένα. Προτείνουμε δύο τρόπους κίνησης του κέντρου ελέγχου, ντετερμινιστικό και τυχαίο. Στην τυχαία κίνηση, η επιλογή της επόμενης περιοχής την οποία θα επισκεφτεί το κέντρο ελέγχου γίνεται με τυχαίο τρόπο, εισάγοντας όμως ένα όρο μεροληψίας, έτσι ώστε να προτιμούνται περιοχές που έχουν δεχτεί λιγότερες επισκέψεις. Επιπλέον η μέθοδός μας αποφασίζει το χρόνο παύσης σε κάθε περιοχή λαμβάνοντας υπόψιν κάποιες βασικές παραμέτρους του δικτύου, όπως τα αρχικά αποθέματα ενέργειας των κόμβων αισθητήρων και την πυκνότητα της κάθε περιοχής, έτσι ώστε να παραμένει περισσότερο χρόνο σε περιοχές με μεγαλύτερη πυκνότητα, άρα και μεγαλύτερη ποσότητα πληροφορίας. Με τον τρόπο αυτό επιτυγχάνεται η γρήγορη κάλυψη όλου του δικτύου, καθώς επίσης και η δίκαιη εξυπηρέτηση των επιμέρους περιοχών του δικτύου. Τα προτεινόμενα πρωτόκολλα αξιολογήθηκαν πειραματικά μέσω προσομοίωσης, χρησιμοποιώντας ποικίλες τιμές για βασικές παραμέτρους του δικτύου και σύγκρινοντάς τα με σχετικές υπάρχουσες ευρέως αποδεκτές μεθόδους. Τα αποτελέσματα που πήραμε δείχνουν ότι τόσο ο χρόνος παράδοσης των μηνυμάτων, όσο και η ενέργεια που καταλώθηκε διατηρούνται σε χαμηλά επίπεδα, βελτιώνοντας σημαντικά την προηγούμενη σχετική έρευνα. / Wireless Sensor Networks consist of a large number of small, autonomous devices, that are able to interact with their inveronment by sensing and collaborate to fulfill their tasks, as, usually, a single node is incapable of doing so; and they use wireless communication to enable this collaboration. Each device has limited computational and energy resources, thus a basic issue in the applicastions of wireless sensor networks is the low energy consumption and hence, the maximization of the network lifetime. The collected data is disseminated to a static control point – data sink in the network, using node to node - multi-hop data propagation. However, sensor devices consume significant amounts of energy in addition to increased implementation complexity, since a routing protocol is executed. Also, a point of failure emerges in the area near the control center where nodes relay the data from nodes that are farther away. Recently, a new approach has been developed that shifts the burden from the sensor nodes to the sink. The main idea is that the sink has significant and easily replenishable energy reserves and can move inside the area the sensor network is deployed, in order to acquire the data collected by the sensor nodes at very low energy cost. However, the need to visit all the regions of the network may result in large delivery delays. In this work we have developed protocols that control the movement of the sink in wireless sensor networks with non-uniform deployment of the sensor nodes, in order to succeed an efficient (with respect to both energy and latency) data collection. More specifically, a graph formation phase is executed by the sink during the initialization: the network area is partitioned in equal square regions, where the sink, pauses for a certain amount of time, during the network traversal, in order to collect data. We propose two network traversal methods, a deterministic and a random one. When the sink moves in a random manner, the selection of the next area to visit is done in a biased random manner depending on the frequency of visits of its neighbor areas. Thus, less frequently visited areas are favored. Moreover, our method locally determines the stop time needed to serve each region with respect to some global network resources, such as the initial energy reserves of the nodes and the density of the region, stopping for a greater time interval at regions with higher density, and hence more traffic load. In this way, we achieve accelerated coverage of the network as well as fairness in the service time of each region.Besides randomized mobility, we also propose an optimized deterministic trajectory without visit overlaps, including direct (one-hop) sensor-to-sink data transmissions only. We evaluate our methods via simulation, in diverse network settings and comparatively to related state of the art solutions. Our findings demonstrate significant latency and energy consumption improvements, compared to previous research.
85

INFORMATION-THEORETIC OPTIMIZATION OF WIRELESS SENSOR NETWORKS AND RADAR SYSTEMS

Kim, Hyoung-soo January 2010 (has links)
Three information measures are discussed and used as objective functions for optimization of wireless sensor networks (WSNs) and radar systems. In addition, a long-term system performance measure is developed for evaluating the performance of slow-fading WSNs. Three system applications are considered: a distributed detection system, a distributed multiple hypothesis system, and a radar target recognition system.First, we consider sensor power optimization for distributed binary detection systems. The system communicates over slow-fading orthogonal multiple access channels. In earlier work, it was demonstrated that system performance could be improved by adjusting transmit power to maximize the J-divergence measure of a binary detection system. We define outage probability for slow-fading system as a long-term performance measure, and analytically develop the detection outage with the given system model.Based on the analytical result of the outage probability, diversity gain is derived and shown to be proportional to the number of the sensor nodes. Then, we extend the optimized power control strategy to a distributed multiple hypothesis system, and enhance the power optimization by exploiting a priori probabilities and local sensor statistics. We also extend outage probability to the distributed multiple-hypotheses problem. The third application is radar waveform design with a new performance measure: Task-Specific Information (TSI). TSI is an information-theoretic measure formulated for one or more specific sensor tasks by encoding the task(s) directly into the signal model via source variables. For example, we consider the problem of correctly classifying a linear system from a set of known alternatives, and the source variable takes the form of an indicator vector that selects the transfer function of the true hypothesis. We then compare the performance of TSI with conventional waveforms and other information-theoretic waveform designs via simulation. We apply radar-specific constraints and signal models to the waveform optimization.
86

Cellular Automata: Algorithms and Applications

Clarridge, Adam 23 March 2009 (has links)
Cellular automata (CA) are an interesting computation medium to study because of their simplicity and inherently parallel operation. These characteristics make them a useful and efficient computation tool for applications such as cryptography and physical systems modelling, particularly when implemented on specialized parallel hardware. In this dissertation, we study a number of applications of CA and develop new theoretical results used for them. We begin by presenting conditions which guarantee that a composition of marker cellular automata has the same neighbourhood as each of the individual components. We show that, under certain technical assumptions, a marker cellular automaton has a unique inverse with a given neighbourhood. We use these results to develop a working key generation algorithm for a public-key cryptosystem based on reversible cellular automata originally conceived by Kari. We also give an improvement to a CA algorithm which solves a version of the convex hull problem, ensuring that the algorithm does not require a global rule change and correcting the operation in a special case. Finally, we study a modified version of an established CA-based car traffic flow model for the single-lane highway case, and use CA as a modelling tool to investigate the coverage problem in wireless sensor network design. We developed functional software implementations for all of these experiments. / Thesis (Master, Computing) -- Queen's University, 2009-03-23 11:20:58.666
87

Enabling Ultra Large-Scale Radio Identification Systems

ALI, KASHIF 31 August 2011 (has links)
Radio Frequency IDentification (RFID) is growing prominence as an automated identification technology able to turn everyday objects into an ad-hoc network of mobile nodes; which can track, trigger events and perform actions. Energy scavenging and backscattering techniques are the foundation of low-cost identification solutions for RFIDs. The performance of these two techniques, being wireless, significantly depends on the underlying communication architecture and affect the overall operation of RFID systems. Current RFID systems are based on a centralized master-slave architecture hindering the overall performance, scalability and usability. Several proposals have aimed at improving performance at the physical, medium access, and application layers. Although such proposals achieve significant performance gains in terms of reading range and reading rates, they require significant changes in both software and hardware architectures while bounded by inherited performance bottlenecks, i.e., master-slave architecture. Performance constraints need to be addressed in order to further facilitate RFID adoption; especially for ultra large scale applications such as Internet of Things. A natural approach is re-thinking the distributed communication architecture of RFID systems; wherein control and data tasks are decoupled from a central authority and dispersed amongst spatially distributed low-power wireless devices. The distributed architecture, by adjusting the tag's reflectivity coefficient creates micro interrogation zones which are interrogated in parallel. We investigate this promising direction in order to significantly increase the reading rates and reading range of RFID tags, and also to enhance overall system scalability. We address the problems of energy-efficient tag singulations, optimal power control schemes and load aware reader placement algorithms for RFID systems. We modify the conventional set cover approximation algorithm to determine the minimal number of RFID readers with minimal overlapping and balanced number of tags amongst them. We show, via extensive simulation analysis, that our approach has the potential to increase the performance of RFID technology and hence, to enable RFID systems for ultra large scale applications. / Thesis (Ph.D, Computing) -- Queen's University, 2011-08-30 23:41:02.937
88

Data Security in Unattended Wireless Sensor Networks

Vepanjeri Lokanadha Reddy, Sasi Kiran 14 January 2013 (has links)
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.
89

Efficient algorithms for answering geo-range query

Zhang, Xi 16 April 2010 (has links)
In wireless sensor network, we usually need to combine the information gathered from multiple sensors to detect an event. To answer this question we present a new type of query, Geo-Range query. This query reports the geographic points where the average value of nearby sensors are greater than certain threshold. To perform this query, we developed two fast, efficient algorithms. The Brute-Force algorithm use exhaustive method to enumerate all possible values, which takes O(n^3) running time. The Sweep-Line algorithm applies a conceptual line sweeping through the plane. The sweep-line moves through the plane and keeps tracking all the sensor points encountered. The algorithm takes O( n^2 \log n ) running time, while it still gives exact solution to the problem. We implement and simulate our algorithms in Visual Basic.Net.
90

Line networks with erasure codes and network coding

Song, Yang 23 August 2012 (has links)
Wireless sensor network plays a significant role in the design of future Smart Grid, mainly for the purpose of environment monitoring, data acquisition and remote control. Sensors deployed on the utility poles on the power transmission line are used to collect environment information and send them to the substations for analysis and management. However, the transmission is suffered from erasures and errors along the transmission channels. In this thesis, we consider a line network model proposed in [1] and [2]. We first analyze several different erasure codes in terms of overhead and encoding/decoding costs, followed by proposing two different coding schemes for our line network. To deal with both erasures and errors, we combine the erasure codes and the traditional error control codes, where an RS code is used as an outer codes in addition to the erasure codes. Furthermore, an adaptive RS coding scheme is proposed to improve the overall coding efficiency over all SNR regions. In the end, we apply network coding with error correction of network errors and erasures and examine our model from the mathematical perspective. / Graduate

Page generated in 0.0364 seconds