• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 168
  • 79
  • 30
  • 16
  • 12
  • 7
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 367
  • 367
  • 367
  • 79
  • 77
  • 70
  • 65
  • 53
  • 52
  • 51
  • 46
  • 40
  • 40
  • 39
  • 35
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Θεωρία και εφαρμογές των κυψελικών αυτομάτων

Κατσικούλη, Παναγιώτα 24 January 2012 (has links)
Τα κυψελικά αυτόματα (ΚΑ) αποτελούν την εξιδανίκευση ενός φυσικού συστήματος όπου ο χώρος και ο χρόνος είναι διακριτοί και οι φυσικές ποσότητες λαμβάνουν μόνο ένα πεπερασμένο σύνολο τιμών. Τα κυψελικά αυτόματα αποτελούνται από ένα πλέγμα με διακριτούς πανομοιότυπους κόμβους. Κάθε σημείο-κόμβος του πλέγματος χαρακτηρίζεται από μία τιμή η οποία δεν είναι αυθαίρετη, αλλά λαμβάνεται από ένα συγκεκριμένο σύνολο ‘επιτρεπτών’ ακέραιων τιμών. Οι τιμές αυτών των κόμβων του πλέγματος εξελίσσονται από τη μία χρονική στιγμή στην άλλη σύμφωνα με προκαθορισμένους τοπικούς κανόνες. Η συνολική δομή αποτελεί ένα μοντέλο παράλληλου υπολογισμού. ΄Οταν η απλή δομή του μοντέλου επαναλαμβάνεται, προκύπτουν πολύπλοκα πρότυπα που μπορούν να προσομοιώσουν ποικίλα πολύπλοκα φυσικά φαινόμενα και συστήματα. Χρησιμοποιούμε τα κυψελικά αυτόματα για να προσομοιώσουμε έναν αλγόριθμο ελέγχου τοπολογίας για ασύρματα δίκτυα αισθητήρων. Τα ασύρματα δίκτυα αισθητήρων αποτελούνται από ένα μεγάλο αριθμό διασκορπισμένων αισθητήρων-κόμβων που λειτουργούν με μπαταρίες. Σκοπός του προβλήματος ελέγχου τοπολογίας σε ασύρματα δίκτυα αισθητήρων είναι η επιλογή κατάλληλου υποσυνόλου κόμβων ικανών να παρακολουθούν μια περιοχή με στόχο τη μικρότερη δυνατή κατανάλωση ενέργειας και ως εκ τούτου την επέκταση της διάρκειας ζωής του δικτύου. / Cellular automata (CA) are an idealization of a physical system where space and time are discrete and the physical quantities take only a finite set of values. Cellular automata consist of a regular grid of identical cells-nodes. Each node is characterized by a non arbitrary value selected by a specific set of appropriate integers. The values of the nodes change over time according to predefined localized rules. The overall structure can be viewed as a parallel processing device. This simple structure when iterated several times produces complex patterns displaying the potential to simulate different sophisticated natural phenomena. We use cellular automata for simulating a topology control algorithm in Wireless Sensor Networks (WSNs). WSNs are composed of a large number of distributed sensor nodes operating on batteries; the objective of the topology control problem in WSNs is to select an appropriate subset of nodes able to monitor a region at a minimum energy consumption cost thus extending the network lifetime.
92

Sistema inteligente com entrada e saída remota sem fio. / Smart entry system with remote and wireless output.

David Ricardo de Mendonça Soares 15 July 2010 (has links)
Este trabalho avalia o desempenho de um controlador fuzzy (tipo Takagi-Sugeno-Kang) quando, utilizando tecnologia sem fio para conectar as entradas e a saída do controlador aos sensores/atuadores, sofre perda das informações destes canais, resultado de perdas de pacotes. Tipicamente são utilizados controladores PID nas malhas de controle. Assim, o estudo realizado compara os resultados obtidos com os controladores fuzzy com os resultados dos controladores PID. Além disso, o trabalho visa estudar o comportamento deste controlador implementado em uma arquitetura microprocessada utilizando números inteiros nos cálculos, interpolação com segmentos de reta para as funções de pertinência da entrada e singletons nas funções de pertinência da saída. Para esse estudo foi utilizado, num ambiente Matlab/Simulink, um controlador fuzzy e o aplicativo True Time para simular o ambiente sem fio. Desenvolvido pelo Departamento de Controle Automático da Universidade de Lund, o True Time é baseado no Matlab/Simulink e fornece todas as ferramentas necessárias para a criação de um ambiente de rede (com e sem fio) virtual. Dado o paradigma de que quanto maior for a utilização do canal, maior a degradação do mesmo, é avaliado o comportamento do sistema de controle e uma proposta para diminuir o impacto da perda de pacotes no controle do sistema, bem como o impacto da variação das características internas da planta e da arquitetura utilizada na rede. Inicialmente são realizados ensaios utilizando-se o controlador fuzzy virtual (Simulink) e, posteriormente, o controlador implementado com dsPIC. Ao final, é apresentado um resumo desses ensaios e a comprovação dos bons resultados obtidos com um controlador fuzzy numa malha de controle utilizando uma rede na entrada e na saída do controlador. / This work evaluates the performance of a fuzzy controller (Takagi-Sugeno-Kang) that uses wireless technology to connect the inputs and the output of the controller to sensors / actuators, and with the loss of information from these channels, the result of packet loss. PID controllers are typically used in control loops. Thus, the study compares the results obtained with the fuzzy controllers with the results of PID controllers. Moreover, the work aims to study the behavior of this controller implemented in a microprocessor architecture using integer calculations, interpolation with straight line segments for the membership functions of input and singletons in the output membership functions. For this study it was used in a Matlab/Simulink, a fuzzy controller and the application True Time to simulate wireless environment (Developed by the Department of Automatic Control at Lund University). It is based on MATLAB/Simulink and provides all the tools necessary to create a virtual network environment (wired and wireless). When we increase the occupation of the channel we increase the degradation of it. Under this conditions, is rated the behavior of the control system and is evaluated, and actions were proposal to reduce the impact of packet loss in the control system, as well as the impact of variations in the internal characteristics of plant and architecture used in the network. Initially, tests are conducted using the virtual fuzzy controller (Simulink ) and thereafter, the controller implemented with dsPIC. Finally, a summary of testing and verification of results are presented.
93

Architectures and Protocols for Secure and Energy-Efficient Integration of Wireless Sensor Networks with the Internet of Things / Architectures et protocoles pour une intégration sécurisée et économe en énergie des réseaux de capteurs dans l’Internet des objets

Vucinic, Malisa 17 November 2015 (has links)
Nos recherches se situent à l'intersection des sphères académiques et industrielles et des organismes de standardisation pour permettre la mise en place d'un Internet des objets (IoT) sécurisé et efficace.Nous étudions des solutions de sécurisation en parcourant les standards de manière ascendante.En premier lieu, nous constatons que l'accélération matérielle des algorithmes de cryptographie est nécessaire pour les équipements formant l'IoT car il permet une reduction de deux ordres de grandeur des durées de calcul.Le surcoût des opérations cryptographiques n'est cependant qu'un des facteurs qui gouverne la performance globale dans le contexte des systèmes en réseau.Nous montrons à travers l'implementation d'applications pratiques que les dispositifs de sécurité de la couche 2 n'augmentent que de quelques pourcents la dépense énergétique totale.Ceci est acceptable, même pour les systèmes les plus contraints, comme ceux utilisant la recuperation d'énergie ambiante.La sécurité de la couche 2 contraint de faire confiance à chacun des noeuds du chemin de communication comprenant potentiellement des éléments malveillants, nous devons donc protéger le flux de données par un mécanisme de bout en bout.Nous étudions le protocole DTLS, standard de l'IETF pour la sécurité de l'IoT.Nous contribuons aux discussions sur l'intérêt de DTLS dans les environnements contraints, à la fois dans les organismes de standardisation et de recherche.Nous évaluons DTLS de manière étendue avec différents réseaux à cycle d'activité ou duty cycle au travers d'expérimentations, d'émulations et d'analyses.De manière surprenante, nos résultats démontrent la très faible performance de DTLS dans ces réseaux où l'efficacité énergétique est primordiale.Comme un client et un serveur DTLS échangent beaucoup de paquets de signalisation, la connection DTLS prends entre quelques secondes et quelques dizaines de secondes, ceci pour plusieurs des protocoles étudiés.DTLS a été conçu pour les communications de bout en bout dans l'Internet classique, contrairement au nouveau protocol CoAP qui lui est destiné à des machines contraintes en facilitant le traffic asynchrone, les communications de groupe et le besoin de stockage intermédiaire.Donc, en plus du problème de performance, l'architecture de sécurité basée sur DTLS n'est pas capable de répondre aux contraintes de ces dispositifs et CoAP devient inutilisable.Nous proposons une architecture qui s'appuie à la fois sur une approche centrée sur le contenu et sur la notion classique de connection.L'échange des clefs est fait à travers des canaux sécurisés établis par DTLS, mais la notion d'états entre les entités de communication est supprimée grâce au concept d'objets sécurisés.Le mécanisme proposé resiste aux attaques par rejeu en regroupant les capacités de controle d'accès avec les en-tetes de communication CoAP.OSCAR, notre architecture à objets sécurisés, supporte intrinsèquement les communications de groupe et le stockage intermédiaire, sans perturber le fonctionnement à cycle d'activité de la radio des équipements contraintes.Les idées d'OSCAR sont discutés par les groupes de standardisation de l'Internet en vue d'être intégrées dans les standards à venir. / Our research explores the intersection of academic, industrial and standardization spheres to enable secure and energy-efficient Internet of Things. We study standards-based security solutions bottom-up and first observe that hardware accelerated cryptography is a necessity for Internet of Things devices, as it leads to reductions in computational time, as much as two orders of magnitude. Overhead of the cryptographic primitives is, however, only one of the factors that influences the overall performance in the networking context. To understand the energy - security tradeoffs, we evaluate the effect of link-layer security features on the performance of Wireless Sensors Networks. We show that for practical applications and implementations, link-layer security features introduce a negligible degradation on the order of a couple of percent, that is often acceptable even for the most energy-constrained systems, such as those based on harvesting.Because link-layer security puts trust on each node on the communication path consisted of multiple, potentially compromised devices, we protect the information flows by end-to-end security mechanisms. We therefore consider Datagram Transport Layer Security (DTLS) protocol, the IETF standard for end-to-end security in the Internet of Things and contribute to the debate in both the standardization and research communities on the applicability of DTLS to constrained environments. We provide a thorough performance evaluation of DTLS in different duty-cycled networks through real-world experimentation, emulation and analysis. Our results demonstrate surprisingly poor performance of DTLS in networks where energy efficiency is paramount. Because a DTLS client and a server exchange many signaling packets, the DTLS handshake takes between a handful of seconds and several tens of seconds, with similar results for different duty cycling protocols.But apart from its performance issues, DTLS was designed for point-to-point communication dominant in the traditional Internet. The novel Constrained Ap- plication Protocol (CoAP) was tailored for constrained devices by facilitating asynchronous application traffic, group communication and absolute need for caching. The security architecture based on DTLS is, however, not able to keep up and advanced features of CoAP simply become futile when used in conjunction with DTLS. We propose an architecture that leverages the security concepts both from content-centric and traditional connection-oriented approaches. We rely on secure channels established by means of DTLS for key exchange, but we get rid of the notion of “state” among communicating entities by leveraging the concept of object security. We provide a mechanism to protect from replay attacks by coupling the capability-based access control with network communication and CoAP header. OSCAR, our object-based security architecture, intrinsically supports caching and multicast, and does not affect the radio duty-cycling operation of constrained devices. Ideas from OSCAR have already found their way towards the Internet standards and are heavily discussed as potential solutions for standardization.
94

The energy and thermal performance of UK modular residential buildings

Quigley, Ella S. January 2017 (has links)
This research concerns the in-use performance of light-gauge steel modular construction used for residential purposes. The aim was to investigate ways to reduce the in-use energy consumption of new buildings, while ensuring thermal comfort. Data were collected from two case study buildings in the UK, one in Loughborough and the other in London, using a variety of methods including building measurement, building monitoring, inspections, and a detailed review of the construction documentation. The case study buildings were monitored using EnOcean enabled wireless sensor networks and standalone temperature sensors. Monitoring data included electricity consumption in individual rooms, often by end use, space heating use, internal temperature and relative humidity, and external temperature. Building measurements included blower door tests to measure fabric air leakage rates, infrared thermal imaging to identify fabric defects and weaknesses, and ventilation system flowrate measurements. Inspections and the review of documentation allowed problems with design, manufacture and construction to be identified. A particular concern for thermally lightweight construction is the risk of overheating, therefore overheating analyses were undertaken. The research identified weaknesses in the design, construction and operation of the case study buildings resulting in increased energy use and poor thermal comfort, particularly overheating. The modular construction studied requires specific design changes to improve the fabric and building services, in order to reduce energy use. There are also specific recommendations for quality control on site to ensure critical stages are correctly completed, such as installing rigid insulation. There are also more general recommendations for how a company operates because this can influence performance; there ought to be greater attention to holistic design and greater collaboration with suppliers and contractors to determine robust solutions. Overheating was a problem in the London case study, and more research is required to understand the scale of the problem. Avoidance of overheating must be a focus in the design of new buildings. The findings suggest that once the problems with the design and quality control on site are rectified, offsite modular construction can be used to consistently and reliably provide low energy homes.
95

Design and Implementation of Realistic and Terrain-aware Mobile Sensor Networks

Janansefat, Shadi 01 May 2013 (has links)
Wireless sensor networks (WSNs) have been used in many applications by deploying tiny and stationary sensors. In recent years, a lot of studies proposed to introduce mobility capability to sensor nodes in order to exploit the advantages of mobility, particularly to restore connectivity in disjoint WSNs. While the studies demonstrated various capabilities of the proposed connectivity algorithms via simulation, real node and testbed implementations were mostly lacking due to unavailability of proper mobile nodes. Since this may hinder the direct applicability of the algorithms in realistic settings, testbeds which can be constructed with low-cost and commercial-off-the-shelf (COTS) hardware are required for realistic evaluations of the connectivity restoration algorithms. In this thesis, we design a low-cost mobile sensor node called iRobotSense, by integrating iRobot Create platform with IRIS sensor. Then, a mobile sensor network (MSN) testbed of iRobotSense nodes is used to implement and evaluate a widely used connectivity restoration algorithms, namely PADRA. Furthermore, all of the previous works exploiting mobility of the nodes to achieve recovery in a partitioned network have assumed reachability of the nodes to the selected destinations via a direct path movement. However, in real-world applications, such assumption makes the schemes impractical in case of encountering obstacles or intolerable terrains. Besides, even if direct path movement is successful, optimal energy efficiency cannot be attained by neglecting the elevation or friction of the terrain. Thus, in the recovery efforts, terrain type, elevation as well as the obstacles should be taken into account. In this thesis, we re-design an existing connectivity restoration approach in disjoint MSNs to fit these requirements and evaluate the performance issues when realistic terrains are assumed. Rather than following a direct path, movement trajectory is determined based on a path planning algorithm which considers the risk and elevation of terrain sections to be visited while avoiding obstacles and highly elevated terrain sections.
96

Adaptive low power receiver combining ADC resolution and digital baseband for wireless sensors networks based in IEEE 802.15.4 standard / Receptor adaptativo de baixa potencia combinando resolução de conversor analógico para digital e banda base digital para redes de sensores sem fio baseado no protocolo IEEE 802.15.4

Santos, Maico Cassel dos January 2015 (has links)
Com o aumento das aplicações e dispositivos para Internet das Coisas, muitos esforços para reduzir potência dissipada nos transceptores foram investidos. A maioria deles, entretanto, focam individualmente no rádio, nos conversores analógicos para digital e viceversa, e na arquitetura de banda base digital. Como consequência, há pouca margem para melhorias na potência dissipada nestes blocos isolados que compense o enorme esforço. Portanto, este trabalho propõe uma arquitetura adaptativa a nível de sistema focando em reduzir o consumo no conversor analógico para digital e no receptor digital. Ele utiliza um algoritmo robusto para o receptor banda base digital, um conversor analógico para digital topologia Sigma-Delta e um bloco de controle realimentado conforme a relação sinal ruído medida do pacote recebido. O sistema foi projetado para o protocolo IEEE 802.15.4. Para validação do sistema e estimar a potência consumida foi feito um modelo de sistema utilizando a ferramenta Matlab, uma descrição do hardware em linguagem Verilog e uma síntese lógica utilizando o processo da X-FAB XC018. As simulações mostram uma redução na potência consumida pelo sistema de até 13% e ainda atingindo os requisitos do protocolo. Os resultados deste trabalho foram publicados na conferência internacional em tecnologia de instrumentação e medidas de 2014 realizada na cidade de Montevidéu no Uruguai. / With the increase of Internet of Things applications and devices, many efforts to reduce power consumption in transceiver has been invested. Most of them targeted in RF frontend, converters, or in the digital baseband architecture individually. As result, there are few margins nowadays for power improvement in these blocks singly that compensates the huge hard work required. The next optimization step leads to a system level analysis seeking design space and new possibilities expansion. It is in this field that adaptive systems approaches are conquering ground recently. The solutions combines Radio Frequency (RF) and process variation techniques, Low Pass Filters (LPF) and Analog to Digital Converters (ADCs) adjustment for better performance, digital baseband bit width adaptive according to income packet SNR, configurable ADC resolution and topology, and others. In this scenario the current work proposes an adaptive system level architecture targeting ADC and digital receiver power reduction. It uses a robust algorithm for digital baseband receiver, a Sigma-Delta ADC, and suggests a feedback control block based on packet SNR measure. The system was designed for the IEEE 802.15.4 standard and required system modeling using Matlab tool, hardware description in Verilog language, and logic synthesis using X-FAB XC018 process for validation and power consumption estimation. Simulations show up to 15% of system power reduction and still meeting the standard requirements. The work results were published in the International Instrumentation and Measurement Technology Conference of 2014 occurred in Montevideo - Uruguay.
97

Sistema inteligente com entrada e saída remota sem fio. / Smart entry system with remote and wireless output.

David Ricardo de Mendonça Soares 15 July 2010 (has links)
Este trabalho avalia o desempenho de um controlador fuzzy (tipo Takagi-Sugeno-Kang) quando, utilizando tecnologia sem fio para conectar as entradas e a saída do controlador aos sensores/atuadores, sofre perda das informações destes canais, resultado de perdas de pacotes. Tipicamente são utilizados controladores PID nas malhas de controle. Assim, o estudo realizado compara os resultados obtidos com os controladores fuzzy com os resultados dos controladores PID. Além disso, o trabalho visa estudar o comportamento deste controlador implementado em uma arquitetura microprocessada utilizando números inteiros nos cálculos, interpolação com segmentos de reta para as funções de pertinência da entrada e singletons nas funções de pertinência da saída. Para esse estudo foi utilizado, num ambiente Matlab/Simulink, um controlador fuzzy e o aplicativo True Time para simular o ambiente sem fio. Desenvolvido pelo Departamento de Controle Automático da Universidade de Lund, o True Time é baseado no Matlab/Simulink e fornece todas as ferramentas necessárias para a criação de um ambiente de rede (com e sem fio) virtual. Dado o paradigma de que quanto maior for a utilização do canal, maior a degradação do mesmo, é avaliado o comportamento do sistema de controle e uma proposta para diminuir o impacto da perda de pacotes no controle do sistema, bem como o impacto da variação das características internas da planta e da arquitetura utilizada na rede. Inicialmente são realizados ensaios utilizando-se o controlador fuzzy virtual (Simulink) e, posteriormente, o controlador implementado com dsPIC. Ao final, é apresentado um resumo desses ensaios e a comprovação dos bons resultados obtidos com um controlador fuzzy numa malha de controle utilizando uma rede na entrada e na saída do controlador. / This work evaluates the performance of a fuzzy controller (Takagi-Sugeno-Kang) that uses wireless technology to connect the inputs and the output of the controller to sensors / actuators, and with the loss of information from these channels, the result of packet loss. PID controllers are typically used in control loops. Thus, the study compares the results obtained with the fuzzy controllers with the results of PID controllers. Moreover, the work aims to study the behavior of this controller implemented in a microprocessor architecture using integer calculations, interpolation with straight line segments for the membership functions of input and singletons in the output membership functions. For this study it was used in a Matlab/Simulink, a fuzzy controller and the application True Time to simulate wireless environment (Developed by the Department of Automatic Control at Lund University). It is based on MATLAB/Simulink and provides all the tools necessary to create a virtual network environment (wired and wireless). When we increase the occupation of the channel we increase the degradation of it. Under this conditions, is rated the behavior of the control system and is evaluated, and actions were proposal to reduce the impact of packet loss in the control system, as well as the impact of variations in the internal characteristics of plant and architecture used in the network. Initially, tests are conducted using the virtual fuzzy controller (Simulink ) and thereafter, the controller implemented with dsPIC. Finally, a summary of testing and verification of results are presented.
98

Robust Distributed Parameter Estimation in Wireless Sensor Networks

January 2017 (has links)
abstract: Fully distributed wireless sensor networks (WSNs) without fusion center have advantages such as scalability in network size and energy efficiency in communications. Each sensor shares its data only with neighbors and then achieves global consensus quantities by in-network processing. This dissertation considers robust distributed parameter estimation methods, seeking global consensus on parameters of adaptive learning algorithms and statistical quantities. Diffusion adaptation strategy with nonlinear transmission is proposed. The nonlinearity was motivated by the necessity for bounded transmit power, as sensors need to iteratively communicate each other energy-efficiently. Despite the nonlinearity, it is shown that the algorithm performs close to the linear case with the added advantage of power savings. This dissertation also discusses convergence properties of the algorithm in the mean and the mean-square sense. Often, average is used to measure central tendency of sensed data over a network. When there are outliers in the data, however, average can be highly biased. Alternative choices of robust metrics against outliers are median, mode, and trimmed mean. Quantiles generalize the median, and they also can be used for trimmed mean. Consensus-based distributed quantile estimation algorithm is proposed and applied for finding trimmed-mean, median, maximum or minimum values, and identification of outliers through simulation. It is shown that the estimated quantities are asymptotically unbiased and converges toward the sample quantile in the mean-square sense. Step-size sequences with proper decay rates are also discussed for convergence analysis. Another measure of central tendency is a mode which represents the most probable value and also be robust to outliers and other contaminations in data. The proposed distributed mode estimation algorithm achieves a global mode by recursively shifting conditional mean of the measurement data until it converges to stationary points of estimated density function. It is also possible to estimate the mode by utilizing grid vector as well as kernel density estimator. The densities are estimated at each grid point, while the points are updated until they converge to a global mode. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2017
99

Energy-efficient routing algorithms for wireless sensor networks

Touray, Barra January 2013 (has links)
A wireless sensor network (WSN) is made of tiny sensor nodes usually deployed in high density within a targeted area to monitor a phenomenon of interest such as temperature, vibration or humidity. The WSNs can be employed in various applications (e.g., Structural monitoring, agriculture, environment monitoring, machine health monitoring, military, and health). For each application area there are different technical issues and remedies. Various challenges need to be considered while setting up a WSN, including limited computing, memory and energy resources, wireless channel errors and network scalability. One way of addressing these problems is by implementing a routing protocol that efficiently uses these limited resources and hence reduces errors, improves scalability and increases the network lifetime. The topology of any network is important and wireless sensor networks (WSNs) are no exception. In order to effectively model an energy-efficient routing algorithm, the topology of the WSN must be factored in. However, little work has been done on routing for WSNs with regular patterned topologies, except for the shortest path first (SPF) routing algorithms. The issue with the SPF algorithm is that it requires global location information of the nodes from the sensor network, which proves to be a drain on the network resources. In this thesis a novel algorithm namely, BRALB (Biased Random Algorithm for Load Balancing) is proposed to overcome the issues faced in routing data within WSNs with regular topologies such as square-base topology and triangle-based topology. It is based on random walk and probability. The proposed algorithm uses probability theory to build a repository of information containing the estimate of energy resources in each node, in order to route packets based on the energy resources in each node and thus does not require any global information from the network. It is shown in this thesis by statistical analysis and simulations that BRALB uses the same energy as the shortest path first routing as long as the data packets are comparable in size to the inquiry packets used between neighbours. It is also shown to balance the load (i.e. the packets to be sent) efficiently among the nodes in the network. In most of the WSN applications the messages sent to the base station are very small in size. Therefore BRALB is viable and can be used in sensor networks employed in such applications. However, one of the constraints of BRALB is that it is not very scalable; this is a genuine concern as most WSNs deployment is large scale. In order to remedy this problem, C-BRALB (Clustered Biased Random Algorithm for Load Balancing) has been proposed as an extension of BRALB with clustering mechanism. The same clustering technique used in Improved Directed Diffusion (IDD) has been adopted for C-BRALB. The routing mechanism in C-BRALB is based on energy biased random walk. This algorithm also does not require any global information apart from the initial flooding initiated by the sink to create the clusters. It uses probability theory to acquire all the information it needs to route packets based on energy resources in each cluster head node. It is shown in this thesis by using both simulations and statistical analysis that C-BRALB is an efficient routing algorithm in applications where the message to be sent is comparable to the inquiry message among the neighbours. It is also shown to balance the load (i.e. the packets to be sent) among the neighbouring cluster head nodes.
100

Analisador de redes wirelesshart

Lorençato, Alexandre de Andrade January 2013 (has links)
A segurança da informação, a diversidade de rotas entre os dispositivos da rede, o acesso ao meio de modo determinístico e isento de colisões e a mudança de canal frequente tornam a comunicação no protocolo WirelessHART robusta e confiável para utilização em meio industrial. Entretanto, para adoção crescente dessa tecnologia, é necessário que os fabricantes de sensores e atuadores industriais desenvolvam dispositivos WirelessHART. Disto surge a necessidade de criação de ferramentas capazes de auxiliar o desenvolvimento e depuração destes novos dispositivos de rede. O Analisador de rede WirelessHART é, sem dúvida, uma delas. Diversas abordagens são propostas para a análise de redes WirelessHART. Entretanto, em todas elas a utilização de um microcomputador como elemento do sistema inviabiliza sua utilização em campo. A presença de cabos, armazenamento local dos dados e exigência de baterias são alguns dos aspectos relevantes que devem ser levados em consideração quando o sistema precisa ser utilizado em campo. O presente trabalho propõe alternativas aos sistemas de análise de redes atuais apresentando duas propostas conceitualmente diferentes mas que cumprem os requisitos básicos para sua utilização em campo. Uma destas abordagens, baseada na proposta de integração entre um dispositivo de campo e o método inovador de captura de mensagens utilizando apenas um transceptor, é implementado como prova do conceito. / WirelessHART is a robust and reliable protocol for industrial environment usage because of its secure mechanism, the ability of programming several communication routes between network devices, and deterministic, free of collisions channel hopping medium access controller. However, in order to increase the adoption of this technology, it is necessary to increase the amount of WirelessHART manufacturers to develop industrial sensors and actuators devices. This leads to the necessity of create tools that will assist the development and debugging of new network compliant devices. The WirelessHART network analyzer is undoubtedly one of these tools. Various approaches are being proposed for the analysis of WirelessHART networks. However, all of them make use of a microcomputer as an element of the whole system and this difficults their use in real field applications. The presence of wires, lack of local data storage and other aspects such as batteries limitations must be considered when the users intend to use analysis systems in field. This work proposes alternatives to current analysis networks systems by presenting two conceptually different proposals that meet the basic requirements for the use in the field. One of them is based on the proposed integration between a field device and an innovative method of capturing messages using only one transceiver, which is implemented as proof of concept.

Page generated in 0.0611 seconds