• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 755
  • 202
  • 109
  • 95
  • 38
  • 34
  • 22
  • 6
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 1518
  • 1518
  • 1026
  • 554
  • 283
  • 223
  • 200
  • 196
  • 193
  • 182
  • 179
  • 170
  • 158
  • 158
  • 151
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

CEMA: Comfort Control and Energy Management Algorithms for Use in Residential Spaces Through Wireless Sensor Networks

Henry, Rami F.Z. 26 August 2010 (has links)
In recent years, many strides have been achieved in the area of Wireless Sensor Networks (WSNs), which is leading to constant innovations in the types of applications that WSNs can support. Much advancement has also been achieved in the area of smart homes, enabling its occupants to manually and easily control their utility expenses. In this thesis, both areas of research will be colluded for a simple, yet critical application: efficient and economical comfort control in smart residential spaces. The goal is to design a central, modular energy consumption control system for residential spaces, which manages energy consumption in all aspects of a typical residence. This thesis is concerned with two facets of energy consumption in residences. The first facet is concerned with controlling when the heating, ventilating, and air conditioning unit (HVAC) operates for each room separately. This is in contrast to a typical HVAC system where comfort is provided across the floor as a whole. The second facet is concerned with controlling the lighting in each room so as to not exceed a certain input value. The communication network that supports the realization of these coveted goals is based on Zigbee interconnected sensor nodes which pour data unto a smart thermostat which does all the required calculations and activates the modules required for comfort control and energy management, if needed. A Java-based discrete event simulator is then written up to simulate a floor of a typical Canadian single-family dwelling. The simulation assumes error-less communication and proceeds to record certain room variables and the ongoing cost of operation periodically. These results from the simulator are compared to the results of the well known simulator, created by DesignBuilder, which describes typical home conditions. The conclusion from this analysis is that the Comfort Control and Energy Management Algorithms (CEMA) are feasible, and that their implementation incurs significant monetary savings.
222

Smart Grid Applications Using Sensor Web Services

Asad, Omar 29 March 2011 (has links)
Sensor network web services have recently emerged as promising tools to provide remote management, data collection and querying capabilities for sensor networks. They can be utilized in a large number of elds among which Demand-Side Energy Management (DSEM) is an important application area that has become possible with the smart electrical power grid. DSEM applications generally aim to reduce the cost and the amount of power consumption. In the traditional power grid, DSEM has not been implemented widely due to the large number of households and lack of ne-grained automation tools. However by employing intelligent devices and implementing communication infrastructure among these devices, the smart grid will renovate the existing power grid and it will enable a wide variety of DSEM applications. In this thesis, we analyze various DSEM scenarios that become available with sensor network web services. We assume a smart home with a Wireless Sensor Network (WSN) where the sensors are mounted on the appliances and they are able to run web services. The web server retrieves data from the appliances via the web services running on the sensor nodes. These data can be stored in a database after processing, where the database can be accessed by the utility, as well as the inhabitants of the smart home. We showthat our implementation is e cient in terms of running time. Moreover, the message sizes and the implementation code is quite small which makes it suitable for the memory-limited sensor nodes. Furthermore, we show the application scenarios introduced in the thesis provide energy saving for the smart home.
223

Localization and Coverage in Wireless Ad Hoc Networks

Gribben, Jeremy 04 August 2011 (has links)
Localization and coverage are two important and closely related problems in wireless ad hoc networks. Localization aims to determine the physical locations of devices in a network, while coverage determines if a region of interest is sufficiently monitored by devices. Localization systems require a high degree of coverage for correct functioning, while coverage schemes typically require accurate location information. This thesis investigates the relationship between localization and coverage such that new schemes can be devised which integrate approaches found in each of these well studied problems. This work begins with a thorough review of the current literature on the subjects of localization and coverage. The localization scheduling problem is then introduced with the goal to allow as many devices as possible to enter deep sleep states to conserve energy and reduce message overhead, while maintaining sufficient network coverage for high localization accuracy. Initially this sufficient coverage level for localization is simply a minimum connectivity condition. An analytical method is then proposed to estimate the amount of localization error within a certain probability based on the theoretical lower bounds of location estimation. Error estimates can then be integrated into location dependent schemes to improve on their robustness to localization error. Location error estimation is then used by an improved scheduling scheme to determine the minimum number of reference devices required for accurate localization. Finally, an optimal coverage preserving sleep scheduling scheme is proposed which is robust to localization error, a condition which is ignored by most existing solutions. Simulation results show that with localization scheduling network lifetimes can be increased by several times and message overhead is reduced while maintaining negligible differences in localization error. Furthermore, results show that the proposed coverage preserving sleep scheduling scheme results in fewer active devices and coverage holes under the presence of localization error.
224

Energy-Efficient Battery-Aware MAC protocol for Wireless Sensor Networks

Nasrallah, Yamen 19 March 2012 (has links)
Wireless sensor networks suffer from limited power resources. Therefore, managing the energy constraints and exploring new ways to minimize the power consumption during the operation of the nodes are critical issues. Conventional MAC protocols deal with this problem without considering the internal properties of the sensor nodes’ batteries. However, recent studies about battery modeling and behaviour showed that the pulsed discharge mechanism and the charge recovery effect may have a significant impact on wireless communication in terms of power saving. In this thesis we propose two battery-aware MAC protocols that take benefit of these factors to save more energy and to prolong the lifetime of the nodes/network without affecting the throughput. In both protocols we measure the remaining battery capacity of the node and use that measurement in the back-off scheme. The first protocol gives the nodes with higher remaining battery capacity more priority to access the medium, while the other one provides more medium access priority to the nodes with lower remaining battery capacity. The objective is to investigate, through simulations, which protocol reduces the power consumption of the nodes, improve the lifetime of the network, and compare the results with the CSMA-CA protocol.
225

Cooperative localization based on received signal strength in wireless sensor network

Zheng, Jinfu 01 January 2010 (has links)
Localization accuracy based on RSS (Received Signal Strength) is notoriously inaccurate in the application of wireless sensor networks. RSS is subject to shadowing effects, which is signal attenuation caused by stationary objects in the radio propagation. RSS are actually the result of decay over distances, and random attenuation over different directions. RSS measurement is also affected by antenna orientation. Starting from extracting the statistical orders in the function relationship between RSS and distance, this thesis first shows how non-metric MDS (Multi-Dimensional Scaling) is the suitable method for cooperative localization. Then, several issues are presented and discussed in the application of non-metric MDS, including determining full connections to avoid flip ambiguities, leveraging the proper initial estimation to avert from local minimum solutions, and imposing structural information to bend the localization result to a priori knowledge. To evaluate the solution, data were acquired from different scenarios including accurate radio propagation model, indoor empirical test, and outside empirical test. Experiment results shows that non-metric MDS can only combat the small scale randomness in the shadowing effects. To combat the large scale ones, macro-diversity approaches are further presented including rotating the receiver’s antenna or collecting RSS from more than one mote in the same position. By averaging the measurements from these diversified receivers, simulation results and empirical tests show that shadowing effects can be greatly reduced. Also included in this thesis is how effective packet structures should be designed in the mote programming based on TinyOS to collect different sequences of RSS measurements and fuse them together. / UOIT
226

Reliable data delivery in wireless sensor networks

Yang, Bofu 21 June 2010
Wireless sensor networks (WSN) have generated tremendous interest among researchers these years because of their potential usage in a wide variety of applications.<p> Sensor nodes are inexpensive portable devices with limited processing power and energy resources. Sensor nodes can be used to collect information from the environment, locally process this data and transmit the sensed data back to the user.<p> This thesis proposes a new reliable data delivery protocol for general point-to-point data delivery (unicasting) in wireless sensor networks. The new protocol is designed that aims at providing 100% reliability when possible as well as minimizing overhead and network delay. The design of the new protocol includes three components. The new protocol adopts a NACK-based hop-by-hop loss detection and recovery scheme using end-to-end sequence numbers. In order to solve the single/last packet problem in the NACK-based approach, a hybrid ACK/NACK scheme is proposed where an ACK-based approach is used as a supplement to the NACK-based approach to solve the single/last packet problem. The proposed protocol also has a new queue management scheme that gives priority to new data. By introducing the idea of a Ready_Bit and newer packet first rule in the transmission queue, nodes can detect and recover lost packets in parallel with the normal data transmission process. The performance of the new protocol is tested in a Crossbow MicaZ testbed. Experimental results show that the new protocol performs well under various system and protocol parameter settings.
227

Opportunistic Routing for Enhanced Source-location Privacy in Wireless Sensor Networks

Spachos, Petros 11 January 2011 (has links)
Wireless sensor networks (WSN) are an attractive solution for a plethora of communication applications, such as unattended event monitoring and tracking. One of the looming challenges that threaten the successful deployment of these sensor networks is source-location privacy, especially when they are used to monitor sensitive objects. In order to enhance source location privacy in sensor networks, we propose the use of an opportunistic routing scheme and we examine four different approaches. In opportunistic routing, each sensor transmits the packet over a dynamic path to the destination. Every packet from the source can therefore follow a different path toward the destination, making it difficult for an adversary to backtrack hop-by-hop to the origin of the sensor communication. Through theoretical analysis, we attempt to justify the use of opportunistic routing for the source-location problem. Moreover, simulations have been conducted in order to evaluate the performance of all the proposed schemes, in terms of source-location privacy.
228

Opportunistic Routing for Enhanced Source-location Privacy in Wireless Sensor Networks

Spachos, Petros 11 January 2011 (has links)
Wireless sensor networks (WSN) are an attractive solution for a plethora of communication applications, such as unattended event monitoring and tracking. One of the looming challenges that threaten the successful deployment of these sensor networks is source-location privacy, especially when they are used to monitor sensitive objects. In order to enhance source location privacy in sensor networks, we propose the use of an opportunistic routing scheme and we examine four different approaches. In opportunistic routing, each sensor transmits the packet over a dynamic path to the destination. Every packet from the source can therefore follow a different path toward the destination, making it difficult for an adversary to backtrack hop-by-hop to the origin of the sensor communication. Through theoretical analysis, we attempt to justify the use of opportunistic routing for the source-location problem. Moreover, simulations have been conducted in order to evaluate the performance of all the proposed schemes, in terms of source-location privacy.
229

Attacking and Securing Beacon-Enabled 802.15.4 Networks

JUNG, SANG SHIN 04 May 2011 (has links)
The IEEE 802.15.4 has attracted time-critical applications in wireless sensor networks (WSNs) because of its beacon-enabled mode and guaranteed timeslots (GTSs). However, the GTS scheme’s security still leave the 802.15.4 MAC vulnerable to attacks. Further, the existing techniques in the literature for securing 802.15.4 either focus on non beacon-enabled 802.15.4 or cannot defend against insider attacks for beacon-enabled 802.15.4. In this thesis, we illustrate this by demonstrating attacks on the availability and integrity of the beacon-enabled 802.15.4. To proof the attacks, we implement the attacks using Tmote Sky motes for a malicious node along with regular nodes. We show that the malicious node can freely exploit the beacon frames to compromise the integrity and availability of the network. For the defense, we present beacon-enabled MiniSec (BCN-MiniSec) and analyze its cost.
230

Distributed Algorithms for Maximizing the Lifetime of Wireless Sensor Networks

Dhawan, Akshaye 05 August 2009 (has links)
Wireless sensor networks (WSNs) are emerging as a key enabling technology for applications domains such as military, homeland security, and environment. However, a major constraint of these sensors is their limited battery. In this dissertation we examine the problem of maximizing the duration of time for which the network meets its coverage objective. Since these networks are very dense, only a subset of sensors need to be in "sense" or "on" mode at any given time to meet the coverage objective, while others can go into a power conserving "sleep" mode. This active set of sensors is known as a cover. The lifetime of the network can be extended by shuffling the cover set over time. In this dissertation, we introduce the concept of a local lifetime dependency graph consisting of the cover sets as nodes with any two nodes connected if the corresponding covers intersect, to capture the interdependencies among the covers. We present heuristics based on some simple properties of this graph and show how they improve over existing algorithms. We also present heuristics based on other properties of this graph, new models for dealing with the solution space and a generalization of our approach to other graph problems.

Page generated in 0.053 seconds