• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 755
  • 202
  • 109
  • 95
  • 38
  • 34
  • 22
  • 6
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • Tagged with
  • 1518
  • 1518
  • 1026
  • 554
  • 283
  • 223
  • 200
  • 196
  • 193
  • 182
  • 179
  • 170
  • 158
  • 158
  • 151
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Universal Wireless Event Monitoring System

Yambem, Lamyanba 2009 May 1900 (has links)
In an attempt to provide a more secure and amiable living environment in our homes, there has been constant effort to develop more efficient and suitable intelligent sensor technology for household application. Wireless sensors provide an efficient means of sensing without the need for messy wiring, and are ideally suited for the household environment. Although many sensor products have been developed (e.g. temperature, humidity and smoke), automated detection and reporting of an incidence occurring in places hard to observe or reach, such as wetting of diapers or water seepage under carpets, are still not readily available at low cost. Most of the existing technologies consist of complex design architecture and follow specific communication protocols which can be overkill for many simple household applications. In this thesis, we present a new wireless sensor system which is based on the detection of just the ON or OFF state of a condition. This approach overcomes the need for complex architecture and design, but is still able to achieve the functionality that is required for many household applications such as water leakage, food rotting, diaper wetting etc. and thus can be made available very cheaply. The sensor system consisting of an interrogator and a sensor circuit is implemented using inductive coupling. A passive L-C circuit is used for the sensor design and the system is tested using diaper wetting as an example of a simple household application. The testing results shows that the sensor can detect an ON and OFF condition for sensor and tag separation of 10 cm which is enough for applications like water leakage behind walls and under carpets, diaper wetting, food rotting etc.
232

CEMA: Comfort Control and Energy Management Algorithms for Use in Residential Spaces Through Wireless Sensor Networks

Henry, Rami F.Z. 26 August 2010 (has links)
In recent years, many strides have been achieved in the area of Wireless Sensor Networks (WSNs), which is leading to constant innovations in the types of applications that WSNs can support. Much advancement has also been achieved in the area of smart homes, enabling its occupants to manually and easily control their utility expenses. In this thesis, both areas of research will be colluded for a simple, yet critical application: efficient and economical comfort control in smart residential spaces. The goal is to design a central, modular energy consumption control system for residential spaces, which manages energy consumption in all aspects of a typical residence. This thesis is concerned with two facets of energy consumption in residences. The first facet is concerned with controlling when the heating, ventilating, and air conditioning unit (HVAC) operates for each room separately. This is in contrast to a typical HVAC system where comfort is provided across the floor as a whole. The second facet is concerned with controlling the lighting in each room so as to not exceed a certain input value. The communication network that supports the realization of these coveted goals is based on Zigbee interconnected sensor nodes which pour data unto a smart thermostat which does all the required calculations and activates the modules required for comfort control and energy management, if needed. A Java-based discrete event simulator is then written up to simulate a floor of a typical Canadian single-family dwelling. The simulation assumes error-less communication and proceeds to record certain room variables and the ongoing cost of operation periodically. These results from the simulator are compared to the results of the well known simulator, created by DesignBuilder, which describes typical home conditions. The conclusion from this analysis is that the Comfort Control and Energy Management Algorithms (CEMA) are feasible, and that their implementation incurs significant monetary savings.
233

Smart Grid Applications Using Sensor Web Services

Asad, Omar 29 March 2011 (has links)
Sensor network web services have recently emerged as promising tools to provide remote management, data collection and querying capabilities for sensor networks. They can be utilized in a large number of elds among which Demand-Side Energy Management (DSEM) is an important application area that has become possible with the smart electrical power grid. DSEM applications generally aim to reduce the cost and the amount of power consumption. In the traditional power grid, DSEM has not been implemented widely due to the large number of households and lack of ne-grained automation tools. However by employing intelligent devices and implementing communication infrastructure among these devices, the smart grid will renovate the existing power grid and it will enable a wide variety of DSEM applications. In this thesis, we analyze various DSEM scenarios that become available with sensor network web services. We assume a smart home with a Wireless Sensor Network (WSN) where the sensors are mounted on the appliances and they are able to run web services. The web server retrieves data from the appliances via the web services running on the sensor nodes. These data can be stored in a database after processing, where the database can be accessed by the utility, as well as the inhabitants of the smart home. We showthat our implementation is e cient in terms of running time. Moreover, the message sizes and the implementation code is quite small which makes it suitable for the memory-limited sensor nodes. Furthermore, we show the application scenarios introduced in the thesis provide energy saving for the smart home.
234

Localization and Coverage in Wireless Ad Hoc Networks

Gribben, Jeremy 04 August 2011 (has links)
Localization and coverage are two important and closely related problems in wireless ad hoc networks. Localization aims to determine the physical locations of devices in a network, while coverage determines if a region of interest is sufficiently monitored by devices. Localization systems require a high degree of coverage for correct functioning, while coverage schemes typically require accurate location information. This thesis investigates the relationship between localization and coverage such that new schemes can be devised which integrate approaches found in each of these well studied problems. This work begins with a thorough review of the current literature on the subjects of localization and coverage. The localization scheduling problem is then introduced with the goal to allow as many devices as possible to enter deep sleep states to conserve energy and reduce message overhead, while maintaining sufficient network coverage for high localization accuracy. Initially this sufficient coverage level for localization is simply a minimum connectivity condition. An analytical method is then proposed to estimate the amount of localization error within a certain probability based on the theoretical lower bounds of location estimation. Error estimates can then be integrated into location dependent schemes to improve on their robustness to localization error. Location error estimation is then used by an improved scheduling scheme to determine the minimum number of reference devices required for accurate localization. Finally, an optimal coverage preserving sleep scheduling scheme is proposed which is robust to localization error, a condition which is ignored by most existing solutions. Simulation results show that with localization scheduling network lifetimes can be increased by several times and message overhead is reduced while maintaining negligible differences in localization error. Furthermore, results show that the proposed coverage preserving sleep scheduling scheme results in fewer active devices and coverage holes under the presence of localization error.
235

Energy-Efficient Battery-Aware MAC protocol for Wireless Sensor Networks

Nasrallah, Yamen 19 March 2012 (has links)
Wireless sensor networks suffer from limited power resources. Therefore, managing the energy constraints and exploring new ways to minimize the power consumption during the operation of the nodes are critical issues. Conventional MAC protocols deal with this problem without considering the internal properties of the sensor nodes’ batteries. However, recent studies about battery modeling and behaviour showed that the pulsed discharge mechanism and the charge recovery effect may have a significant impact on wireless communication in terms of power saving. In this thesis we propose two battery-aware MAC protocols that take benefit of these factors to save more energy and to prolong the lifetime of the nodes/network without affecting the throughput. In both protocols we measure the remaining battery capacity of the node and use that measurement in the back-off scheme. The first protocol gives the nodes with higher remaining battery capacity more priority to access the medium, while the other one provides more medium access priority to the nodes with lower remaining battery capacity. The objective is to investigate, through simulations, which protocol reduces the power consumption of the nodes, improve the lifetime of the network, and compare the results with the CSMA-CA protocol.
236

Physical Implementation of Synchronous Duty-Cycling MAC Protocols: Experiences and Evaluation

Xiao, Wei-Cheng 24 July 2013 (has links)
Energy consumption and network latency are important issues in wireless sensor networks. The mechanism duty cycling is generally used in wireless sensor networks for avoiding energy consumption due to idle listening. Duty cycling, however, also introduces additional latency in communication among sensors. Some protocols have been proposed to work in wireless sensor networks with duty cycling, such as S-MAC and DW-MAC. Those protocols also tried to make efficient channel utilization and to mitigate the chance of packet collision and the network latency increase resulting from collision. DW-MAC was also designed to tolerate bursty and high traffic loads without increasing energy consumption, by spreading packet transmission and node wakeup times during a cycle. Some performance comparison between S-MAC and DW-MAC has been done in previous work; however, this comparison was performed in the ns-2 simulator only. In the real world, there are further issues not considered or discussed in the simulation, and some of those issues contribute significant influences to the MAC protocol performance. In this work, I implemented both S-MAC and DW-MAC physically on MICAz sensor motes and compared their performance through experiments. Through my implementation, experiments, and performance evaluation, hardware properties and issues that were not addressed in the previous work are presented, and their impacts on the performance are shown and discussed. I also simulated S-MAC and DW-MAC on ns-2 to give a mutual validation of the experimental results and my interpretation of the results. The experiences of physical implementations presented in this work can contribute new information and insights for helping in future MAC protocol design and implementation in wireless sensor networks.
237

Routing protocols for wireless sensor networks: A survey

Yang, Ying January 2013 (has links)
Wireless sensor networks(WSNs) are different to traditional networks and are highly dependent on applications, thus traditional routing protocols cannot be applied efficiently to the networks. As the variability of both the application and the network architecture, the majority of the attention, therefore, has been given to the routing protocols. This work surveys and evaluates state-of-the-art routing protocols based on many factors including energy efficiency, delay andcomplexity, and presents several classifications for the various approaches pursued. Additionally, more attention is paid to several routing protocols and their advantages and disadvantages and, indeed, this work implements two of selected protocols, LEACH and THVRG, on the OPNET, and compares them in many aspects based on a large amount of experimental data. The survey also provides a valuable framework for comparing new and existing routing protocols. According to the evaluation for the performance of the routing protocols, this thesis provides assistance in relation to further improving the performance in relation to routing protocols. Finally, future research strategies and trends in relation to routing technology in wireless sensor networks are also provided.
238

On Wireless Sensor Networks with Arbitary Correlated Sources

Mahboubi, Seyyed Hassan January 2008 (has links)
An achievable rate region for general wireless sensor networks is proposed. A general multi-source, multi-relay, multi-destination wireless sensor network with arbitrarily correlated sources is considered. Each node can sense some real phenomena and send its readings to one or more sinks (data gathering nodes) via some relays. It also can relay some correlated or independent readings of other nodes, simultaneously. In this problem the source and channel coding separation is not optimal and the information which each reading has about others nodes is destroyed in separation. Thus, a joint source channel coding scheme can be used. The problem consists of relay channels and multiple access channels with arbitrarily correlated sources. The proposed scheme is based on regular block Markov encoding/backward decoding and code division multiple-access (CDMA) and the result is a combination of multi-relay and multiple-access with correlated sources.
239

DI-SEC: Distributed Security Framework for Heterogeneous Wireless Sensor Networks

Valero, Marco 16 April 2012 (has links)
Wireless Sensor Networks (WSNs) are deployed for monitoring in a range of critical domains (e.g., health care, military, critical infrastructure). Accordingly, these WSNs should be resilient to attacks. The current approach to defending against malicious threats is to develop and deploy a specific defense mechanism for a specific attack. However, the problem with this traditional approach to defending sensor networks is that the solution for one attack (i.e., Jamming attack) does not defend against other attacks (e.g., Sybil and Selective Forwarding). This work addresses the challenges with the traditional approach to securing sensor networks and presents a comprehensive framework, Di-Sec, that can defend against all known and forthcoming attacks. At the heart of Di-Sec lies the monitoring core (M-Core), which is an extensible and lightweight layer that gathers information and statistics relevant for creating defense modules. Along with Di-Sec, a new user-friendly domain-specific language was developed, the M-Core Control Language (MCL). Using the MCL, a user can implement new defense mechanisms without the overhead of learning the details of the underlying software architecture (i.e., TinyOS, Di-Sec). Hence, the MCL expedites the development of sensor defense mechanisms by significantly simplifying the coding process for developers. The Di-Sec framework has been implemented and tested on real sensors to evaluate its feasibility and performance. Our evaluation shows that Di-Sec is feasible on today’s resource-limited sensors and has a nominal overhead. Furthermore, we illustrate the functionality of Di-Sec by implementing four detection and defense mechanisms for attacks at various layers of the communication stack.
240

Security in Wireless Sensor Networks for Open Controller

Engvall, Christoffer January 2013 (has links)
In this thesis we develop, evaluate and implement a security solution for Open Controllers wireless sensor network platform. A scenario is used to describe an exemplar application showing how our system is supposed to function. The security of the platform is analyzed using a well-established threat modeling process and attack trees which result in the identification of a number of risks, which could be security weaknesses. These attack trees visualize the security weaknesses in an easy to access way even for individuals without special security expertise. We develop a security solution to counter these identified risks. The developed security solution consists of three different security levels together with a number of new security policies. Each additional level applies different security mechanisms to provide increasingly improved security for the platform. The new security policies ensure that the security solution is continuously secure during its operating time. We implement part of the security solution in the Contiki operating system to assess its function in practice. Finally we evaluate the developed security solution by looking back to the previously identified weaknesses and the implementation proving that the security solution mitigates the risks.

Page generated in 0.04 seconds