Design And Implementation of Gas Turbine Combustion Chamber Control System Ba...IOSR Journals
Abstract: Wireless Sensor Networks (WSNs) are increasingly being used in various applications such as for
controlling & monitoring purposes in industrial processes. Cost effectiveness is the highly prioritized goal of
communication protocols & application design for WSN. This paper discusses the development of a WSN to
control & monitor Gas Turbine (GT) based Combustion Chamber (CC), which includes the design, development
& implementation of a WSN for real time monitoring & controlling GT based combustion chamber system. The
motive behind this work is to totally eliminate the use of control cables. It may be visualized that the sensors are
placed around the periphery of the CC of the GT. The regulation of pressure & temperature is done using a
radio module attached to a data acquisition board and the prototype circuits designed. Programming of the
sensor nodes and the gateway is done using software. The prototype system developed is based on 2/3 voting
logic for tripping the system if the temperature or pressure goes below or beyond the threshold range. This work
is an initiative to save control cable costs to make gas-based power plants cost effective since no such approach
has been taken regarding WSN application until now.
Keywords: Wireless Sensor Network, Zigbee, Xmesh, Gas Turbine, Combustion Chamber.
Design And Implementation of Gas Turbine Combustion Chamber Control System Ba...IOSR Journals
Abstract: Wireless Sensor Networks (WSNs) are increasingly being used in various applications such as for
controlling & monitoring purposes in industrial processes. Cost effectiveness is the highly prioritized goal of
communication protocols & application design for WSN. This paper discusses the development of a WSN to
control & monitor Gas Turbine (GT) based Combustion Chamber (CC), which includes the design, development
& implementation of a WSN for real time monitoring & controlling GT based combustion chamber system. The
motive behind this work is to totally eliminate the use of control cables. It may be visualized that the sensors are
placed around the periphery of the CC of the GT. The regulation of pressure & temperature is done using a
radio module attached to a data acquisition board and the prototype circuits designed. Programming of the
sensor nodes and the gateway is done using software. The prototype system developed is based on 2/3 voting
logic for tripping the system if the temperature or pressure goes below or beyond the threshold range. This work
is an initiative to save control cable costs to make gas-based power plants cost effective since no such approach
has been taken regarding WSN application until now.
Keywords: Wireless Sensor Network, Zigbee, Xmesh, Gas Turbine, Combustion Chamber.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Lightning Acquisition and Processing On Sensor Node Using NI cRIOijceronline
In this paper, we propose a digital design implementation for continuous real time data acquisition in case of a lightning event. The proposed system is capable of acquiring the lightning data at the rate of 1 MS/s on the FPGA. The system is also capable of providing very accurate timestamps in microsecond’s resolution. The data logging is carried out continuously on the PC using the TDMS file format with each and every sample being timestamped. The entire acquisition design is being implemented using NI cRIO hardware. The components of this assembly consist of the cRIO-9030 chassis , which contains a Kintex-7 FPGA , NI 9223 which is a sixteen bit ADC module, along with the NI 9467 which is a GPS module with the receiver antenna, it is used for accurate timestamping. The analog front end has been already developed, it comprises of an anti aliasing filter ,Low Noise Amplifiers and level shifters which can provide the signal with necessary gain to be processed by the digital section. The output of the analog front end is then fed to the NI 9223 four channel ADC module for sampling at 1MS/s. The samples along with their respective timestamps would be processed for identifying probable lightning data chunks on a preliminary basis which would then be transmitted over an Ethernet interface to the Central Processing system using Network Streams. The proposed digital design implementation for the entire acquisition system on the FPGA is briefly discussed in this paper
An implementation of recovery algorithm for fault nodes in a wireless sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Review of Energy Conservation
in Wireless Sensor Networks:
1.What are WSNs
2.Applications of WSNs
3.Advantages of using WSNs
4.Design Issues of WSNs
5.Power consumption in WSN
6.Sources of energy waste
7.General approaches to energy saving
8.Conclusion
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
In Wireless Sensor Network (WSNs), gather the data by using mobile sinks has become popular. Reduce the number of messages which is used for sink location broadcasting, efficient energy data forwarding, become accustomed to unknown earthly changes are achieved by a protocol which is projected by a SinkTrail. The forecast of mobile sinks’ location are done by using logical coordinate system. When sensor nodes don’t have any data to send, at that time they switch to sleep mode to save the energy and to increase the network lifetime. And due to this reason there is a chance of the involvement of nodes that are in sleeping state between the path sources to the mobile sink which is selected by the SinkTrail protocol. Before become the fully functional and process the information, these sleeping nodes can drop the some information. Due to this reason, it is vital to wake-up the sleeping nodes on the path earlier than the sender can start transferring of sensed data. In this paper, on-demand wake-up scheduling algorithm is projected which is used to activates sleeping node on the path before data delivery. Here, in this work the multi-hop communication in WSN also considers. By incorporating wake-up scheduling algorithm to perk up the dependability and improve the performance of on-demand data forwarding extends the SinkTrail solution in our work. This projected algorithm improves the quality of service of the network by dishonesty of data or reducing the loss due to sleeping nodes. The efficiency and the effectiveness projected solution are proved by the evaluation results.
A Review of Efficient Information Delivery and Clustering for Drip Irrigation Management using WSN.1
S. R. Boselin Prabhu, Dr. S. Sophia and A. Inigo Mathew
Dual Hybrid Algorithm for Job Shop Scheduling Problem ........................................................................ 14
Do Tuan Hanh, Vu Dinh Hoa and Nguyen Huu Mui
CThe Comparative Analysis of Power Optimization in Clustered Sleep Transistors................................ 25
M. Divya Sree, Y. Kranthi Kiran and Vijaya Vardhan Kancharla
Cyber Crimes Incidents in Financial Institutions of Tanzania ................................................................... 37
Edison Wazoel Lubua (PhD)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)अनिकेत चौधरी
Wireless sensors are used for various purposes now days. One of the best examples is temperature sensing at various geographical locations. This presentation is based on how to reduce energy consumption while using wireless sensors.
Energy Conservation in Wireless Sensor Networks: A ReviewIOSR Journals
Abstract: A wireless sensor network consists of a large number of sensor nodes which are deployed over an
area to perform local computations based on information gathered from the surroundings. Each node in the
network consists of a battery, but it is very difficult to change or recharge batteries. So the question is how to
enhance the lifetime of the network to such a long time. Therefore, in order to maximize the lifetime of the
network, the consumption of energy must be minimized. This is an important challenge in sensor networks as
sensors can not be easily replaced or recharged due to their ad-hoc deployment in hazardous environment. In
this paper, the main techniques used for energy conservation in sensor networks are discussed which include
duty cycling scheme, data driven approaches, mobility-based schemes, energy efficient MAC protocols and node
self scheduling scheme. These schemes can be used to improve the energy efficiency of the wireless sensor
network so that the network can work with greater efficiency and high battery lifetime.
Keywords : Energy conservation, energy consumption, sensor nodes, wireless sensor networks
Abstract A wireless sensor network (WSN) consists of sensors which are densely distributed to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The sensor data is transmitted to network coordinator which is heart of the wireless personal area network. In the modern scenario wireless networks contains sensors as well as actuators. ZigBee is newly developed technology that works on IEEE standard 802.15.4, which can be used in the wireless sensor network (WSN). The low data rates, low power consumption, low cost are main features of ZigBee. WSN is composed of ZigBee coordinator (network coordinator), ZigBee router and ZigBee end device. The sensor nodes information in the network will be sent to the coordinator, the coordinator collects sensor data, stores the data in memory, process the data, and route the data to appropriate node. Index Terms: WSN, ZigBee.
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Swapnil Jagtap
Secure information transmission is a basic issue for Wireless Sensor Networks (WSNs). Clustering is a practical approach to improve the execution of WSNs. In this paper, we study the safe and efficient data transmission in Cluster-based Wireless Sensor Networks (CWSNs). Here two Secure and Efficient data Transmission (SET) protocols are proposed namely (SET-IBS) and (SET-IBOOS) by using digital signature schemes. The SET-IBS security depends on the hardness of the discrete logarithm issues. In this paper, the feasibility of the SET-IBS and SET-IBOOS protocols is shown with respect to the security requirements and analysis against various attacks. The calculations and simulations are given to represent the effectiveness of the proposed execution over the current security protocols for CWSNs, as far as security overhead and energy consumption is considered. A WSN system consists of distributed devices using wireless sensor nodes to monitor the physical or environmental conditions, such as sound, temperature, air, vibration, and motion. The individual nodes in WSN are capable of sensing their environment, processing the information locally and sending data to one or more collection points in WSN. In this process, efficient data transmission is one of the most important issues in WSN. Many WSN is deployed in extreme physical environments for applications such as military domains, natural or artificial disasters or certain rescue operations with trustless surroundings. Secure and efficient data transmission is thus especially necessary and is demanded in many such practical WSNs.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
Lightning Acquisition and Processing On Sensor Node Using NI cRIOijceronline
In this paper, we propose a digital design implementation for continuous real time data acquisition in case of a lightning event. The proposed system is capable of acquiring the lightning data at the rate of 1 MS/s on the FPGA. The system is also capable of providing very accurate timestamps in microsecond’s resolution. The data logging is carried out continuously on the PC using the TDMS file format with each and every sample being timestamped. The entire acquisition design is being implemented using NI cRIO hardware. The components of this assembly consist of the cRIO-9030 chassis , which contains a Kintex-7 FPGA , NI 9223 which is a sixteen bit ADC module, along with the NI 9467 which is a GPS module with the receiver antenna, it is used for accurate timestamping. The analog front end has been already developed, it comprises of an anti aliasing filter ,Low Noise Amplifiers and level shifters which can provide the signal with necessary gain to be processed by the digital section. The output of the analog front end is then fed to the NI 9223 four channel ADC module for sampling at 1MS/s. The samples along with their respective timestamps would be processed for identifying probable lightning data chunks on a preliminary basis which would then be transmitted over an Ethernet interface to the Central Processing system using Network Streams. The proposed digital design implementation for the entire acquisition system on the FPGA is briefly discussed in this paper
An implementation of recovery algorithm for fault nodes in a wireless sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Review of Energy Conservation
in Wireless Sensor Networks:
1.What are WSNs
2.Applications of WSNs
3.Advantages of using WSNs
4.Design Issues of WSNs
5.Power consumption in WSN
6.Sources of energy waste
7.General approaches to energy saving
8.Conclusion
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
In Wireless Sensor Network (WSNs), gather the data by using mobile sinks has become popular. Reduce the number of messages which is used for sink location broadcasting, efficient energy data forwarding, become accustomed to unknown earthly changes are achieved by a protocol which is projected by a SinkTrail. The forecast of mobile sinks’ location are done by using logical coordinate system. When sensor nodes don’t have any data to send, at that time they switch to sleep mode to save the energy and to increase the network lifetime. And due to this reason there is a chance of the involvement of nodes that are in sleeping state between the path sources to the mobile sink which is selected by the SinkTrail protocol. Before become the fully functional and process the information, these sleeping nodes can drop the some information. Due to this reason, it is vital to wake-up the sleeping nodes on the path earlier than the sender can start transferring of sensed data. In this paper, on-demand wake-up scheduling algorithm is projected which is used to activates sleeping node on the path before data delivery. Here, in this work the multi-hop communication in WSN also considers. By incorporating wake-up scheduling algorithm to perk up the dependability and improve the performance of on-demand data forwarding extends the SinkTrail solution in our work. This projected algorithm improves the quality of service of the network by dishonesty of data or reducing the loss due to sleeping nodes. The efficiency and the effectiveness projected solution are proved by the evaluation results.
A Review of Efficient Information Delivery and Clustering for Drip Irrigation Management using WSN.1
S. R. Boselin Prabhu, Dr. S. Sophia and A. Inigo Mathew
Dual Hybrid Algorithm for Job Shop Scheduling Problem ........................................................................ 14
Do Tuan Hanh, Vu Dinh Hoa and Nguyen Huu Mui
CThe Comparative Analysis of Power Optimization in Clustered Sleep Transistors................................ 25
M. Divya Sree, Y. Kranthi Kiran and Vijaya Vardhan Kancharla
Cyber Crimes Incidents in Financial Institutions of Tanzania ................................................................... 37
Edison Wazoel Lubua (PhD)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)अनिकेत चौधरी
Wireless sensors are used for various purposes now days. One of the best examples is temperature sensing at various geographical locations. This presentation is based on how to reduce energy consumption while using wireless sensors.
Energy Conservation in Wireless Sensor Networks: A ReviewIOSR Journals
Abstract: A wireless sensor network consists of a large number of sensor nodes which are deployed over an
area to perform local computations based on information gathered from the surroundings. Each node in the
network consists of a battery, but it is very difficult to change or recharge batteries. So the question is how to
enhance the lifetime of the network to such a long time. Therefore, in order to maximize the lifetime of the
network, the consumption of energy must be minimized. This is an important challenge in sensor networks as
sensors can not be easily replaced or recharged due to their ad-hoc deployment in hazardous environment. In
this paper, the main techniques used for energy conservation in sensor networks are discussed which include
duty cycling scheme, data driven approaches, mobility-based schemes, energy efficient MAC protocols and node
self scheduling scheme. These schemes can be used to improve the energy efficiency of the wireless sensor
network so that the network can work with greater efficiency and high battery lifetime.
Keywords : Energy conservation, energy consumption, sensor nodes, wireless sensor networks
Abstract A wireless sensor network (WSN) consists of sensors which are densely distributed to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The sensor data is transmitted to network coordinator which is heart of the wireless personal area network. In the modern scenario wireless networks contains sensors as well as actuators. ZigBee is newly developed technology that works on IEEE standard 802.15.4, which can be used in the wireless sensor network (WSN). The low data rates, low power consumption, low cost are main features of ZigBee. WSN is composed of ZigBee coordinator (network coordinator), ZigBee router and ZigBee end device. The sensor nodes information in the network will be sent to the coordinator, the coordinator collects sensor data, stores the data in memory, process the data, and route the data to appropriate node. Index Terms: WSN, ZigBee.
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Swapnil Jagtap
Secure information transmission is a basic issue for Wireless Sensor Networks (WSNs). Clustering is a practical approach to improve the execution of WSNs. In this paper, we study the safe and efficient data transmission in Cluster-based Wireless Sensor Networks (CWSNs). Here two Secure and Efficient data Transmission (SET) protocols are proposed namely (SET-IBS) and (SET-IBOOS) by using digital signature schemes. The SET-IBS security depends on the hardness of the discrete logarithm issues. In this paper, the feasibility of the SET-IBS and SET-IBOOS protocols is shown with respect to the security requirements and analysis against various attacks. The calculations and simulations are given to represent the effectiveness of the proposed execution over the current security protocols for CWSNs, as far as security overhead and energy consumption is considered. A WSN system consists of distributed devices using wireless sensor nodes to monitor the physical or environmental conditions, such as sound, temperature, air, vibration, and motion. The individual nodes in WSN are capable of sensing their environment, processing the information locally and sending data to one or more collection points in WSN. In this process, efficient data transmission is one of the most important issues in WSN. Many WSN is deployed in extreme physical environments for applications such as military domains, natural or artificial disasters or certain rescue operations with trustless surroundings. Secure and efficient data transmission is thus especially necessary and is demanded in many such practical WSNs.
Frequency and similarity aware partitioning for cloud storage based on space ...redpel dot com
Frequency and similarity aware partitioning for cloud storage based on space time utility maximization model.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Aeternus is a Virtual Brass instrument, featuring solo Trumpet, Cornet, Trombone, Tuba, French Horn, Flugelhorn as well as Brass Sections and Orchestral Ensemble.
An efficient reconfigurable workload balancing scheme for fog computing netwo...IJECEIAES
Nowadays a huge amount of data has been communicated using fog nodes spread throughout smarty cities. the communication process is performed using fog nodes which are co-located with cellular base stations (BSs) that can move the computing resources close to internet of things (IoT) devices. In smart cities, a different type of data flow has been communicated through IoT devices. The communication process performs efficiently using the remote cloud. The IoT devices very close to the BS can communicate data without using fog nodes. Due to these phenomena, workload unbalancing occurs in IoT devices communicating in fog computing networks. Hence, it generates communication and computing latency. The task distribution process between the IoT devices is unbalanced. Hence, congestion and loss of information occur in fog computing network. A proposed reconfigurable load balancing algorithm (RLBA) is efficiently balancing the workload by reconfigurable communication channels and deviates the task with respect to the BS locations, IoT devices density and load IoT devices in each fog nodes in a network to minimize the communication and computing latency. As per the performance analysis, the proposed algorithm shows better performance as compared to conventional methods’ average latency ratio, communication latency ratio, computing load and traffic load.
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
Kavita Sunchu, Dhainje Prakash " Structure less Efficient Data Aggregation and Data Integrity in Sensor Network ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation techniques provide higher security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the cipher texts without decryption; consequently, transmission overhead. Data aggregation protocol can reduce the communication cost, so the life time of sensor network is extended. The structure based has the overhead in dynamic scenarios for any event based application. The goal of our work is to design techniques and protocol that is structure free and ensure data integrity and aggregation with low transmission overhead and transmission cost. Experiment results demonstrate that the transmission overhead is still reduced even if on sensing data. Further, the design has been generalized and adopted in wireless sensor networks.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
The emerge of the Internet of Things (IoT) data as a commodity to optimize public services such
as Fishing Locator has made sensor-cloud an important object. When sensors that are members of
multiple IoT gateways can inter-operate at the same time for more than one application, it will reduce cost
to deploy IoT infrastructure. However, reliability has also developed as the most important aspect for
real-time data collection that should be streamed constantly. Due to uncertainty factors sensors failure is
potentially occurred, then an adaptive approach should be addressed into this as to guarantee the flow of
streaming data. This paper proposed an adaptive sensor-cloud mechanism to manage the reliability by
using a runtime model approach where a transition model and dynamic software product line engineering
will take place to weaving the system. Our technique is comparable to other approaches and can be
implemented in many types of Cloud-based services.
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure.
Efficiency enhancement using optimized static scheduling technique in TSCH ne...IJECEIAES
In recent times, the reliable and real-time data transmission becomes a mandatory requirement for various industries and organizations due to the large utilization of Internet of Things (IoT) devices. However, the IoT devices need high reliability, precise data exchange and low power utilization which cannot be achieved by the conventional Medium Access Control (MAC) protocols due to link failures and high interferences in the network. Therefore, the Time-Slotted Channel Hopping (TSCH) networks can be used for link scheduling under the IEEE 802.15.4e standard. In this paper, we propose an Optimized Static Scheduling Technique (OSST) for the link scheduling in IEEE 802.15.4e based TSCH networks. In OSST the link schedule is optimized by considering the packet latency information during transmission by checking the status of the transmitted packets as well as keeping track of the lost data packets from source to destination nodes. We evaluate the proposed OSST model using 6TiSCH Simulator and compare the different performance metrics with Simple distributed TSCH Scheduling.
Service oriented cloud architecture for improved performance of smart grid ap...eSAT Journals
Abstract An effective and flexible computational platform is needed for the data coordination and processing associated with real time operational and application services in smart grid. A server environment where multiple applications are hosted by a common pool of virtualized server resources demands an open source structure for ensuring operational flexibility. In this paper, open source architecture is proposed for real time services which involve data coordination and processing. The architecture enables secure and reliable exchange of information and transactions with users over the internet to support various services. Prioritizing the applications based on complexity enhances efficiency of resource allocation in such situations. A priority based scheduling algorithm is proposed in the work for application level performance management in the structure. Analytical model based on queuing theory is developed for evaluating the performance of the test bed. The implementation is done using open stack cloud and the test results show a significant gain of 8% with the algorithm. Index Terms: Service Oriented Architecture, Smart grid, Mean response time, Open stack, Queuing model
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
An efficient tree based self-organizing protocol for internet of things.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy Neural Networks for Cloud Services
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Privacy preserving and delegated access control for cloud applicationsredpel dot com
Privacy preserving and delegated access control for cloud applications
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
Performance evaluation and estimation model using regression method for hadoop word count.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
Multiagent multiobjective interaction game system for service provisoning vehicular cloud
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Efficient multicast delivery for data redundancy minimization over wireless d...redpel dot com
Efficient multicast delivery for data redundancy minimization over wireless data centers
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
Cloud assisted io t-based scada systems security- a review of the state of the art and future challenges.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
I-Sieve: An inline High Performance Deduplication System Used in cloud storageredpel dot com
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Architecture harmonization between cloud radio access network and fog networkredpel dot com
Architecture harmonization between cloud radio access network and fog network
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
A tutorial on secure outsourcing of large scalecomputation for big data
for more ieee paper / full abstract / implementation , just visit www.redpel.com
A parallel patient treatment time prediction algorithm and its applications i...redpel dot com
A parallel patient treatment time prediction algorithm and its applications in hospital.
for more ieee paper / full abstract / implementation , just visit www.redpel.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
An energy efficient and delay-aware wireless computing system for industrial wireless sensor networks
1. SPECIAL SECTION ON INDUSTRIAL SENSOR NETWORKS WITH
ADVANCED DATA MANAGEMENT: DESIGN AND SECURITY
Received April 3, 2015, accepted April 21, 2015, date of publication June 15, 2015, date of current version July 17, 2015.
Digital Object Identifier 10.1109/ACCESS.2015.2443171
An Energy-Efficient and Delay-Aware Wireless
Computing System for Industrial Wireless
Sensor Networks
KATSUYA SUTO1, (Student Member, IEEE), HIROKI NISHIYAMA1, (Senior Member, IEEE),
NEI KATO1, (Fellow, IEEE), AND CHIH-WEI HUANG2
1Graduate School of Information Sciences, Tohoku University, Sendai 980-8577, Japan
2Department of Communication Engineering, National Central University, Taoyuan 320, Taiwan
Corresponding author: K. Suto (suto@it.ecei.tohoku.ac.jp)
This work was supported by the Strategic International Research Cooperative Program through the Japan Science and Technology Agency.
ABSTRACT Industrial wireless sensor networks have attracted much attention as a cornerstone to making
the smart factories real. Utilizing industrial wireless sensor networks as a base for smart factories makes
it possible to optimize the production line without human resources, since it provides industrial Internet of
Things service, where various types of data are collected from sensors and mined to control the machines
based on the analysis result. On the other hand, a fog computing node, which executes such real-time
feedback control, should be capable of real-time data collection, management, and processing. To achieve
these requirements, in this paper, we introduce wireless computing system (WCS) as a fog computing node.
Since there are a lot of servers and each server has 60 GHz antennas to connect to other servers and sensors,
WCS has high collecting and processing capabilities. However, in order to fulfill a demand for real-time
feedback control, WCS needs to satisfy an acceptable delay for data collection. In addition, lower power
consumption is required in order to reduce the cost for the factory operation. Therefore, we propose an
energy-efficient and delay-aware WCS. Since there is a tradeoff relationship between the power consumption
and the delay for data collection, our proposed system controls the sleep schedule and the number of
links to minimize the power consumption while satisfying an acceptable delay constraint. Furthermore, the
effectiveness of our proposed system is evaluated through extensive computer simulations.
INDEX TERMS Industrial wireless sensor network, wireless computing system, low power consumption,
delay-aware data collection.
I. INTRODUCTION
Recent advances in wireless sensor network technologies
including machine-to-machine and device-to-device commu-
nications indicate the realization of smart factories, which
opens up a new dimension for factory management [1]–[4].
A smart factory based on a wireless sensor network provides
industrial Internet of Things (IoT) service [5], [6]. In this
service, a computing system collects various kinds of data
from machines and sensors and mines a large amount of
collected data (i.e., industrial big data) to obtain valuable
information for factory operation. Machines are automati-
cally controlled by using the obtained information to make
an efficient production line (i.e., adequate production speed,
low power consumption, failure prediction, and so forth).
Therefore, the smart factory makes it possible to optimize the
factory operation without human resources [7], [8].
In this paper, we focus on fog-based industrial wireless
sensor networks [9], in which a fog computing node is
physically placed close to the sensors in order to directly
communicate with the gateway nodes. Since the cloud servers
provide the industrial IoT application through Internet in
cloud-based industrial wireless sensor networks [10], the
fog-based network can drastically reduce feedback latency.
Moreover, in order to achieve enough capability for providing
such service, a fog computing node should satisfy the
following requirements: (i) high processing performance in
order to support real-time big data mining, (ii) concurrent data
collection from a lot of sensors, (iii) high service availability,
(iv) low system power consumption for a low cost factory
operation.
In order to satisfy the aforementioned requirements, we
focus on a Wireless Computing System (WCS) [11]–[13],
1026
2169-3536
2015 IEEE. Translations and content mining are permitted for academic research only.
Personal use is also permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
2. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
FIGURE 1. Our envisioned industrial wireless sensor network using
wireless computing system.
as shown in Fig. 1. While this system is originally used for
rack architecture in data center networks [13], we introduce
this system as a fog computing node in industrial wireless
sensor networks. Since WCS effectively accommodates a
lot of servers, it can achieve high processing capability
even if the space is limited. Additionally, each server has
two 60 GHz antennas, where one of the antennas, referred
to as outside antenna, is used to communicate with the
sensors and the other antenna, referred to as inside antenna,
is used to communicate with the other servers. Since the
60 GHz antenna has high directivity with high data rate
(4 − 15 Gbps) [14], [15] and there exist multiple outside
antennas, WCS can collect data from a lot of sensors
concurrently. Although conventional computing systems
based on wired cables have a drastic decrease in service
availability if switches cease to function, WCS achieves
high service availability since it keeps the network
connectivity even if some servers cease to function.
Moreover, WCS achieves lower system power consumption
in comparison with wired computing systems. For instance,
the collective power consumption of antennas in a WCS
consisting of 100 servers is 6 W [12], [15] while the collective
power consumption of the routers in a wired computing
system based on a two-tier fat tree is 264 W [16], [17].
In this paper, we aim to investigate a system operation
scheme for industrial IoT service. Since IoT service is
sensitive to the delay, we need to satisfy an acceptable delay
for data collection. Additionally, we need to reduce the power
consumption of our envisioned system in order to achieve
an energy-efficient factory. Consequently, both delay for
data collection and system power consumption should be
considered. To tackle this research issue, we first construct a
mathematical model to evaluate the system power consump-
tion and delay for data collection, and thus show a trade-off
relationship between these values. Furthermore, based on the
trade-off relationship, we propose an Energy-Efficient and
Delay-Aware Wireless Computing System (E2DA-WCS).
Our proposed system minimizes the system power consump-
tion while satisfying the acceptable delay of each datum,
by controlling the number of servers in a sleep state and the
number of links (i.e., the degree of servers).
The remainder of this paper is organized as follows.
In section II, we describe the architecture, multiple access
scheme, and sleep mode in our envisioned computing system.
Additionally, in this section, we show a trade-off relationship
between power consumption and delay required for data
collection. Our proposed energy-efficient and delay-aware
system operation scheme is explained in Section III.
We present the performance evaluation in Section IV. Finally,
concluding remarks are provided in Section V.
II. ENVISIONED COMPUTING SYSTEM
In this section, we introduce our envisioned computing
system for industrial wireless sensor networks. First, we
explain the architecture of our envisioned computing
system and its network topology. Then, the time slot
allocation scheme for our envisioned system is presented.
Furthermore, we describe the sleep mode, which is used to
reduce the system power consumption. Finally, we show the
trade-off relationship between the system power consumption
and delay for data collection in our envisioned system.
A. ARCHITECTURE
In this paper, we use a spherical WCS whose form is a
spherical shape as shown in Fig. 2. In our envisioned WCS,
servers are circularly arranged in both the vertical and hori-
zontal direction, which makes it possible to ensure a low path
loss (i.e., high data rate) between any servers even when the
degree of servers increases [13].
Our envisioned spherical WCS consists of multiple
stories, which are shaped like a partial hemisphere to make
the envisioned system sphere-shaped. Additionally, each
story has multiple containers, which have dimensions of
γ meters wide, δ meters deep, and ζ meters high, and a blade
server is put in each container. We assume that a set of all
servers is defined as N = {n1, n2, . . . , n|N|}, where |N| is
the total number of servers, and a set of stories is defined as
V = {v−S, . . . , v−1, v0, v1 . . . , vS}, where S = (|V| − 1)/2
and |V| denotes the total number of stories. Additionally,
the set of servers in story vs, Nvs , is given by
{nvs,1, nvs,2, . . . , nvs,|Nvs |}. The numbers of servers in differ-
ent stories v0 and vS (or v−S), |Nv0 | and |NvS | (or |Nv−S |)
are set to 2(|V| − 1) and 1, respectively. Additionally, since
the number of servers in story vs, |Nvs |, is decided based
on the inner-radius of the smaller surface of story vs, Rvs , and
the width of the container, γ , the value of |Nvs | is expressed as
|Nvs | =
2(|V| − 1), if s = 0,
1, if s = S or −S,
(2πRvs )/γ, otherwise.
(1)
Fig. 3 shows the intra-system network topology of our
envisioned WCS. In this system, each server transmits data to
servers diagonally opposite to it and the number of links from
transmitter nvs,i in story vs to receivers, knvs,i , can be changed
by controlling the radiation angle of the antenna. The set of
VOLUME 3, 2015 1027
www.redpel.com+917620593389
www.redpel.com+917620593389
3. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
FIGURE 2. Architecture of our envisioned spherical wireless computing system.
FIGURE 3. Intra-system network topologies of our envisioned system.
(a) Network topology in story v0 from top view. (b) Network topology
from side view.
stories that contain neighbor servers of server nvs,i, V
nvs,i
con ,
is expressed as V
nvs,i
con = {v(−s−Q), . . . , v−s, . . . , v(−s+Q)},
where Q = (|V
nvs,i
con | − 1)/2. Assuming that k
nvs,i
vq is the
number of links from server nvs,i to its neighbor servers in
story vq ∈ V
nvs,i
con , the value of knvs,i is expressed as the sum
of k
nvs,i
vq .
knvs,i =
vq∈V
nvs,i
con
k
nvs,i
vq . (2)
Moreover, in this paper, we assume that, for all servers,
|V
nvs,i
con | and knvs,i are set to the same values, |Vcon| and k ,
respectively. Therefore, intra-system network topologies
from the top and side views become a Cayley graph as
shown in Fig. 3. This network topology facilitates the design
of communication and networking protocols (e.g., multiple
access and routing protocols).
B. SPACE AND TIME DIVISION MULTIPLE
ACCESS SCHEME
Here, we introduce an efficient time slot allocation
procedure for our envisioned system. In order to use time
slots efficiently, we consider both space- and time-division
multiplexing. Our scheme uses time slot cycles in order to
fairly allocate time slots to servers and each time slot cycle is
divided into multiple time slots. Each time slot is allocated to
servers that do not mutually interfere with each other.
Since the network topology of our envisioned system is
constructed in a regular pattern (i.e., diagonally opposite
servers are connected with the same degree), we can simplify
the time slot allocation procedure by dividing it into a story
selection phase and a server selection phase. The story selec-
tion phase selects the stories whose servers do not interfere
with servers in other simultaneously selected stories. On the
other hand, the server selection phase chooses multiple
servers that do not interfere with each other in each story in
order to allocate an independent time slot to servers without
interference.
Procedure 1 demonstrates the time slot allocation
procedure. A centralized server executes this procedure by
using topology information.
First, the centralized server executes the story selection
phase in order to choose non-interference story groups, ¯vi, in
which the inter-story servers do not interfere with each other,
from the set of stories, V. Thus, this phase creates a set of ¯v,
¯V = {¯v1, ¯v2, . . . , ¯v| ¯V|}. As shown in Fig. 3(b), the servers
|Vcon| distant stories apart do not interfere with each other.
Assuming that |Vcon| ≤ |V|, the value of | ¯V| can be given as
| ¯V| = |Vcon|. (3)
1028 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
4. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
Procedure 1 Time Slot Allocation Procedure
1: Create a set of non-interference story groups,
¯V ← {¯v1, ¯v2, . . . , ¯v| ¯V|}
2: for i = 1 to | ¯V| do
3: Create a set of non-interference server groups,
¯N¯vi ← {¯n¯vi,1, ¯n¯vi,2, . . . , ¯n¯vi,| ¯N¯vi |},
from servers in all stories vs, vs ∈ ¯vi,
4: Allocate independent time slots to servers in group
¯n¯vi,j, for all j, 1 ≤ j ≤ | ¯N¯vi |
5: i ← i + 1
6: end for
7: Calculate the amount of time slots, |T|, based on (7)
8: return the value of |T|
Following the story selection phase, the centralized server
executes the server selection phase for each group ¯vi in
order to allocate the time slots to servers without mutual
interference. Servers in each story vs ∈ ¯vi are divided into
multiple non-interference server groups, ¯n¯vi,j, in which the
intra-story servers do not interfere with each other. In other
words, since each group ¯n¯vi,j consists of non-interference
server groups in each story vs ∈ ¯vi, ¯nvs,j, ¯n¯vi,j is expressed as
¯n¯vi,j =
vs∈ ¯vi
¯nvs,j. (4)
Therefore, the centralized server creates sets of non-
interference server groups in each story vs ∈ ¯vi, ¯Nvs = {¯nvs,1,
¯nvs,2, . . . , ¯nvs,| ¯Nvs |}. Then, based on the created ¯Nvs , it creates
a set of non-interference server groups in group ¯vi,
¯N¯vi = {¯n¯vi,1, ¯n¯vi,2, . . . , ¯n¯vi,| ¯N¯vi |}. By using the set ¯N¯vi , the
centralized server allocates independent time slots to the
servers. Since the value of | ¯N¯vi | is the maximum value of | ¯Nvs |
for all vs ∈ ¯vi, we have
| ¯N¯vi | = max
vs∈¯vi
| ¯Nvs |. (5)
Furthermore, since the number of intra-story servers that do
not interfere with other intra-story servers in story vs is given
by |Nvs |/k
v−s
vs , where k
v−s
vs is the number of links from
any server in story vs to servers in the diagonally opposite
story v−s, the value of | ¯Nvs | can be expressed as
| ¯Nvs | =
|Nvs |
|Nvs |/k
v−s
vs
. (6)
Finally, the centralized server calculates the amount of time
slots, |T|, which is expressed with the sum of | ¯N¯vi |, as follows.
|T| =
| ¯V|
i=1
| ¯N¯vi |. (7)
Additionally, since each time slot has constant length [s], λ,
the time slot cycle, , is given as
= |T|λ. (8)
Since a channel with bandwidth W is divided into |T| time
slots, the data transmission rate between servers ni and nj,
θni,j , is expressed as
θni,j =
W
|T|
log2 1 +
Pni gni,j
σ2
. (9)
Here, Pni is the transmission power of server ni,
σ2 represents the noise power level and gni,j denotes the
channel gain between servers ni and nj.
C. SLEEP MODE
Since low system power consumption is required, we use
a sleep mode for the servers in our envisioned system.
Therefore, we introduce a summary of sleep mode and
demonstrate mathematical expressions to evaluate the system
power consumption and data collection delay in multi-hop
communication.
The sleep mode aims to reduce system power consumption
by letting some servers enter the sleep state. During the sleep
state, the power consumption of the server is low. Assuming
that the ratio of servers in sleep state is ρ, the system power
consumption [W], Esystem, is expressed as
Esystem = ρEserver
sleep + (1 − ρ)Eserver
active , (10)
where Eserver
sleep and Eserver
active are the power consumption of the
server in sleep state and that in active state, respectively.
However, servers cannot act as router while in sleep state in
this system. In other words, servers in sleep state are removed
from the intra-system network and the original degree distri-
bution of the network, pk, is changed. Here, we assume that
the servers in sleep state are randomly selected regardless of
their degree and location. The degree distribution when some
servers enter sleep state, pk, can be expressed based on (9)
in [18], as follows.
pk =
K
i=k
i
k
(fi)i−k
(1 − fi)k
pactive,i, (11)
where K is the maximum degree of the original degree
distribution pk, fi denotes the probability that a server with
degree i will enter sleep state, and pactive,i is the degree
distribution of servers in active state. Additionally, pactive,i is
given as
pactive,i =
(1 − fi)pi
1 − j fjpj
. (12)
Since all servers have the same degree k in our envi-
sioned system, the degree distribution of the intra-system
network, pk, can be defined as
pk =
1, if k = k ,
0, otherwise.
(13)
Additionally, since the ratio of servers with degree k that
enter sleep state is ρ, fk is given as
fk =
ρ, if k = k ,
0, otherwise.
(14)
VOLUME 3, 2015 1029
www.redpel.com+917620593389
www.redpel.com+917620593389
5. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
Therefore, pk can be rewritten as
pk =
k
k
f
k −k
k (1 − f k )k
p k . (15)
Moreover, the average degree when the ratio of servers in
sleep state is ρ, kρ , can be described based on (15).
kρ =
k
k=1
kpk. (16)
Based on (16), we can derive the average hop count
between any servers when the ratio of servers in sleep
state is ρ, hρ . Let |nhl | be the number of l-hop distant
servers from a server. Since the 0-hop distant server is the
source server and the source server has kρ neighbors,
|nh0 | and |nh1 | are 1 and kρ , respectively. Although 1-hop
distant servers also have kρ neighbors, some of their neigh-
bors are the same server. Therefore, the number of 2-hop
distant servers, |nh2 | is given by µ kρ
2, where µ is the ratio
of common servers. We suppose that µ is a constant value
regardless of hop count. Therefore, |nhl | is represented as
|nhl | = µl−1 kρ
l. Additionally, since the total number of
active servers, |Nactive|, is given as the sum of the number
of l-hop distant servers as l goes from 0 to maximum hop
count, Hρ, we have
|Nactive| =
Hρ
l=0
|nhl |
= 1 + kρ + µ kρ
2
+ · · · + µHρ−1
kρ
Hρ
= 1 +
kρ − µHρ kρ
Hρ+1
1 − µ kρ
. (17)
Therefore, the value of Hρ can be formulated as
Hρ =
1
ln(µ kρ )
×
ln |Nactive| +
kρ
µ kρ − 1
− 1
µ kρ − 1
kρ
.
(18)
Hence, the average hop count between any servers when the
ratio of servers in sleep state is ρ, hρ , can be given as
hρ =
1
ρ|N|
Hρ
l=0
l|nhl |. (19)
In the multi-hop communication, since each server waits
to transmit its data until its own time slot, the average wait
time for each hop is given by /2. Ignoring queuing delay,
the delay from a server which has received data from a sensor
to the destination server (referred to as internal delay) when
the ratio of servers in sleep state is ρ, Dint
ρ , can be expressed
as
Dint
ρ = hρ
2
. (20)
D. TRADE-OFF RELATIONSHIP BETWEEN POWER
CONSUMPTION AND DELAY
The rest of this section describes the trade-off relation-
ship between system power consumption and internal delay,
which is derived from the aforementioned mathematical
expressions.
Fig. 4 shows the effects of the number of servers in sleep
state on the system power consumption and average internal
delay. This result is calculated based on (10) and (20) and the
parameters are set as follows: Eserver
sleep = 10.008 W [19], [20],
Eserver
active = 32.3 W [12], [21], |N| = 100, µ = 0.4, λ = 0.02 s.
As shown in Fig. 4(a), the system power consumption can
be reduced in inverse proportion to the number of servers
in sleep state. On the other hand, as shown in Fig. 4(b), the
average internal delay increases with the increase of the num-
ber of servers in sleep state because the average hop count
between servers becomes higher in such case. From these
results, we can show a trade-off relationship between the
system power consumption and internal delay. Consequently,
we need to investigate an optimization scheme that considers
both system power consumption and internal delay to find an
optimal number of servers in sleep state.
Moreover, as shown in Fig. 4(b), the average internal delay
changes depending on the degree of servers (i.e., k = 5 and
k = 7). Since a network with lower degree has a shorter
time slot cycle, the delay is lower when the number of servers
in sleep state is low. However, since the hop-count increases
in an exponential fashion and growth rate is higher in case
of lower degree, the internal delay in the network with lower
degree becomes higher when the number of servers in sleep
state is large. Consequently, we need to jointly control the
number of servers in sleep state and the degree of servers.
III. PROPOSED ENERGY-EFFICIENT AND DELAY-AWARE
WIRELESS COMPUTING SYSTEM
In this section, we describe the proposed operation scheme for
our envisioned computing system. First, we introduce an opti-
mization problem to minimize the system power consumption
while satisfying an acceptable delay constraint. Then, based
on the optimization problem, we propose a system operation
procedure that jointly controls the sleep mode and the degree
of servers in a dynamic scenario.
A. ASSUMED ACCEPTABLE DELAY AND
OPTIMIZATION PROBLEM
In order to execute the real-time feedback control, the com-
puting system collects various kinds of data (e.g., ambient
information, image, video, log, and so forth) from sensors
that are deployed in the whole factory, where we define
G = {g1, g2, . . . , g|G|}, which denotes the set of data types.
Additionally, since the computing system has knowledge
about data dynamics (i.e., data arrival time) [22], [23] and the
acceptable internal delay of each data is previously defined,
it knows the acceptable internal delay of data type gi at time
slot t, Dint
gi
(t). Additionally, a minimum acceptable internal
delay at time t, Dint(t), is given by Dint(t) = mingi∈G Dint
gi
(t).
1030 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
6. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
FIGURE 4. Trade-off relationship between the system power consumption
and internal delay. (a) Effect of the number of servers in sleep state on
the system power consumption. (b) Effect of the number of servers in
sleep state on the internal delay.
Our optimization problem aims to minimize the system
power consumption while satisfying an acceptable internal
delay at each time slot. Note that the delay from sensors to
servers (referred to as external delay) is not considered since
large number of existing works (see [24], [25]) have already
proposed a method to satisfy the external delay constraint.
As shown in Fig. 4, the ratio of servers in sleep state affects
the system power consumption and the internal delay, and the
degree of server also affects the internal delay. Therefore, we
can find an optimal ratio of servers in sleep state, ρ∗, and an
optimal degree for the servers in active state, k∗ , at time
slot t by solving the following integer programing.
minimize
ρ, k
Esystem
subject to Dint
ρ < Dint(t). (21)
B. SYSTEM OPERATION PROCEDURE
IN DYNAMIC SCENARIO
Here, we propose a system operation procedure for our
computing system. In our proposed procedure, the ratio of
servers in sleep state and the degree of the servers in active
state at each time slot t, ρ(t) and k(t) , are dynamically con-
trolled in order to minimize the system power consumption
while satisfying an acceptable internal delay. In this regard,
ρ(t) and k(t) are decided based on the acceptable internal
delay at time slot t + Tsu, Dint(t + Tsu), since each server in
sleep state needs time to start-up, Tsu [26].
Procedure 2 System Operation Procedure at Time Slot t
1: Calculate Dint(t ) and t by using (22) and (23)
2: Calculate ρ∗(t ) and k∗(t ) by using (21)
3: Calculate ρ∗(t + Tsu) and k∗(t + Tsu) by using (21)
4: if ρ(t − 1) > ρ∗(t + Tsu) then
5: let {ρ(t − 1) − ρ∗(t + Tsu)}|N| servers in sleep state
enter active state
6: ρ(t) ← ρ∗(t + Tsu) and k(t) ← k∗(t + Tsu)
7: else if ρ(t − 1) < ρ∗(t ) then
8: let {ρ∗(t ) − ρ(t − 1)}|N| servers in active state enter
sleep state
9: ρ(t) ← ρ∗(t ) and k(t) ← k∗(t )
10: else if ρ∗(t ) ≤ ρ(t − 1) ≤ ρ∗(t + Tsu) then
11: ρ(t) ← ρ(t − 1) and k(t) ← k(t − 1)
12: end if
Procedure 2 describes our proposed system operation
procedure. The centralized server executes this procedure at
time slot t.
First, the centralized server calculates the minimum
acceptable delay for the interval from t to t + Tsu, Dint(t ),
which is given by
Dint(t ) = min
t≤a≤t+Tsu
Dint(a), (22)
where t denotes instant with the minimum acceptable delay
for the interval from t to t + Tsu, which is given by
t = arg min
t≤a≤t+Tsu
Dint(a). (23)
Furthermore, by solving (21), the centralized server finds the
optimal ratios of servers in sleep state and the optimal degrees
of servers in active state at time slot t and t+Tsu, respectively.
Then, it tries to compare the ratios of servers in sleep state
at (t − 1), t , and t + Tsu, ρ(t − 1), ρ∗(t ), and ρ∗(t + Tsu),
in order to decide the next action. There exist three cases:
(i) when ρ(t −1) > ρ∗(t +Tsu), the centralized server should
let {ρ(t − 1) − ρ∗(t + Tsu)}|N| servers in sleep state enter the
active state in order to satisfy the acceptable delay at (t +Tsu).
In this case, the current ratio and degree, ρ(t) and k(t) , are
set to ρ∗(t + Tsu) and k∗(t + Tsu) , respectively. (ii) when
ρ(t−1) < ρ∗(t ), {ρ∗(t )−ρ(t−1)}|N| servers in active state
can enter the sleep state while satisfying the acceptable delay.
In this case, the current ratio and degree, ρ(t) and k(t) , are
set to ρ∗(t ) and k∗(t ) , respectively. (iii) otherwise, the
centralized server sets the values of ρ(t) and k(t) as the
previous values, ρ(t − 1) and k(t − 1) .
VOLUME 3, 2015 1031
www.redpel.com+917620593389
www.redpel.com+917620593389
7. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
IV. PERFORMANCE EVALUATION
In this section, we evaluate the performance of our proposed
energy-efficient and delay-aware operation scheme in our
envisioned system by using extensive computer simulations.
Furthermore, we confirm the effectiveness of our proposal in
comparison with conventional schemes.
TABLE 1. Evaluation settings.
A. PARAMETER SETTINGS
Table 1 describes the settings of our simulations. The
simulations are executed for 100 seconds. In these simula-
tions, a wireless computing system consisting of 100 servers
is considered as a system configuration. The antenna uses
a single channel from 59.5 to 62.5 GHz, which is divided
into multiple time slots based on our multiple access
scheme, where the length of each time slot is 0.02 s. As a
channel model, the transmission power, antenna gain, and
noise power level are set to 10 dBm, 10 dB, and −70 dBm.
Additionally, the path loss is calculated by using
[13, eqs. (8), (10), and (11)]. Due to the limitation of radi-
ation angle [27], the degree of servers varies from 5 to 13.
The power consumption of the servers in active state
and that in sleep state are set to 32.3 W [12], [21] and
10.008 W [19], [20], respectively. Additionally, the servers
in sleep state need 20 s to start-up [26].
The computing system receives 1000 packets/s, with
1500 bytes per packets, from the sensors. In order to
periodically vary the minimum acceptable internal delay of
these packets, Dint(t) is given by
Dint(t) =
sin(t/A)
B
+ C, (24)
where A denotes the weight factor for length of cycle, B is
the weight factor for range of acceptable internal delay, and
C denotes the average acceptable internal delay. Additionally,
we consider two functions of Dint(t) in order to evaluate
the performance with different ranges of acceptable internal
delay. In scenario 1, A, B and C are set to 8, 8, and 0.75. In this
case, the range of acceptable internal delay is small. On the
other hand, in scenario 2, A, B and C are set to 8, 5, and 0.75.
These settings can model a wider range of acceptable internal
delay. Fig. 5 demonstrates the change of minimum acceptable
delay in each scenario.
FIGURE 5. Change in minimum value of acceptable internal delay.
In order to verify the effectiveness of our proposal, we
compare it with the conventional schemes. As one of the
conventional schemes, we use a scheme that dynamically
controls the sleep scheduling but uses a constant degree,
referred to as dynamic sleep with constant degree (DSCD),
where the degree is set to 7. The other scheme, referred to
as constant sleep with constant degree (CSCD), consistently
uses a constant number of servers in sleep state and the
degree of servers in active state, where these values are
set to 10 and 7.
B. EVALUATING THE IMPROVEMENT
IN POWER CONSUMPTION
Fig. 6 demonstrates the changes in the power consumption
of the system for 100 seconds for different scenarios. First,
we discuss this result by using our proposal in scenario 1
as an example. Until 7 seconds, the system satisfies the
acceptable internal delay with the maximum number of
servers in sleep state (i.e., 40). It starts to increase the number
of servers in active state after 8 seconds, because it cannot
satisfy the acceptable internal delay after 28 seconds. The
number of servers in active state is set to the maximum
value at 17 seconds and this setting is kept until 37 seconds
to satisfy the minimum acceptable internal delay. Since
the acceptable internal delay constraint is relaxed after
37 seconds, the system starts to increase the number of servers
in sleep state to reduce system power consumption. As similar
to our proposal, DSCD dynamically controls the number of
servers in sleep state. Therefore, the power consumption of
our proposal and DSCD is altered depending on the value
of acceptable internal delay while the power consumption of
CSCD is constant.
In addition to the sleep control, our proposal decides the
adequate degree of the servers. Therefore, it can satisfy the
acceptable internal delay with the lower power consumption,
compared with DSCD, as shown in Fig. 6(a). On the other
hand, in the case of scenario 2, which indicates stricter envi-
ronment, our proposal consumes much more power compared
with scenario 1 while DSCD and CSCD achieve similar
1032 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
8. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
FIGURE 6. Change in system power consumption in different scenarios.
(a) Change in system power consumption in scenario 1. (b) Change in
system power consumption in scenario 2.
power consumption compared with scenario 1. However,
DSCD and CSCD are not capable of satisfying the acceptable
internal delay while our proposal succeeds to satisfy the
acceptable internal delay.
Fig. 7 shows the amount of system power consumption
for 100 seconds period. The amount of system power
consumption is calculated as the sum of the power
consumed at instant t from 0 to 100 seconds. As shown
in Fig. 7, our proposal can achieve the lowest system power
consumption in comparison with other approaches. Indeed, in
case of scenario 1, our proposal achieves approximately
13% and 10% reduction in system power consumption
compared to DSCD and CSCD, respectively. Although the
reduction ratio decreases in scenario 2, our proposal still
achieves lower system power consumption. Consequently, we
can confirm the effectiveness of our proposal in terms of
system power consumption.
C. EVALUATING THE IMPROVEMENT IN
DELAY SATISFACTION RATIO
The rest of this section demonstrates the delay satisfaction
ratio in the different scenarios. The delay satisfaction ratio
FIGURE 7. Performance comparison in terms of the amount of system
power consumption in the different scenarios.
FIGURE 8. Performance comparison in terms of the delay satisfaction
ratio in the different scenarios.
is expressed as Psatisfaction/Ptotal, where Psatisfaction is the
number of packets that are received within the acceptable
delay and Ptotal denotes the total number of packets. Since
the packet rate is set to 1000 packets/s, the value of Ptotal
is 105 packets. Fig. 8 shows the delay satisfaction ratio in
the different scenarios. From this result, it is clear that our
proposal can achieve the maximum ratio (i.e., 100%) in our
simulation environment. On the other hand, DSCD achieves
around 60% of satisfaction ratio in scenario 1 and the ratio
further decreases in scenario 2. From this phenomenon, we
can notice that the constant degree cannot satisfy the accept-
able delay and joint control of the sleep scheduling and the
degree of servers has great impact on the satisfaction ratio.
Therefore, we can conclude that our proposal is effective in
reducing the system power consumption while satisfying the
acceptable delay.
V. CONCLUSION
Towards the realization of smart factories based on wireless
sensor networks, in this paper, we investigated a novel
computing system and its operation scheme. Since
conventional computing systems lack the capabilities
VOLUME 3, 2015 1033
www.redpel.com+917620593389
www.redpel.com+917620593389
9. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
required for providing industrial IoT applications (i.e., high
processing and communication capability, high durability,
and low power consumption), we first introduced a
computing system based on wireless technology.
Additionally, we derived a mathematical model to evaluate
the performance of our envisioned system based on complex
network theory. This model showed the existence of a
trade-off relationship between power consumption and delay
required for data collection. Consequently, we proposed an
energy-efficient and delay-aware system operation scheme.
Our proposed scheme controls the sleep scheduling and
network connectivity to reduce the system power consump-
tion while satisfying an acceptable delay, which is decided
based on the requirement of industrial IoT applications.
Simulation results showed that by appropriately selecting the
number of servers in sleep state and the degree of servers in
active state, the proposal can improve both the system power
consumption and satisfaction ratio of delay compared to other
approaches.
REFERENCES
[1] S. Savazzi, V. Rampa, and U. Spagnolini, ‘‘Wireless cloud networks for the
factory of things: Connectivity modeling and layout design,’’ IEEE Internet
Things J., vol. 1, no. 2, pp. 180–195, Apr. 2014.
[2] E. Shellshear, R. Berlin, and J. S. Carlson, ‘‘Maximizing smart factory
systems by incrementally updating point clouds,’’ IEEE Comput. Graph.
Appl., vol. 35, no. 2, pp. 62–69, Mar./Apr. 2015.
[3] J. Pan, L. Cai, Y. T. Hou, Y. Shi, and S. X. Shen, ‘‘Optimal base-station
locations in two-tiered wireless sensor networks,’’ IEEE Trans. Mobile
Comput., vol. 4, no. 5, pp. 458–473, Sep./Oct. 2005.
[4] F. Wang, C. Xu, L. Song, and Z. Han, ‘‘Energy-efficient resource alloca-
tion for device-to-device underlay communication,’’ IEEE Trans. Wireless
Commun., vol. 14, no. 4, pp. 2082–2092, Apr. 2015.
[5] M. R. Palattella, N. Accettura, L. A. Grieco, G. Boggia, M. Dohler, and
T. Engel, ‘‘On optimal scheduling in duty-cycled industrial IoT appli-
cations using IEEE802.15.4e TSCH,’’ IEEE Sensors J., vol. 13, no. 10,
pp. 3655–3666, Oct. 2013.
[6] Accenture. (2014). Driving Unconventional Growth Through the
Industrial Internet of Things. [Online]. Available: http://www.accenture.
com/SiteCollectionDocuments/PDF/Accenture-Driving-Unconventional-
Growth-through-IIoT.pdf
[7] F. Salvadori et al., ‘‘Monitoring in industrial systems using wireless sensor
network with dynamic power management,’’ IEEE Trans. Instrum. Meas.,
vol. 58, no. 9, pp. 3104–3111, Sep. 2009.
[8] A. A. Kumar S., K. Øvsthus, and L. M. Kristensen, ‘‘An industrial per-
spective on wireless sensor networks—A survey of requirements, pro-
tocols, and challenges,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 3,
pp. 1391–1412, Aug. 2014.
[9] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ‘‘Fog computing and its role
in the Internet of Things,’’ in Proc. SIGCOMM, Helsinki, Finland, 2012,
pp. 13–16.
[10] K. Ahmed and M. Gregory, ‘‘Integrating wireless sensor networks
with cloud computing,’’ in Proc. 7th MSN, Beijing, China, 2011,
pp. 364–366.
[11] J.-Y. Shin, E. G. Sirer, H. Weatherspoon, and D. Kirovski, ‘‘On the feasi-
bility of completely wireless datacenters,’’ in Proc. 8th ACM/IEEE Symp.
Archit. Netw. Commun. Syst., New York, NY, USA, Oct. 2012, pp. 3–14.
[12] J.-Y. Shin, E. G. Sirer, H. Weatherspoon, and D. Kirovski, ‘‘On the feasibil-
ity of completely wirelesss datacenters,’’ IEEE/ACM Trans. Netw., vol. 21,
no. 5, pp. 1666–1679, Oct. 2013.
[13] K. Suto, H. Nishiyama, N. Kato, T. Nakachi, T. Sakano, and A. Takahara,
‘‘A failure-tolerant and spectrum-efficient wireless data center network
design for improving performance of big date mining,’’ in Proc. 81th VTC,
Glasgow, Scotland, May 2015, pp. 1–5.
[14] A. M. Niknejad, ‘‘Siliconization of 60 GHz,’’ IEEE Microw. Mag., vol. 11,
no. 1, pp. 78–85, Feb. 2010.
[15] S. Pinel et al., ‘‘60 GHz single-chip CMOS digital radios and phased
array solutions for gaming and connectivity,’’ IEEE J. Sel. Areas Commun.,
vol. 27, no. 8, pp. 1347–1357, Oct. 2009.
[16] Z. Guo and Y. Yang, ‘‘On nonblocking multicast fat-tree data center
networks with server redundancy,’’ IEEE Trans. Comput., vol. 64, no. 4,
pp. 1058–1073, Apr. 2014.
[17] Cisco. (2009). Cisco Catalyst 3750 Series Switches. [Online]. Available:
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-
series-switches/prod_qas09186a00801b0971.pdf
[18] K. Suto, H. Nishiyama, N. Kato, K. Mizutani, O. Akashi, and A. Takahara,
‘‘An overlay-based data mining architecture tolerant to physical net-
work disruptions,’’ IEEE Trans. Emerg. Topics Comput., vol. 2, no. 3,
pp. 292–301, Sep. 2014.
[19] V. K. M. Raj and R. Shriram, ‘‘A study on server sleep state transition to
reduce power consumption in a virtualized server cluster environment,’’
in Proc. 4th COMSNETS, Bengaluru, India, Jan. 2012, pp. 1–6.
[20] R. Matsuo, T. Tandai, T. Tomizawa, T. Adachi, and H. Kasami, ‘‘Energy-
efficient standby mode algorithm in short-range one-to-one millime-
ter wave communications,’’ in Proc. IEEE ICC, Ottawa, ON, Canada,
Jun. 2012, pp. 4033–4038.
[21] Y. Nakagawa et al., ‘‘A single-chip, 10-gigabit Ethernet switch LSI for
energy-efficient blade servers,’’ in Proc. GreenCom, Hangzhou, China,
Dec. 2010, pp. 401–411.
[22] N. Bisnik, A. Abouzeid, and V. Isler, ‘‘Stochastic event capture using
mobile sensors subject to a quality metric,’’ in Proc. ACM MobiCom,
Los Angeles, CA, USA, Sep. 2006, pp. 98–109.
[23] S. He, J. Chen, D. K. Y. Yau, H. Shao, and Y. Sun, ‘‘Energy-efficient cap-
ture of stochastic events under periodic network coverage and coordinated
sleep,’’ IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1090–1102,
Jun. 2012.
[24] M. Dong, K. Ota, A. Liu, and M. Guo, ‘‘Joint optimization of lifetime
and transport delay under reliability constraint wireless sensor networks,’’
IEEE Trans. Parallel Distrib. Syst., vol. PP, no. 99, pp. 1–11, Jan. 2015.
[25] M. Dong, K. Ota, X. Li, X. Shen, S. Guo, and M. Guo, ‘‘HARVEST:
A task-objective efficient data collection scheme in wireless sensor
and actor networks,’’ in Proc. 3rd CMC, Qingdao, China, Apr. 2011,
pp. 485–488.
[26] A. Gandhi, M. Harchol-Balter, and M. A. Kozuch, ‘‘Are sleep states
effective in data centers?’’ in Proc. IGCC, San Jose, CA, USA, Jun. 2012,
pp. 1–10.
[27] M. Ohira, A. Miura, and M. Ueba, ‘‘60-GHz wideband substrate-
integrated-waveguide slot array using closely spaced elements for pla-
nar multisector antenna,’’ IEEE Trans. Antennas Propag., vol. 58, no. 3,
pp. 993–998, Mar. 2010.
KATSUYA SUTO (S’12) received the M.S. degree
in information science from the Graduate School
of Information Sciences, Tohoku University,
Japan, in 2013, where he is currently pursu-
ing the Ph.D. degree. His research interests are
in the areas of big data mining architecture,
resilient network design, and wireless networking.
He is a Student Member of the Institute of
Electronics, Information and Communication
Engineers (IEICE). He was a recipient of the
prestigious Deans Award from Tohoku University in 2013. He received
the best paper award at the IEEE 79th Vehicular Technology Conference
(2013-Spring), the IEEE VTS Japan 2015 Young Researcher’s Encourage-
ment Award, and the IEICE Academic Encouragement Award (2014).
1034 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
10. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
HIROKI NISHIYAMA (SM’13) received the
M.S. and Ph.D. degrees in information science
from Tohoku University, Japan, in 2007 and 2008,
respectively. He is currently an Associate
Professor with the Graduate School of Infor-
mation Sciences, Tohoku University. One of his
outstanding achievements is Relay-by-Smartphone,
which makes it possible to share information
among many people using only WiFi func-
tionality of smartphones. He has authored over
140 peer-reviewed papers, including many high quality publications in
prestigious IEEE journals and conferences. His research interests cover a
wide range of areas, including satellite communications, unmanned aircraft
system networks, wireless and mobile networks, ad hoc and sensor
networks, green networking, and network security. He is a member of the
Institute of Electronics, Information and Communication Engineers (IEICE).
He received best paper awards from many international conferences, includ-
ing the IEEE’s flagship events, such as the IEEE Global Communications
Conference in 2010, 2013, and 2014, and the IEEE Wireless Communica-
tions and Networking Conference in 2012 and 2014. He was a recipient of
the Special Award of the 29th Advanced Technology Award for Creativity
in 2015, the IEEE Communications Society Asia-Pacific Board Outstanding
Young Researcher Award in 2013, the IEICE Communications Society
Academic Encouragement Award in 2011, and the FUNAI Foundation’s
Research Incentive Award for Information Technology in 2009. He serves as
the Co-Chair of the Cognitive Radio and Networks Symposium of the IEEE
International Conference on Communications (ICC) in 2015. He served
as the Co-Chair of the Selected Areas in Communications Symposium
of the IEEE ICC’14, an Associate Editor of the IEEE TRANSACTIONS ON
VEHICULAR TECHNOLOGY and the Springer Journal of Peer-to-Peer Networking
and Applications, and the Secretary of the IEEE ComSoc Sendai Chapter.
NEI KATO (F’13) received the bachelor’s degree
from Polytechnic University, Japan, in 1986,
and the M.S. and Ph.D. degrees in information
engineering from Tohoku University, in
1988 and 1991, respectively. He joined the
Computer Center, Tohoku University, as an
Assistant Professor, in 1991, where he was pro-
moted to Full Professor with the Graduate School
of Information Sciences in 2003. He became a
Strategic Adviser to the President of Tohoku Uni-
versity in 2013. He has been involved in research on computer networking,
wireless mobile communications, satellite communications, ad hoc & sensor
& mesh networks, smart grid, and pattern recognition. He has authored over
300 papers in peer-reviewed journals and conference proceedings. He is
a fellow of the Institute of Electronics, Information and Communication
Engineers (IEICE). He received several awards, including the Minoru
Ishida Foundation Research Encouragement Prize (2003), the Distinguished
Contributions to Satellite Communications Award from the IEEE ComSoc
of the Satellite and Space Communications Technical Committee (2005),
the FUNAI Information Science Award (2007), the TELCOM System
Technology Award from the Foundation for Electrical Communications
Diffusion (2008), the IEICE Network System Research Award (2009),
the IEICE Satellite Communications Research Award (2011), the KDDI
Foundation Excellent Research Award (2012), the IEICE Communications
Society Distinguished Service Award (2012), the Distinguished Contribu-
tions to Disaster-Resilient Networks Research and Development Award from
the Ministry of Internal Affairs and Communications, Japan, six best paper
awards from the IEEE GLOBECOM/WCNC/VTC, and the IEICE
Communications Society Best Paper Award (2012). He serves as the
Member-at-Large on the Board of Governors of the IEEE Communications
Society, the Chair of the IEEE Ad Hoc & Sensor Networks Technical
Committee, the Chair of the IEEE ComSoc Sendai Chapter, the Associate
Editor-in-Chief of the IEEE INTERNET OF THINGS JOURNAL, an Area Editor
of the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, and an Editor of
the IEEE Wireless Communications Magazine and the IEEE Network
Magazine. He served as the Chair of the IEEE ComSoc Satellite and
Space Communications Technical Committee (2010–2012), the Chair of
the IEICE Satellite Communications Technical Committee (2011–2012), a
Guest-Editor of many IEEE transactions/journals/magazines, the Sympo-
sium Co-Chair of GLOBECOM’07, GLOBECOM’12, ICC’10, ICC’11, and
ICC’12, the Vice Chair of the IEEE WCNC’10, WCNC’11, ChinaCom’08,
and ChinaCom’09, the TPC Vice Chair of ICC’14, and the Workshop
Co-Chair of VTC’10. Besides his academic activities, he also serves on
the Expert Committee of the Telecommunications Council and the Ministry
of Internal Affairs and Communications, and serves as the Chairperson of
ITU-R SG4 and SG7, Japan. He is a Distinguished Lecturer of the IEEE
Communications Society and the IEEE Vehicular Technology Society, and
a Co-PI of the A3 Foresight Program supported by the Japan Society for the
Promotion of Sciences, the NSFC of China, and the NRF of Korea.
CHIH-WEI HUANG received the B.S. degree
from National Taiwan University, Taipei, in 2001,
the M.S. degree from Columbia University,
New York, in 2004, and the Ph.D. degree from the
University of Washington, Seattle, in 2009, all in
electrical engineering. He joined the Department
of Communication Engineering, National Central
University, Taoyuan, Taiwan, in 2010, where he is
currently an Assistant Professor with the Informa-
tion Processing and Communications Laboratory.
From 2006 to 2009, he was an Intern Researcher with Siemens Corporate
Research and Microsoft Research. He has authored papers in a broad range
of areas, including wireless networking, multimedia communications, digital
signal processing, and information retrieval.
VOLUME 3, 2015 1035
www.redpel.com+917620593389
www.redpel.com+917620593389