In this paper, a centralized approach for multi nodes localization is introduced. This approach is based on using a beacon fixed at the lower middle edge of the environment. This beacon is provided with a distance sensor and can scan the environment to measure the distance between the detecting node and the beacon. Also, remote control is fixed on the beacon to distinguish the identity of the detecting node. Two nodes are used in this approach, each node contains eight cells, and each cell has a 5 mm infrared (IR) transmitter and TSOP4P38 IR receiver. If any one of the IR receivers has received the beacon ID, the transmitter which belongs to the same cell will respond by sending the node ID to the beacon. The beacon measurements and the information received from the detected nodes are then used to estimate the location and orientation of the visible nodes and the results will be saved in the main computer. Several experimental results have been tested with different distances from the nodes to the beacon. Also, different rotation angles at the beacon have been experienced to analyze the performance of the introduced approach.
This document discusses constrained passive tracking using wireless sensor networks. It begins with an introduction to wireless sensor networks and target tracking. It then describes the proposed system for passive tracking using a wireless sensor network. The system includes initializing the network, forming clusters using K-medoids clustering, creating an object to track, determining the sensor node nearest to the object, gathering information from sensors to the base station, and analyzing the results. It discusses the K-medoids clustering and Kalman filtering algorithms used for clustering and tracking, respectively. The document provides an example of applying the K-medoids algorithm to cluster a sample dataset.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
Smart parking is common in contemporary cities. These smart parking lots are outfitted mostly with wireless sensor networks (WSNs), which are used to detect, monitor, and collect data on the availability status of all existing parking spaces in a given area. Sensors make up WSN, which may gather, process, and transmit informations to the sink. However, the power and
communication limitations of the sensors have an effect on the performance and quality of the WSNs. The decrease in the battery and the energy of the
nodes causes a decrease in the life of the nodes and also of the entire WSN network. In this article, we present a routing protocol that implements an
efficient and robust algorithm allowing the creation of clusters so that the base station can receive data from the entire WSN network. This protocol
adopts a reliable and efficient algorithm allowing to minimize the energy dissipation of the sensors and to increase the lifetime of the WSN. In
comparison to alternative parking lot management protocols already in use,
the simulation results of the proposed protocol are effective and robust in terms of power consumption, data transmission reliability, and WSN network longevity.
Design of a Wireless Sensor Network from an Energy Management Perspective?? ?
This document describes the design of a wireless sensor network for monitoring temperature in vineyards from an energy management perspective. The network uses IRIS motes connected to an MDA 300 data acquisition board with 4 temperature sensors. The goal was to maximize battery lifespan by implementing energy management strategies at the hardware, operating system, and application layers. Testing showed the battery lifespan was shorter than estimated, likely due to additional energy use from communication and other operations beyond the theoretical calculations. Overall, the document outlines the system design and implementation of energy saving techniques at multiple layers of the sensor network.
This document provides an overview of wireless sensor network software architecture. It discusses the key components of WSNs including sensing units, processing units, power suppliers, and communication devices. It then examines various topics related to WSN software architecture, including network topologies, the IEEE 1451 standard for smart sensors, software architecture components like operating systems and middleware, services in sensor networks, and research challenges around security. The goal is to provide a reliable software architecture for WSNs to enable better performance and functionality.
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
The document summarizes research on improving network lifetime in wireless sensor networks through techniques like multiple sink positioning and relocation. It first provides background on wireless sensor networks and their components. It then discusses how clustering sensor nodes and using multiple mobile sink nodes can help balance energy load and prolong network lifetime. Several existing studies that propose algorithms and schemes for optimally positioning and moving sink nodes are reviewed. The document concludes by introducing two new coordinated multiple mobile sink algorithms, MSMA and PMA, that aim to further improve network lifetime performance.
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
Wireless sensor networks are an innovative and rapidly advanced network occupying the broad spectrum of wireless networks. It works on the principle of “use with less expense, effort and with more comfort.” In these networks, routing provides efficient and effective data transmission between different sources to access points using the clustering technique. This work addresses the low-energy adaptive clustering hierarchy (LEACH) protocol’s main backdrop of choosing head nodes based on a random value. In this, the soft computing methods are used, namely the fuzzy approach, to overcome this barrier in LEACH. Our approach’s primary goal is to extend the network lifetime with efficient energy consumption and by choosing the appropriate head node in each cluster based on the fuzzy parameters. The proposed clustering algorithm focused on two fuzzy inference structures, namely Mamdani and Sugeno fuzzy logic models in two scenarios, respectively. We compared our approach with four existing works, the conventional LEACH, LEACH using the fuzzy method, multicriteria cluster head delegation, and fuzzy-based energy efficient clustering approach (FEECA) in wireless sensor network. The proposed scenario based fuzzy LEACH protocol approaches are better than the four existing methods regarding stability, network survivability, and energy consumption.
The document discusses wireless sensor networks (WSNs). It describes WSNs as consisting of distributed sensors that monitor conditions like temperature, sound, and pressure and transmit data to a central location. Modern networks are bidirectional, enabling sensor control. WSNs were initially developed for military surveillance but are now used in industrial and consumer applications. They pose challenges in deployment, location tracking, coverage, and integration of different sensor types on a single platform. Advances in energy harvesting and self-organizing networks could enable millions of low-cost sensor nodes. WSNs have applications in intrusion detection, health monitoring, and location detection.
This document discusses constrained passive tracking using wireless sensor networks. It begins with an introduction to wireless sensor networks and target tracking. It then describes the proposed system for passive tracking using a wireless sensor network. The system includes initializing the network, forming clusters using K-medoids clustering, creating an object to track, determining the sensor node nearest to the object, gathering information from sensors to the base station, and analyzing the results. It discusses the K-medoids clustering and Kalman filtering algorithms used for clustering and tracking, respectively. The document provides an example of applying the K-medoids algorithm to cluster a sample dataset.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
Smart parking is common in contemporary cities. These smart parking lots are outfitted mostly with wireless sensor networks (WSNs), which are used to detect, monitor, and collect data on the availability status of all existing parking spaces in a given area. Sensors make up WSN, which may gather, process, and transmit informations to the sink. However, the power and
communication limitations of the sensors have an effect on the performance and quality of the WSNs. The decrease in the battery and the energy of the
nodes causes a decrease in the life of the nodes and also of the entire WSN network. In this article, we present a routing protocol that implements an
efficient and robust algorithm allowing the creation of clusters so that the base station can receive data from the entire WSN network. This protocol
adopts a reliable and efficient algorithm allowing to minimize the energy dissipation of the sensors and to increase the lifetime of the WSN. In
comparison to alternative parking lot management protocols already in use,
the simulation results of the proposed protocol are effective and robust in terms of power consumption, data transmission reliability, and WSN network longevity.
Design of a Wireless Sensor Network from an Energy Management Perspective?? ?
This document describes the design of a wireless sensor network for monitoring temperature in vineyards from an energy management perspective. The network uses IRIS motes connected to an MDA 300 data acquisition board with 4 temperature sensors. The goal was to maximize battery lifespan by implementing energy management strategies at the hardware, operating system, and application layers. Testing showed the battery lifespan was shorter than estimated, likely due to additional energy use from communication and other operations beyond the theoretical calculations. Overall, the document outlines the system design and implementation of energy saving techniques at multiple layers of the sensor network.
This document provides an overview of wireless sensor network software architecture. It discusses the key components of WSNs including sensing units, processing units, power suppliers, and communication devices. It then examines various topics related to WSN software architecture, including network topologies, the IEEE 1451 standard for smart sensors, software architecture components like operating systems and middleware, services in sensor networks, and research challenges around security. The goal is to provide a reliable software architecture for WSNs to enable better performance and functionality.
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
The document summarizes research on improving network lifetime in wireless sensor networks through techniques like multiple sink positioning and relocation. It first provides background on wireless sensor networks and their components. It then discusses how clustering sensor nodes and using multiple mobile sink nodes can help balance energy load and prolong network lifetime. Several existing studies that propose algorithms and schemes for optimally positioning and moving sink nodes are reviewed. The document concludes by introducing two new coordinated multiple mobile sink algorithms, MSMA and PMA, that aim to further improve network lifetime performance.
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
Wireless sensor networks are an innovative and rapidly advanced network occupying the broad spectrum of wireless networks. It works on the principle of “use with less expense, effort and with more comfort.” In these networks, routing provides efficient and effective data transmission between different sources to access points using the clustering technique. This work addresses the low-energy adaptive clustering hierarchy (LEACH) protocol’s main backdrop of choosing head nodes based on a random value. In this, the soft computing methods are used, namely the fuzzy approach, to overcome this barrier in LEACH. Our approach’s primary goal is to extend the network lifetime with efficient energy consumption and by choosing the appropriate head node in each cluster based on the fuzzy parameters. The proposed clustering algorithm focused on two fuzzy inference structures, namely Mamdani and Sugeno fuzzy logic models in two scenarios, respectively. We compared our approach with four existing works, the conventional LEACH, LEACH using the fuzzy method, multicriteria cluster head delegation, and fuzzy-based energy efficient clustering approach (FEECA) in wireless sensor network. The proposed scenario based fuzzy LEACH protocol approaches are better than the four existing methods regarding stability, network survivability, and energy consumption.
The document discusses wireless sensor networks (WSNs). It describes WSNs as consisting of distributed sensors that monitor conditions like temperature, sound, and pressure and transmit data to a central location. Modern networks are bidirectional, enabling sensor control. WSNs were initially developed for military surveillance but are now used in industrial and consumer applications. They pose challenges in deployment, location tracking, coverage, and integration of different sensor types on a single platform. Advances in energy harvesting and self-organizing networks could enable millions of low-cost sensor nodes. WSNs have applications in intrusion detection, health monitoring, and location detection.
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
This document describes a study that developed an adaptive monitoring and localization system for faulty nodes in a wireless sensor network. Sensor nodes were deployed to monitor temperature and carbon monoxide levels. An algorithm was created to detect faulty nodes based on a received signal strength threshold of -100 dBm. When a node fell below this threshold, its address was checked against a database to locate the faulty node. The results showed the sensor nodes could capture a temperature range of 25-51°C and carbon monoxide levels of 0.01-30 g/m3. When comparing transmitted and received data, a 93.25% correlation validated data integrity. An artificial neural network and logistic regression model were also developed to route data transmission between nodes in the
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
This document summarizes a study that developed an adaptive monitoring system using a wireless sensor network to detect faulty nodes. Sensor nodes were deployed to monitor temperature and carbon monoxide levels in an indoor environment. An algorithm was developed to detect faulty nodes based on a received signal strength threshold of -100 dBm. Data transmitted from the sensor nodes was visualized using a C-sharp interface. The results showed the sensor nodes could capture a temperature range of 25-51°C and carbon monoxide levels of 0.01-30 g/m3. Comparing data at the source and destination showed a 93.25% correlation, validating the integrity of the data received.
This document summarizes a research paper that proposes a new cuboid-based localization algorithm for wireless sensor networks. The algorithm aims to minimize localization error and decrease energy consumption by shifting complexity to anchor nodes that have GPS. It works by having anchor nodes broadcast their locations to form triangles around unknown nodes. Distances from unknown nodes to anchors are estimated using RSSI. The algorithm is simulated in a 3D space and shows decreasing localization error as the number of anchor nodes increases, achieving an error of under 1.6m. The paper aims to improve over existing localization methods that have issues like multipath interference affecting RSSI-based techniques.
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
This document proposes a structureless and efficient data aggregation technique for wireless sensor networks that ensures data integrity with low transmission overhead. It introduces a concept where the base station can recover individual sensor data even after aggregation by cluster heads. This allows the base station to verify data integrity and authenticity, as well as perform any desired aggregation functions. It then proposes a structure-free scheme using intracluster and intercluster encryption and aggregation procedures. This scheme aims to address limitations of previous work such as high transmission costs and inability to query individual data values, while maintaining security and scalability. The document analyzes security and scalability aspects and argues the proposed scheme offers improved performance and efficiency for data aggregation in wireless sensor networks.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
This document summarizes a research paper that proposes an enhancement to the Improved Balanced LEACH (IB-LEACH) routing protocol for heterogeneous wireless sensor networks. The proposed enhancement stores residual energy from each routing round in an "energy bank" to increase network lifetime. It also enhances the ACTIVE_ROUTE_TIMEOUT parameter in the underlying AODV routing protocol. Simulation results using MATLAB show the proposed approach improves network lifetime compared to previous methods. The document provides background on wireless sensor networks, routing protocols, LEACH clustering, and IB-LEACH before detailing the proposed enhancement and simulation results.
WSN nodes power consumption using multihop routing protocol for illegal cutti...TELKOMNIKA JOURNAL
The need for an automation system from a remote area cannot be separated from the role of the wireless sensor network. However, the battery consumption is still a problem that influences the lifetime of the system. This research focused on studying how to characterize the power consumption on each sensor node using multihop routing protocol in the illegal logging field, to get the prediction lifetime of the network. The system is designed by using six sensor nodes in a master-slave connection and implemented in a tree topology. Each sensor node is consisting of a sound sensor, vibration sensor, Xbee communication, current and voltage sensor, and Arduino nano. The system is tested using battery 10050 mAH with several scenarios to have calculated how long the battery lifetime can be predicted. The results stated that the master node on the network depleted the power of the battery faster than the slave node since the more slaves connected to the master, the more energy the battery consumes.
This document discusses energy efficiency in wireless sensor networks. It begins by introducing wireless sensor networks and some of their key applications. It then discusses several clustering-based energy efficiency protocols, including LEACH, HEED, TEEN, and EBC. These protocols aim to reduce energy consumption by organizing sensor nodes into clusters, with cluster heads responsible for aggregating and transmitting data from cluster members. The document also reviews related work on clustering algorithms and energy efficiency in wireless sensor networks. It discusses the goals of maximizing network lifetime while minimizing energy consumption.
This document summarizes a study on existing wireless sensor networks that can be used for structural health monitoring. It discusses three main wireless sensor network platforms: Sensor Andrew Architecture, a structural health monitoring system using smart sensors, and Snowfort, a new wireless sensor network platform designed for infrastructure monitoring. The document outlines the key components, advantages, and limitations of each wireless sensor network platform for structural health monitoring applications.
Comparison of Health Care System ArchitecturesIJEACS
Body area sensor network is an important
technology which is suitable for monitoring the patient’s health
and real time diagnosing the diseases. The body area network
includes the sensors which can be spread over the body or the
wearable cloth and a coordinator node which can be a mobile
or a tablet or a PDA, which receives the signal of a person’s
sensors. In the new architecture the coordinator node sends the
information to the central data server via internet or GPRS or
MANET. The central data server is responsible for saving and
analyzing and representing the received data in the text and
graphical mode and sending SMS to the patient’s family or the
nearest ambulance or physician, or the operator can call them.
The received information is analyzed by the data mining tools.
The necessary information will be sent to the physician’s
computer. Every patient has a GPS, and it is supposed that the
encryption is used for transferring information. In this paper
the new architecture is compared with the traditional one
which includes the base station and relay nodes. It is shown
that the new architecture has less delay than the traditional
one.
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
Wireless sensor network has proven its significance in almost every field in today’s era. Wireless sensor network consists of large number of sensor nodes distributed randomly in some areas. In WSN the main objective has been increasing the network lifetime. There is zone divisional approach which has shown sound improvement in increasing the network lifetime over the Leach and EEUC protocols. The proposed protocol Energy efficient zone divided and energy balanced clustering routing protocol (EEZECR) has not only much higher network lifetime as compare to ZECR and it also has much better load balancing in the network. In the EEZECR the concept of double cluster head in a cluster is introduced which reduces the load on cluster head and very efficiently does the task of load balancing in the network thoroughly which makes this protocol favorite for many real time applications. Simulations are performed in MATLAB.
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
Wireless sensor network has proven its significance in almost every field in today’s era. Wireless sensor network consists of large number of sensor nodes distributed randomly in some areas. In WSN the main objective has been increasing the network lifetime. There is zone divisional approach which has shown sound improvement in increasing the network lifetime over the Leach and EEUC protocols. The proposed protocol Energy efficient zone divided and energy balanced clustering routing protocol (EEZECR) has not only much higher network lifetime as compare to ZECR and it also has much better load balancing in the network. In the EEZECR the concept of double cluster head in a cluster is introduced which reduces the load on cluster head and very efficiently does the task of load balancing in the network thoroughly which
makes this protocol favorite for many real time applications. Simulations are performed in MATLAB.
Energy Consumption in chain based routing protocol in wireless sensor networkBADALKUMAR56
This document is a project report submitted for the degree of Bachelor of Technology in Computer Science and Engineering. It discusses measuring the power of a chain-based routing protocol called PEGASIS in wireless sensor networks. PEGASIS aims to increase network lifetime by forming chains among sensor nodes so that each node communicates only with a close neighbor, thereby reducing the amount of energy spent per round. The objectives are to decrease end-to-end delay, increase average energy consumption, and increase the number of alive nodes. The report presents the problem definition, objectives, proposed PEGASIS protocol, methodology using NS2 simulation, results showing improved performance, and conclusions.
Energy efficient routing algorithm in wireless sensor networksAlexander Decker
This document presents a new routing algorithm called SMA (solar aware routing with mobile agent concept) for wireless sensor networks that aims to improve energy efficiency. The SMA algorithm has two phases: a set-up phase where the sink node calculates the shortest paths from sensor nodes to solar-powered auxiliary sink nodes; and a steady state phase where mobile agents circulate along the determined paths to gather data from sensor nodes and send it to the sink node via the solar nodes. The document evaluates SMA through simulations and finds it outperforms existing client-server and mobile agent approaches in terms of energy consumption, end-to-end delay, and overall cost.
1) The document proposes implementing an efficient K-means clustering algorithm to enhance connectivity and lifetime in wireless sensor networks.
2) It compares the proposed K-means algorithm to an existing Jumper Firefly algorithm based on energy consumption, network lifetime, and end-to-end delay.
3) Simulation results show the proposed K-means algorithm improves performance by reducing energy consumption from 16 to 12 Joules, increasing network lifetime by 96% compared to 83% for the existing algorithm, and lowering end-to-end delay from 3.7 to 2.7 seconds.
This document summarizes a research paper on medium access control (MAC) protocols for wireless sensor networks. It discusses how MAC protocols are needed to manage shared access to communication channels in wireless sensor networks and outlines some key characteristics and requirements for efficient MAC protocols, including energy efficiency, scalability, and supporting variable traffic loads. It then reviews some traditional MAC protocols, including time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA). The full paper provides a more in-depth survey and comparison of schedule-based and contention-based MAC protocols designed specifically for wireless sensor networks.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB.
This document describes an Internet of Things (IoT) based asset tracking system. It discusses the need for asset tracking in hospitals to improve safety and security. The proposed system uses Radio Frequency Identification (RFID) tags attached to assets to track their location in real-time using a GPS module. An Arduino microcontroller, ESP8266 WiFi module, encoder, decoder and rectifier are used to build the tracking device. A simulation of the system showed it could accurately display the coordinates of tagged assets. The system aims to develop a web and mobile application for easy monitoring of hospital equipment to improve operational efficiency.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Design and implementation of a centralized approach for multi-node localizatio
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
This document describes a study that developed an adaptive monitoring and localization system for faulty nodes in a wireless sensor network. Sensor nodes were deployed to monitor temperature and carbon monoxide levels. An algorithm was created to detect faulty nodes based on a received signal strength threshold of -100 dBm. When a node fell below this threshold, its address was checked against a database to locate the faulty node. The results showed the sensor nodes could capture a temperature range of 25-51°C and carbon monoxide levels of 0.01-30 g/m3. When comparing transmitted and received data, a 93.25% correlation validated data integrity. An artificial neural network and logistic regression model were also developed to route data transmission between nodes in the
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
This document summarizes a study that developed an adaptive monitoring system using a wireless sensor network to detect faulty nodes. Sensor nodes were deployed to monitor temperature and carbon monoxide levels in an indoor environment. An algorithm was developed to detect faulty nodes based on a received signal strength threshold of -100 dBm. Data transmitted from the sensor nodes was visualized using a C-sharp interface. The results showed the sensor nodes could capture a temperature range of 25-51°C and carbon monoxide levels of 0.01-30 g/m3. Comparing data at the source and destination showed a 93.25% correlation, validating the integrity of the data received.
This document summarizes a research paper that proposes a new cuboid-based localization algorithm for wireless sensor networks. The algorithm aims to minimize localization error and decrease energy consumption by shifting complexity to anchor nodes that have GPS. It works by having anchor nodes broadcast their locations to form triangles around unknown nodes. Distances from unknown nodes to anchors are estimated using RSSI. The algorithm is simulated in a 3D space and shows decreasing localization error as the number of anchor nodes increases, achieving an error of under 1.6m. The paper aims to improve over existing localization methods that have issues like multipath interference affecting RSSI-based techniques.
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
This document proposes a structureless and efficient data aggregation technique for wireless sensor networks that ensures data integrity with low transmission overhead. It introduces a concept where the base station can recover individual sensor data even after aggregation by cluster heads. This allows the base station to verify data integrity and authenticity, as well as perform any desired aggregation functions. It then proposes a structure-free scheme using intracluster and intercluster encryption and aggregation procedures. This scheme aims to address limitations of previous work such as high transmission costs and inability to query individual data values, while maintaining security and scalability. The document analyzes security and scalability aspects and argues the proposed scheme offers improved performance and efficiency for data aggregation in wireless sensor networks.
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
Data transmission occurs from transmitting node to sink node, which communicate each other via large number of intermediate nodes or directly to an external base station. A network consists of numbers of nodes with one as a source and one or more as a destination node.
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
This document summarizes a research paper that proposes an enhancement to the Improved Balanced LEACH (IB-LEACH) routing protocol for heterogeneous wireless sensor networks. The proposed enhancement stores residual energy from each routing round in an "energy bank" to increase network lifetime. It also enhances the ACTIVE_ROUTE_TIMEOUT parameter in the underlying AODV routing protocol. Simulation results using MATLAB show the proposed approach improves network lifetime compared to previous methods. The document provides background on wireless sensor networks, routing protocols, LEACH clustering, and IB-LEACH before detailing the proposed enhancement and simulation results.
WSN nodes power consumption using multihop routing protocol for illegal cutti...TELKOMNIKA JOURNAL
The need for an automation system from a remote area cannot be separated from the role of the wireless sensor network. However, the battery consumption is still a problem that influences the lifetime of the system. This research focused on studying how to characterize the power consumption on each sensor node using multihop routing protocol in the illegal logging field, to get the prediction lifetime of the network. The system is designed by using six sensor nodes in a master-slave connection and implemented in a tree topology. Each sensor node is consisting of a sound sensor, vibration sensor, Xbee communication, current and voltage sensor, and Arduino nano. The system is tested using battery 10050 mAH with several scenarios to have calculated how long the battery lifetime can be predicted. The results stated that the master node on the network depleted the power of the battery faster than the slave node since the more slaves connected to the master, the more energy the battery consumes.
This document discusses energy efficiency in wireless sensor networks. It begins by introducing wireless sensor networks and some of their key applications. It then discusses several clustering-based energy efficiency protocols, including LEACH, HEED, TEEN, and EBC. These protocols aim to reduce energy consumption by organizing sensor nodes into clusters, with cluster heads responsible for aggregating and transmitting data from cluster members. The document also reviews related work on clustering algorithms and energy efficiency in wireless sensor networks. It discusses the goals of maximizing network lifetime while minimizing energy consumption.
This document summarizes a study on existing wireless sensor networks that can be used for structural health monitoring. It discusses three main wireless sensor network platforms: Sensor Andrew Architecture, a structural health monitoring system using smart sensors, and Snowfort, a new wireless sensor network platform designed for infrastructure monitoring. The document outlines the key components, advantages, and limitations of each wireless sensor network platform for structural health monitoring applications.
Comparison of Health Care System ArchitecturesIJEACS
Body area sensor network is an important
technology which is suitable for monitoring the patient’s health
and real time diagnosing the diseases. The body area network
includes the sensors which can be spread over the body or the
wearable cloth and a coordinator node which can be a mobile
or a tablet or a PDA, which receives the signal of a person’s
sensors. In the new architecture the coordinator node sends the
information to the central data server via internet or GPRS or
MANET. The central data server is responsible for saving and
analyzing and representing the received data in the text and
graphical mode and sending SMS to the patient’s family or the
nearest ambulance or physician, or the operator can call them.
The received information is analyzed by the data mining tools.
The necessary information will be sent to the physician’s
computer. Every patient has a GPS, and it is supposed that the
encryption is used for transferring information. In this paper
the new architecture is compared with the traditional one
which includes the base station and relay nodes. It is shown
that the new architecture has less delay than the traditional
one.
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
Wireless sensor network has proven its significance in almost every field in today’s era. Wireless sensor network consists of large number of sensor nodes distributed randomly in some areas. In WSN the main objective has been increasing the network lifetime. There is zone divisional approach which has shown sound improvement in increasing the network lifetime over the Leach and EEUC protocols. The proposed protocol Energy efficient zone divided and energy balanced clustering routing protocol (EEZECR) has not only much higher network lifetime as compare to ZECR and it also has much better load balancing in the network. In the EEZECR the concept of double cluster head in a cluster is introduced which reduces the load on cluster head and very efficiently does the task of load balancing in the network thoroughly which makes this protocol favorite for many real time applications. Simulations are performed in MATLAB.
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
Wireless sensor network has proven its significance in almost every field in today’s era. Wireless sensor network consists of large number of sensor nodes distributed randomly in some areas. In WSN the main objective has been increasing the network lifetime. There is zone divisional approach which has shown sound improvement in increasing the network lifetime over the Leach and EEUC protocols. The proposed protocol Energy efficient zone divided and energy balanced clustering routing protocol (EEZECR) has not only much higher network lifetime as compare to ZECR and it also has much better load balancing in the network. In the EEZECR the concept of double cluster head in a cluster is introduced which reduces the load on cluster head and very efficiently does the task of load balancing in the network thoroughly which
makes this protocol favorite for many real time applications. Simulations are performed in MATLAB.
Energy Consumption in chain based routing protocol in wireless sensor networkBADALKUMAR56
This document is a project report submitted for the degree of Bachelor of Technology in Computer Science and Engineering. It discusses measuring the power of a chain-based routing protocol called PEGASIS in wireless sensor networks. PEGASIS aims to increase network lifetime by forming chains among sensor nodes so that each node communicates only with a close neighbor, thereby reducing the amount of energy spent per round. The objectives are to decrease end-to-end delay, increase average energy consumption, and increase the number of alive nodes. The report presents the problem definition, objectives, proposed PEGASIS protocol, methodology using NS2 simulation, results showing improved performance, and conclusions.
Energy efficient routing algorithm in wireless sensor networksAlexander Decker
This document presents a new routing algorithm called SMA (solar aware routing with mobile agent concept) for wireless sensor networks that aims to improve energy efficiency. The SMA algorithm has two phases: a set-up phase where the sink node calculates the shortest paths from sensor nodes to solar-powered auxiliary sink nodes; and a steady state phase where mobile agents circulate along the determined paths to gather data from sensor nodes and send it to the sink node via the solar nodes. The document evaluates SMA through simulations and finds it outperforms existing client-server and mobile agent approaches in terms of energy consumption, end-to-end delay, and overall cost.
1) The document proposes implementing an efficient K-means clustering algorithm to enhance connectivity and lifetime in wireless sensor networks.
2) It compares the proposed K-means algorithm to an existing Jumper Firefly algorithm based on energy consumption, network lifetime, and end-to-end delay.
3) Simulation results show the proposed K-means algorithm improves performance by reducing energy consumption from 16 to 12 Joules, increasing network lifetime by 96% compared to 83% for the existing algorithm, and lowering end-to-end delay from 3.7 to 2.7 seconds.
This document summarizes a research paper on medium access control (MAC) protocols for wireless sensor networks. It discusses how MAC protocols are needed to manage shared access to communication channels in wireless sensor networks and outlines some key characteristics and requirements for efficient MAC protocols, including energy efficiency, scalability, and supporting variable traffic loads. It then reviews some traditional MAC protocols, including time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA). The full paper provides a more in-depth survey and comparison of schedule-based and contention-based MAC protocols designed specifically for wireless sensor networks.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. In a Wireless Sensor Network (WSN), nodes are scattered densely in a large area. Sensor nodes can communicate with the sink node directly or through other nodes. Data transmission is the major issue in WSN. Each node has limited energy which is used in transmitting and receiving the data. Various routing protocols have been proposed to save the energy during the transmission of data. data centric approach based routing protocol which efficiently propagates information between sensor nodes in an energy constrained mode. This paper proposes a data centric routing Using evolutionary apporoach in WSN.The main objective of this protocol with evolutionary apporoach is to use artificial intelligence, to reduce the energy consumption by the nodes in transmitting and receiving the data. Implementation of Basic SEP, intelligence cluster routing and proposed protocols will be done using MATLAB.
This document describes an Internet of Things (IoT) based asset tracking system. It discusses the need for asset tracking in hospitals to improve safety and security. The proposed system uses Radio Frequency Identification (RFID) tags attached to assets to track their location in real-time using a GPS module. An Arduino microcontroller, ESP8266 WiFi module, encoder, decoder and rectifier are used to build the tracking device. A simulation of the system showed it could accurately display the coordinates of tagged assets. The system aims to develop a web and mobile application for easy monitoring of hospital equipment to improve operational efficiency.
Similar to Design and implementation of a centralized approach for multi-node localizatio (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Design and implementation of a centralized approach for multi-node localizatio
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 3, June 2022, pp. 2477~2487
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i3.pp2477-2487 2477
Journal homepage: http://ijece.iaescore.com
Design and implementation of a centralized approach for multi-
node localization
Ola A. Hasan1,2
, Abdulmuttalib T. Rashid1
, Ramzy S. Ali1
, Hamza H. Qasim2,4
,
Mustafa A. Al Sibahee2,3
, Lukman Audah4
1
Department of Electrical Engineering, University of Basrah, Basrah, Iraq
2
Department of Communication Engineering, Iraq University College, Basrah, Iraq
3
Shenzhen Institute of Huazhong University of Science and Technology, Shenzhen, China
4
Wireless and Radio Science Centre (WARAS), Faculty of Electrical and Electronic Engineering, Universiti Tun Hussein Onn Malaysia
Batu Pahat, Malaysia
Article Info ABSTRACT
Article history:
Received Jul 27, 2021
Revised Nov 5, 2021
Accepted Nov 30, 2021
In this paper, a centralized approach for multi nodes localization is
introduced. This approach is based on using a beacon fixed at the lower
middle edge of the environment. This beacon is provided with a distance
sensor and can scan the environment to measure the distance between the
detecting node and the beacon. Also, remote control is fixed on the beacon
to distinguish the identity of the detecting node. Two nodes are used in this
approach, each node contains eight cells, and each cell has a 5 mm infrared
(IR) transmitter and TSOP4P38 IR receiver. If any one of the IR receivers
has received the beacon ID, the transmitter which belongs to the same cell
will respond by sending the node ID to the beacon. The beacon
measurements and the information received from the detected nodes are then
used to estimate the location and orientation of the visible nodes and the
results will be saved in the main computer. Several experimental results have
been tested with different distances from the nodes to the beacon. Also,
different rotation angles at the beacon have been experienced to analyze the
performance of the introduced approach.
Keywords:
Centralized approach
Distance sensor
IR Sender and receiver
Localization
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ola A. Hasan
Communication Engineering Department, Iraq University College
Istiklal Street, Basra, Iraq
Email: ola.ahmed@iuc.edu.iq
1. INTRODUCTION
A sensor is defined as a small tool used to detect or measure certain physical quantities and convert
them into human-readable signals through a specific relationship to be displayed or processed further.
Sensors are used for a variety of measurements, including: temperature, light, humidity, motion, pressure,
and sound [1]. In a multi-node system, localization forms a great issue. The information collected from
sensor nodes should include their location to provide a clearer view of the observed sensor environment
because without location, the data will be geographically meaningless [2], [3]. Object tracking, monitoring,
and all applications that need quick and effective data routing, such as bringing firefighters to an emergency
location, or military issues, are just a few of the many fields where the positioning property offers new
opportunities [4], [5]. Localization may be divided into two categories: centralized and distributed
architectures depending on the architecture utilized to locate the nodes [6], [7]. Each node in a distributed
architecture can compute its own position by communicating with its neighbors; however, this architecture
has the disadvantage of requiring additional hardware for position determination at each node [8], [9]. The
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2477-2487
2478
centralized architecture has a central unit that collects all received data and it performs most of the
computations to estimate each node's position. The main disadvantage of this method is that any failure in the
central unit causes the system to break down [10]. Furthermore, the centralized architectures also struggle
from the scalability issue. The central unit may get congested as a result of the large-scale networks [11],
[12]. As previously mentioned, localization is a significant issue in wireless sensor networks, and as long as
localization is being used, choosing sensors for communication and distance measurement will be a dilemma
[13]. To compute distance, a node can be equipped with a camera, laser scanner, linear variable differential
transducer (LVDT), ultrasonic, or infrared sensors [14], [15]. Many applications require low-cost sensors that
can measure distance accurately. The LVDT, laser scanner, and camera will be excluded despite being
accurate because they are unfortunately expensive [16], [17]. The accuracy and inexpensiveness of infrared
(IR) and the ultrasonic (US) sensors make them a very suitable choice for measuring distance [18], [19]. On
the other hand, distance calculation isn't the only requirement for localization; some techniques require
knowledge of the sender and receiver's identities, while others rely on node connections to determine the
nodes' positions. Again, we are looking for low-cost sensors to achieve communication among the indoor
system nodes which are the infrared sensors [20]. From the results of experiments, the TSOP4P38-IR
receiver with a remote control circuit is the best one to achieve communication among nodes in indoor
environments while the best sensor for detecting distance is the HC-SR04 ultrasonic sensor [21].
A hybrid indoor approach that combines distributed and centralized architectures was proposed in
another paper. This approach aims to build a tree of nodes by the beacon with the help of connectivity among
nodes. Each node takes advantage of the information flowing through the tree to locate itself [22]. A
centralized architecture is used by other work in which two tables are constructed by collecting the
information obtained from scanning the environment by both beacon and visible nodes. These tables have
been used later to localize the invisible nodes [23]. Another paper is implemented using the locations
matching algorithm. This algorithm aims to develop multi-color objects recognition and localization system.
The system comprises two beacons with long-distance IR sensors to get the absolute locations estimations of
objects. In this system, each object has different surface color and different reflectivity factor [24]. In another
paper, the environment is provided with a distance infrared sensor to scan the robots and estimate the
absolute locations and orientations of a number of team robots without knowing their IDs. The orientation
obtained from the distance infrared sensor is matched with the relative orientation recorded using onboard
sensors to create the IDs of these robots [25]. In this paper, the HC-SR04 ultrasonic sensor and the TSOP4P38
IR receiver with a remote control circuit will be used to realize the centralized approach practically. This work
covers the electronic circuits and the structures for each of the beacon and nodes. It also includes how the beacon
and nodes are communicating. The system description will be explained in details in section 2 and the results
and discussions are examined in section 3. Finally, the conclusion will be in section 4.
2. RESEARCH METHOD
In our proposed multi-node system, there are four components: nodes, beacon, computer, and data
logging software. The beacon is placed in the middle of the bottom edge of the frame and can detect the
nodes by scanning the environment and communicating with each node to obtain its ID. Then, using a USB
cable, all collected data will be sent to the computer. This is necessary for the data logging software to be
able to create the nodes based on their computed positions and IDs, as illustrated in Figure 1.
2.1. The system hardware
The hardware of the system consists of one beacon and two nodes. All are placed on a white board
has a length of 80 cm and a width of 80 cm. The structure of the beacon and nodes, as well as all of the
circuits required to make them work, are described below.
2.1.1. The nodes structure
We previously stated that the system has two nodes. As can be seen in Figure 2, each node has 3
parts. The first part is the node base which has 2 wheels besides 2 balancing screws. Each wheel is attached
to a servo motor in case we want the node to move. The second part is an 11 cm height white cylindrical
body to make the beacon sonar able to scan the node. The node upper part (third part) consists of two layers.
The first layer, as in Figure 3(a), was divided into 8 cells to accommodate eight of 5 mm IR transmitters and
eight TSOP4P38-IR receivers. The node roof, as shown in Figure 3(b), represents the second layer. This layer
comprises a 9 V battery, a control board, and a relay connected to a remote-control circuit to select the node
identification code. The relay with remote control circuit along with the first layer will form the communication part.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Design and implementation of a centralized approach for multi-node localization (Ola A. Hasan)
2479
Figure 1. Experimental setup infrastructure Figure 2. Illustration of node parts
(a) (b)
Figure 3. The upper part of node (a) first layer and (b) second layer
In the node structure, the control board has an ATMEGA328P microcontroller. The ATMEGA328P
is a low-power CMOS 8-bit microcontroller that uses the advanced reduced instruction set computer
architecture to execute an instruction in a single clock cycle, resulting in high throughput of up to 1 MIPS per
1 MHz. There are 32 GBS on the microcontroller, each with eight bits. There's also 32 KB of flash program
memory, 2 KB of SRAM, and 1 KB of EEPROM on board. The microcontroller also has twenty-three
input/output lines, which require an operating voltage of 1.8 to 5.5 V.
A 16 MHz crystal, as well as two 22 pF capacitors, are included on the control board to create an
external crystal oscillator. The crystal oscillator's role is to generate a clock signal that synchronizes all of the
microcontroller's components. Although the ATMEGA328P microcontroller includes a 1 MHz internal
oscillator, using an external oscillator will speed up the microcontroller's activities. On one side, the 16 MHz
crystal is connected to microcontroller’s pins 9 and 10, and the other side is connected to with 22 pF
capacitors. Last but not least, the control board contains a voltage regulator that converts the battery’s 9 volts
to 5 volts, which is the proper operating voltage for all of the microcontroller, TSOP4P38 IR receiver, and
relay. The node upper part schematic diagram is shown in Figure 4.
2.1.2. The beacon structure
The beacon, as shown in Figure 5, is also consists of three parts. These parts are used to compute the
distance from the beacon to each of the nodes and obtain their IDs. Below is a description of each part. The
first part, which is the sonar, is responsible for nodes detection and distance measurement. This part is made
up of an HC-SR04 ultrasonic distance sensor which is fixed on a servo motor to control the movements of the
sensor and can rotate from 0 to 180 degrees. The servo is fixed with two screws on a square plastic board.
The job of this part is to sense the nodes, compute the detection angles, and calculate the distance between
the beacon and each of the nodes.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2477-2487
2480
Figure 4. the node upper part schematic diagram
Figure 5. The parts of the beacon
The second part is the communication part, which involves a relay connected to a remote-control
circuit; both are positioned on the same square plastic board as in the previous part. The relay acts as a switch
that closes the remote-control circuit when it receives a signal from the beacon control. Closing the remote-
control circuit will cause the beacon ID to be sent through a 5 mm infrared transmitter. Both the 5 mm IR
transmitter and the TSOP4P38 IR receiver are located inside a cell that is fixed to the servo motor to rotate
along with the ultrasonic sensor. The TSOP4P38 IR receiver is used to receive the nodes' IDs. The
information exchanging operation between the nodes and the beacon is handled by the communication part.
The third and final part is the control part. This part is represented by an Arduino Uno located on the
square plastic board. It is important to point out that the Arduino Uno board has 14 digital input/output pins
and 6 analog inputs. The operating voltage of this kit is 5 V and the clock speed is 16 MHz. Finally, this Kit
has a 1 KB EEPROM, a 32 KB flash memory, and a 2 KB SRAM. The communication and the sonar parts
aren’t able to work unless they receive commands from the control part. The schematic in Figure 6 displays
how all the beacon parts are connected, as well as all the Arduino pins that were used.
The sonar part
5. Int J Elec & Comp Eng ISSN: 2088-8708
Design and implementation of a centralized approach for multi-node localization (Ola A. Hasan)
2481
Figure 6. The schematic diagram of the beacon
2.2. Software for data logging
The control part represents the mastermind that controls the other parts of the system, while the
software is like a soul that gives life to the hardware. Figure 7 depicts the graphical user interface (GUI) for
the system software, which was created using Visual Basic 2010. The start button causes the beacon to start
working by rotating the sonar part from 0⁰ till 180⁰. The sonar will back to 0⁰ when the reset button is pressed.
To demonstrate the behavior of both the beacon and nodes, this software can be divided into two procedures.
Figure 7. The graphical user interface of the system software
2.2.1. The procedure based on beacon
Using this procedure, the detecting angle and the distance (the polar coordinates) of nodes with
respect to the beacon coordinates can be calculated. Figure 8(a) demonstrates the flow chart for the procedure
based on beacon. The steps for this procedure are:
a. Pressing the start button causes a command to be written to the serial monitor.
b. The microcontroller in Arduino reads the serial and commands the servo motor to rotate at180⁰ while
simultaneously activating the ultrasonic sensor.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2477-2487
2482
c. The ultrasonic sends eight ultrasound pulses at each degree and waits for an echo. The IR sender will be
enabled, and the beacon ID will be sent in the case of the pulses hitting some object and reflected. If this
is not done, the servo will advance to the next degree.
d. If the node ID is received by the beacon receiver, then the distance, detecting angle, and node ID will be
all written to the serial monitor, where the visual basic program can read them.
e. Repeat steps 2-4 until the servo motor reaches 180⁰, then set the node counter to 1.
f. The Visual Basic software will use the obtained data to calculate the precise coordinates of node i, assign
it a color based on its ID, and finally draw it on the computer screen.
g. When the nodes counter does not match the total number of nodes, then the counter will be raised by one
and step 6 will be repeated.
2.2.2. The procedure based on node
The purpose of this procedure lies in communicating with the beacon when the node obtains the
beacon ID. Each node has eight TSOP4P38 IR receivers evenly distributed on its circumference. The
receivers are always kept in a listening mode. A flow chart for this procedure is shown in Figure 8 (b). Below
are the steps for the procedure based on node:
a. The node microcontroller on a regular basis checks each IR receiver starting with IR1 to verify whether
any IR receiver has received the beacon ID.
b. If the beacon ID has been received by any receiver, the IR sender will transmit the node ID. If not, the IR
receivers' counter will be incremented by 1 and handed to the next IR receiver.
c. Repeat steps 1 and 2 if the IR receivers’ counter reaches eight.
(a) (b)
Figure 8. The flow chart of (a) the beacon-based procedure and (b) the node-based procedure
7. Int J Elec & Comp Eng ISSN: 2088-8708
Design and implementation of a centralized approach for multi-node localization (Ola A. Hasan)
2483
3. RESULTS AND DISCUSSION
To test the system, one of the nodes was placed at a 32-cm distance and at a 48-degree angle, it was
labelled in red and assigned the code 0xFF18E7. The other node was set at 56 cm away from the beacon, and
at an angle of 89 degrees. The second node was marked in blue and assigned the code 0xFF9867 as
illustrated in Figure 9. The software program was then run, yielding the results shown in Figure 10; from this
figure, the distance, ID and angle for the red node are 32 cm, 0xFF18E7, and 48 degrees respectively while
the distance, ID and angle for the blue node are 56 cm, 0xFF9867, and 89 degrees which are exactly the same
values as in the real environment. Figure 11 displays both the GUI output and the real-world environment
after the scan is completed. The system accurately estimates distances and angles. The nodes were properly
drawn based on their determined positions and colors. The system also provides successful communication
among the nodes and the beacon.
Figure 9. The real-world environment before
the scan started
Figure 10. The results of the GUI program’s
debugging
Figure 11. The environment once the scanning is finished along with the results of the debugging
The measured distances for a node located once at 20-cm and the other time at 50-cm apart from the
sonar are shown in Figures 12(a) and 12(b). For both curves, different rotation angles of 2, 4, and 8 degrees
were used to repeat the distance measurements. As an example, RA=2 degrees mean that the beacon scans
the environment by rotating 2 degrees at each step. In Figure 12(a), the ultrasonic detects the existence of the
node at a distance of 20 cm, for 24 readings when RA equals 2 degrees (blue bars), 12 readings when RA
equals 4 degrees (red bars) and finally 6 readings when RA equals 8 degrees (green bars). On the other hand,
Figure 12(b) is analogous of Figure 12(a) expect that the node is placed at distance of 30 cm. This procedure
was repeated for other different distances 40 and 50 cm. All the figures showed that the accurate
measurements for distances are occurred when the ultrasonic sensor is exactly in front of the detected node.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2477-2487
2484
We'll use the preceding curves to calculate the percentage of accurate measurements, as illustrated in
Figure 13(a), which investigates the effect of the rotation angle step on ultrasonic reading accuracy. Different
distances were measured, and the percentage of precise readings out of total readings, excluding zeros, was
calculated. For example, if the distance between the node and the sonar is 40 cm and the RA is 2 degrees, the
total number of readings is 19 and the number of accurate readings is 7, resulting in a 37 percent accuracy
rate. The percentages for the 4 and 8 degrees, on the other hand, will be 36 and 33 percent, respectively. This
means that the accuracy percentage of readings increases as the step of rotation angle decreases.
(a)
(b)
Figure 12. The measurements of distance for a node positioned at (a) 20 cm and (b) 30 cm from the sonar
using 2, 4, and 8 degrees of rotation angle steps
In Figure 13(b), the relationship between the distance at which the node is placed and the influence
of that distance on the accuracy percentage of ultrasonic readings has been studied. It is obvious that the
closest node has the highest accuracy percentage. For instance, when the RA is 2 degrees and the distance is
20 cm, there will be 10 accurate readings out of 24 total measurements, resulting in a 42 percent accuracy
rate. When the same rotation step is used but the distance is 50 cm, there are 7 precise readings out of 17 total
measurements, resulting in a 35 percent accuracy rate. This means as the distance between the node and the
ultrasonic sensor decreases, the accuracy percentage of readings will increase. From Figures 13(a) and 13(b),
we find that the readings that indicate the exact position of the node have the highest percentage of accuracy.
These readings were used in the Visual Basic code to calculate the exact locations of the nodes.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Design and implementation of a centralized approach for multi-node localization (Ola A. Hasan)
2485
(a)
(b)
Figure 13. The Percentage of accurate distance measurements in relation to (a) the rotation angle steps and
(b) the distance from the beacon
4. CONCLUSION
This paper discussed the use of the centralized approach for the practical implementation of a multi-
node localization and identification system. In this research, very precise node location estimations were
obtained. Also, excellent connectivity between nodes and the beacon was accomplished. The percentage of
accurate distance readings for several rotation angle steps (two, four, and eight degrees) was tested. We
concluded that decreasing the rotation angle steps improves location estimate accuracy, but this will increase
the time required to complete the environment scanning. As a result, reducing of rotation angle step leads to
increase the number of correct readings and thus increasing the accuracy percentage. The percentage of the
accurate distance readings with respect to the distance from the beacon was also studied. We concluded that
the closest distance to the beacon has the maximum accuracy. This result occurs since the nearest node to the
beacon has the largest number of readings for all rotation angle steps. Finally, we found that the readings that
relate to the exact position had the maximum accuracy percentage at each rotation angle step and at each
distance.
REFERENCES
[1] D. Zook, U. Bonne, and T. Samad, “Sensors in control systems,” Control Systems, Robotics, and Automation, vol. XXI, 2000.
[2] G. S.Klogo and J. D. Gadze, “Energy constraints of localization techniques in wireless sensor networks (WSN): a survey,”
International Journal of Computer Applications, vol. 75, no. 9, pp. 44–52, Aug. 2013, doi: 10.5120/13143-0543.
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 3, June 2022: 2477-2487
2486
[3] J. Zhang, H. Li, and J. Li, “An improved CPE localization algorithm for wireless sensor networks,” International Journal of
Future Generation Communication and Networking, vol. 8, no. 1, pp. 109–116, Feb. 2015, doi: 10.14257/ijfgcn.2015.8.1.12.
[4] Q. Tian, Z. Salcic, K. I.-K. Wang, and Y. Pan, “A hybrid indoor localization and navigation system with map matching for
pedestrians using smartphones,” Sensors, vol. 15, no. 12, pp. 30759–30783, Dec. 2015, doi: 10.3390/s151229827.
[5] I. S. I. Abuhaiba and A. Y. Al-Salluta, “Intelligent and distributed localization of nodes in wireless sensor networks,”
International Journal of Wireless and Microwave Technologies, vol. 5, no. 2, pp. 22–36, Apr. 2015, doi:
10.5815/ijwmt.2015.02.03.
[6] C. Zhang and Y. Wang, “Distributed event localization via alternating direction method of multipliers,” IEEE Transactions on
Mobile Computing, vol. 17, no. 2, pp. 348–361, Feb. 2018, doi: 10.1109/TMC.2017.2711026.
[7] S. P. Singh and S. C. Sharma, “Range free localization techniques in wireless sensor networks: a review,” Procedia Computer
Science, vol. 57, pp. 7–16, 2015, doi: 10.1016/j.procs.2015.07.357.
[8] Y. Ding, G. Han, and X. Mu, “A distributed localization algorithm for wireless sensor network based on the two-hop connection
relationship,” Journal of Software, vol. 7, no. 7, Jul. 2012, doi: 10.4304/jsw.7.7.1657-1663.
[9] D. Moore, J. Leonard, D. Rus, and S. Teller, “Robust distributed network localization with noisy range measurements,” The
Second ACM Confeence on Embedded Networked Sensor System, 2004, doi: 10.1145/1031495.1031502.
[10] A. A. Kannan, G. Mao, and B. Vucetic, “Simulated annealing based wireless sensor network localization,” Journal of Computers,
vol. 1, no. 2, pp. 15–22, 2006.
[11] C. Savarese, J. M. Rabaey, and K. Langendoen, “Robust Positioning algorithm for distributed ad-hoc wireless sensor networks,”
in Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference, 2002, pp. 317–327.
[12] S. Afzal, “A review of localization techniques for wireless sensor networks,” Journal of Basic and Applied Scientific Research,
vol. 2, no. 8, pp. 7795–7801, 2012.
[13] J. Bangash, H. Abdullah, and A. W. Khan, “Issues and challenges in localization of wireless sensor networks,” Sci. Int. (Lahore),
vol. 2, no. 26, pp. 595–603, 2014.
[14] S. A. Daud, N. H. Mahmood, P. L. Leow, and F. K. C. Harun, “Infrared sensor rig in detecting various object shapes,”
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, no. 10,
pp. 4726–4732, 2013.
[15] A. Tar, M. Koller, and G. Cserey, “3D geometry reconstruction using large infrared proximity array for robotic applications,” in
2009 IEEE International Conference on Mechatronics, 2009, pp. 1–6, doi: 10.1109/ICMECH.2009.4957218.
[16] J. E. Guivant, F. R. Masson, and E. M. Nebot, “Simultaneous localization and map building using natural features and absolute
information,” Robotics and Autonomous Systems, vol. 40, no. 2–3, pp. 79–90, Aug. 2002, doi: 10.1016/S0921-8890(02)00233-6.
[17] R. A. Jarvis, “A perspective on range finding techniques for computer vision,” IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. PAMI-5, no. 2, pp. 122–139, Mar. 1983, doi: 10.1109/TPAMI.1983.4767365.
[18] M. R. Yaacob, N. S. N. Anwar, and A. M. Kassim, “Effect of glittering and reflective objects of different colors to the output
voltage-distance characteristics of sharp GP2D120 IR,” ACEEE Int. J. on Electrical and Power Engineering, vol. 3, no. 2,
pp. 6–10, 2012.
[19] M. N. Kshirsagar, A. A. Chanchure, B. M. Hulage, A. K. Dixit, and A. M. Kalje, “Vehicle navigation and obstacle detection
system using rfid and ultrasonic sensors,” International Journal of Emerging Technology and Advanced Engineering, vol. 5,
no. 6, pp. 85–88, 2015.
[20] M. Sharma, A. Grover, and Bande Pankaj, “Low cost sensors for general applications,” International Journal of Recent Trend in
Engineering, vol. 1, no. 5, pp. 150–152, 2009.
[21] O. A. Hasan, A. T. Rashid, R. S. Ali, and J. Kosha, “A practical performance analysis of low-cost sensors for indoor localization
of multi-node systems,” in 2017 Internet Technologies and Applications (ITA), Sep. 2017, pp. 284–289, doi:
10.1109/ITECHA.2017.8101955.
[22] A. T. Rashid, R. S. A. Al-Waily, and O. A. Hasan, “Hybrid approach for multi-node localization and identification,” Basrah
Journal for Engineering Sciences, vol. 16, no. 2, pp. 11–20, 2016.
[23] O. A. Hasan, “Centralized approach for multi-node localization and identification,” Iraqi Journal for Electrical And Electronic
Engineering, vol. 12, no. 2, pp. 178–187, Dec. 2016, doi: 10.33762/eeej.2016.118376.
[24] M. T. Rashid, W. H. Zayer, and A. T. Rashid, “Design and implementation of locations matching algorithm for multi-object
recognition and localization,” Iraqi Journal for Electrical And Electronic Engineering, vol. 14, no. 1, pp. 10–21, Dec. 2018, doi:
10.33762/eeej.2018.144337.
[25] A. T. Rashid, M. Frasca, A. A. Ali, A. Rizzo, and L. Fortuna, “Multi-robot localization and orientation estimation using robotic
cluster matching algorithm,” Robotics and Autonomous Systems, vol. 63, pp. 108–121, Jan. 2015, doi:
10.1016/j.robot.2014.09.002.
BIOGRAPHIES OF AUTHORS
Ola A. Hasan was born in Iraq. She received the B.S. degree in computer
engineering from the University of Basra in 2013 and the M.S. degree in electrical
engineering also from the University of Basra in 2017. In 2013, she worked as an IT
engineer in the Basra Governorate Building. Since 2018, she has worked as a lecturer at Iraq
University College. Her research interests include robotics, wireless sensor networks,
biometrics, renewable energy, control systems, IOT, and programming. She is a member of
the reviewing committees of a number of journals and international conferences. She is a
member of both the IEEE and ACM organizations. She can be contacted at email:
ola.ahmed@iuc.edu.iq or olaalkharasani91@gmail.com.
11. Int J Elec & Comp Eng ISSN: 2088-8708
Design and implementation of a centralized approach for multi-node localization (Ola A. Hasan)
2487
Abdulmuttalib T. Rashid was born in Iraq. He received the B.S. degree in
electrical engineering from Basrah University at Basrah, Iraq in 1986. He received the
M.Sc.and Ph.D. Degrees from the same University at 1992 and2012 respectively. Worked as
Assistant Lecturer, Lecturer at the Department of Electrical Engineering University of Omer
Al Mukhtar, Libya, in 1997–2007. Then at the Department of Electrical Engineering,
University of Basrah, Iraq, in 2007 up to now. His field of Interest is Robotics and Industrial
control. The research interests were in motion planning and control of multi mobile robots.
He can be contacted at email: abdturky@gmail.com.
Ramzy S. Ali received the B.Sc and M.Sc degrees in Electrical Engineering
and Control & Computers Engineering from the University of Basrah, Basrah, Iraq in 1985
and 1989 respectively. He also received his PhD degree in the field of Control and Systems
from the Saint-Petersburg State Polytechnic University, Russia in 2003. He is currently an
Assistant Professor at the University of Basrah. His teaching interests covering wide areas of
modules across the department of Electrical Engineering, University of Basrah, include
Intelligent Control Systems, Robust Control Systems, Microprocessor & Microcontrollers
and Industrial Automation. He currently serve as a co-editor of the Basrah Journal for
Engineering Sciences. His research interests include Intelligent Control of Robotics,
Computational Intelligence, Chaos & Nonlinear dynamics, Renewable electrical energy
systems, and PLC applications in industrial and engineering education. Dr. Ramzy is a
Senior Member of the IEEE. He can be contacted at email: rsawaily@gmail.com.
Hamza H. Qasim received the B.S. Degrees from Iraq University College,
Iraq, in 2015. In 2018 he received the M.S. degree in Electrical Engineering from UTHM,
Malaysian. He is currently a lecturer In Iraq University college, Department of
communication Engineering. His current research interests include IoT, WSN, vehicular
networks, mobile edge computing and reinforcement learning for resource allocation in
wireless communication. He can be contacted at email: enghamza.iq@gmail.com.
Mustafa A. Al Sibahee researcher at College of Big Data and Internet,
Shenzhen Technology University, Shenzhen-China. Received his, Ph.D. 2018, from
Huazhong University of Science and Technology, Wuhan-China. From April-2019 to
March-2021, was a postdoctor at Shenzhen Huazhong University of Science and
Technology, Research Institute, Shenzhen-China. His research interests include Computer
Networks and Information Security, Internet of Things and Wireless Sensor Networks
(WSNs). He can be contacted at email: mustafa@sztu.edu.cn.
Lukman Audah was born in Kuala Lumpur, Malaysia. He received the B.Eng.
degree in telecommunications from Universiti Teknologi Malaysia, in 2005, and the M.Sc.
degree in communication networks and software and the Ph.D. degree in electronic
engineering from the University of Surrey, U.K. He is currently a Lecturer with the
Communication Engineering Department, Universiti Tun Hussein Onn Malaysia. His
research interests include wireless and mobile communications, Internet traffic engineering,
network system management, data security, and satellite communications. He can be
contacted at email: hanif@uthm.edu.my.