Black Box for Accident Analysis Using MATLAB-Image ProcessingEditor IJCATR
The main purpose of this paper is to develop a prototype device that can be installed in automobile for accident analysis .in this paper I proposed a method to analysis the face of driver that weather he was felling doziness while driving. This is done by taking the image from the raspberry pi device and put it in an image processing method using MATLAB. Also, I used the method to store the data into the cloud as well as device which can be further used for analysis the cause of accident.
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkIJTET Journal
Abstract— Wireless sensor network in the recent trend engaged with high speed responsive real time system. This type of real time system requires reliable and compatible sensor to work in an environment where the sensor is dynamic in nature. Sensor network is to design to perform a set of high level information processing tasks such as detection, tracking or classification. Application of sensor networks is wide ranging and can vary significantly in application requirements, modes of deployment, sensing modality, power supply. Dynamic configuring of wireless sensor involves timing constraints to configure the sensor or to switch an adaptive sensor when working node failure due to energy, data rate, packet loss and range of the sensor. So the network, with such dynamic nature needs a background sensor which is able to be switched when the active sensor has a problem and improper functioning due to the network deploy environment. The background sensor lies inactive inside the range of the active sensor; ensure that the sensor is about to die and make sure the last data transfer successful find delay time to switch. Fault tolerance is achieved by switching the background sensor with the active sensor, where the background sensor self establish themselves in the network and perform similar routing metrics and configure them self with the network as soon they are switched. Once, the actual sensor retained back to the active condition then the background sensor will go to inactive state during this switching process the sensor will not loss data packet.
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
This document compares the ATTEMPT and SIMPLE protocols for wireless body area networks (WBANs). ATTEMPT is an opportunistic protocol that relies on relay nodes when the sink node moves out of range, increasing power consumption and packet loss. SIMPLE aims to balance energy usage and improve throughput by selecting low-cost forwarder nodes to route data to the sink in a multi-hop fashion using TDMA scheduling. The document provides detailed descriptions of the initialization, routing, scheduling and data transmission phases of the ATTEMPT and SIMPLE protocols and discusses their advantages and disadvantages for energy efficiency in WBAN applications.
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Journals
This document summarizes a survey on the Sensor Protocol for Information via Negotiation (SPIN) routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and describes the basic operation of the SPIN protocol. It then discusses several extensions and improvements made to the SPIN protocol, including M-SPIN, SPIN-pi, and SPIN-I, noting problems or limitations with each. It proposes a new solution that combines the M-SPIN protocol with the use of "plug-in" nodes to improve reliability and network lifetime. The proposed solution is described along with an algorithm and network topology. The document concludes by acknowledging references used in the survey.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
This document describes an RSSI (received signal strength indicator) based localization algorithm for wireless sensor networks. It discusses using RSSI values measured from reference nodes to estimate distances and perform trilateration to locate a target sensor node. The algorithm design includes RSSI to distance conversion using a path loss model, trilateration implementation using circle intersections, and simplifying computations for resource-limited sensor node processors through techniques like Taylor series approximations of exponential functions. Pseudocode is provided for RSSI to distance conversion and trilateration calculations.
A Review on Comparison of the Geographic Routing Protocols in MANETEditor IJCATR
In Mobile ad-hoc networks (MANET) with high number of nodes and high mobility the routing of packets is a difficult task. In this paper, we are reviewing different geographic routing protocols as geographic routing are efficient for highly mobile nodes and made the communication scalable. Different protocols compared are The Distance Routing Effect Algorithm (DREAM), Location Aided Routing (LAR) Calculation, Greedy Perimeter Stateless Routing(GPSR) as of late new convention comes which is exceedingly proficient is the Adaptive position update (APU) strategy and further the improved APU strategy and on the basis of performance metrics the protocols are compared and reveals that the Improved APU strategy gives the high packet delivery ratio, lower delay and low energy consumption.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
Black Box for Accident Analysis Using MATLAB-Image ProcessingEditor IJCATR
The main purpose of this paper is to develop a prototype device that can be installed in automobile for accident analysis .in this paper I proposed a method to analysis the face of driver that weather he was felling doziness while driving. This is done by taking the image from the raspberry pi device and put it in an image processing method using MATLAB. Also, I used the method to store the data into the cloud as well as device which can be further used for analysis the cause of accident.
Design of Real-time Self Establish Wireless Sensor For Dynamic NetworkIJTET Journal
Abstract— Wireless sensor network in the recent trend engaged with high speed responsive real time system. This type of real time system requires reliable and compatible sensor to work in an environment where the sensor is dynamic in nature. Sensor network is to design to perform a set of high level information processing tasks such as detection, tracking or classification. Application of sensor networks is wide ranging and can vary significantly in application requirements, modes of deployment, sensing modality, power supply. Dynamic configuring of wireless sensor involves timing constraints to configure the sensor or to switch an adaptive sensor when working node failure due to energy, data rate, packet loss and range of the sensor. So the network, with such dynamic nature needs a background sensor which is able to be switched when the active sensor has a problem and improper functioning due to the network deploy environment. The background sensor lies inactive inside the range of the active sensor; ensure that the sensor is about to die and make sure the last data transfer successful find delay time to switch. Fault tolerance is achieved by switching the background sensor with the active sensor, where the background sensor self establish themselves in the network and perform similar routing metrics and configure them self with the network as soon they are switched. Once, the actual sensor retained back to the active condition then the background sensor will go to inactive state during this switching process the sensor will not loss data packet.
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
This document compares the ATTEMPT and SIMPLE protocols for wireless body area networks (WBANs). ATTEMPT is an opportunistic protocol that relies on relay nodes when the sink node moves out of range, increasing power consumption and packet loss. SIMPLE aims to balance energy usage and improve throughput by selecting low-cost forwarder nodes to route data to the sink in a multi-hop fashion using TDMA scheduling. The document provides detailed descriptions of the initialization, routing, scheduling and data transmission phases of the ATTEMPT and SIMPLE protocols and discusses their advantages and disadvantages for energy efficiency in WBAN applications.
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Journals
This document summarizes a survey on the Sensor Protocol for Information via Negotiation (SPIN) routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and describes the basic operation of the SPIN protocol. It then discusses several extensions and improvements made to the SPIN protocol, including M-SPIN, SPIN-pi, and SPIN-I, noting problems or limitations with each. It proposes a new solution that combines the M-SPIN protocol with the use of "plug-in" nodes to improve reliability and network lifetime. The proposed solution is described along with an algorithm and network topology. The document concludes by acknowledging references used in the survey.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
This document describes an RSSI (received signal strength indicator) based localization algorithm for wireless sensor networks. It discusses using RSSI values measured from reference nodes to estimate distances and perform trilateration to locate a target sensor node. The algorithm design includes RSSI to distance conversion using a path loss model, trilateration implementation using circle intersections, and simplifying computations for resource-limited sensor node processors through techniques like Taylor series approximations of exponential functions. Pseudocode is provided for RSSI to distance conversion and trilateration calculations.
A Review on Comparison of the Geographic Routing Protocols in MANETEditor IJCATR
In Mobile ad-hoc networks (MANET) with high number of nodes and high mobility the routing of packets is a difficult task. In this paper, we are reviewing different geographic routing protocols as geographic routing are efficient for highly mobile nodes and made the communication scalable. Different protocols compared are The Distance Routing Effect Algorithm (DREAM), Location Aided Routing (LAR) Calculation, Greedy Perimeter Stateless Routing(GPSR) as of late new convention comes which is exceedingly proficient is the Adaptive position update (APU) strategy and further the improved APU strategy and on the basis of performance metrics the protocols are compared and reveals that the Improved APU strategy gives the high packet delivery ratio, lower delay and low energy consumption.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...IJMER
Wireless sensor network is collection of one or more homogeneous or heterogeneous sensor
nodes which sense some events and inform sink for that by sending that data towards it to perform some
action. Data transmission is the most effective factor in sensor network that directly regret energy of
sensor node but though energy of sensor node is very crucial one need to save that energy by means of
minimizing redundancy and retransmission of data. Till the day many routing protocols are introduced
to route data efficiently in order to improve network life time but all protocols have some deficiency.
One of the most popular data centric dissemination protocols is Sensor Protocol for Information via
Negotiation (SPIN). It efficiently disseminates data among other nodes in the network. This protocol
uses meta-data for negotiation and eliminates the transmission of the outmoded data throughout the
network. This paper introduced improved SPIN which is further enhancement of SPIN protocol.
Wireless Sensor Network (WSN) consists of sensor nodes which interact with each other through physical parameters like sunlight, wind, vibration, humidity etc. Routing protocols provide an optimal data transmission route from sensor nodes to sink node to save energy of nodes. From Base Station (BS) Sensor node sends and receives data to or from wireless stations. Clustering mechanism is one of the popular routing mechanisms used in WSN for optimizing the problem in sensor nodes. There are two types of clustering schemes known as homogeneous schemes and heterogeneous schemes. In Homogeneous scheme initial energy is same for each node but in heterogeneous scheme initial energy is different for each node and also used to determine the efficiency of sensor networks. Enhanced Modified LEACH (EMODLEACH) is a reactive protocol which is implemented for homogeneous network model. We have implemented the concept of Efficient Cluster head Replacement scheme and Dual transmitting power level scheme of MODLEACH along with the concept of Efficient Intra Cluster transmission Scheme of TEEN in LEACH. We analyze the PEGASIS protocol and modified the exiting protocol called improved energy balanced routing protocol (IEBRP).This IEBRP is based on cluster formation, cluster routing and other aspects of LEACH protocol.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
This document proposes an energy efficient method for k-target coverage in wireless sensor networks. The method aims to cover targets with the minimum number of sensor nodes to conserve energy. Sensor nodes are deployed randomly and may fail over time. The method selects a supervisor node for each cluster that collects data from sensors and relays it to other supervisor nodes until it reaches the sink. This allows targets to be monitored by k sensors while putting excess sensors into sleep mode to save energy. The document outlines the problem formulation and proposes using an energy consumption model to select active sensors and relay nodes to efficiently monitor targets and extend network lifetime.
The document discusses localization techniques in wireless sensor networks (WSNs). It begins with an introduction to WSNs and why GPS is not suitable for localization in these networks. It then covers taxonomy of localization methods, including target/source localization, node self-localization techniques like range-based and range-free methods. Specific techniques discussed include DV-Hop, pattern matching localization, and classifications like centralized vs distributed localization. The summary restates key points about distance estimation methods, single/multiple localization, and classifications of localization approaches.
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
A 2D location detection system is constructed by using Wireless Sensor Nodes (WSN) to create aVirtual
Fingerprint map, specifically designed for use in an indoor environment. WSN technologies and
programmable ZigBee wireless network protocols are employed. This system is based on radio-location
fingerprinting technique. Both Linear taper functions and exponential taper functions are utilized with the
received signal strength distributions between the fingerprint nodes to generate virtual fingerprint maps.
Thus, areal and virtual combined fingerprint map is generated across the test area. K-nearest
neighborhood algorithm has been implemented on virtual fingerprint maps, in conjunction with weight
functions used to find the coordinates of the unknown objects. The system Localization accuracies of less
than a grid space areproved in calculations.
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkAM Publications
Wireless sensor network (WSN) combines the concept of wireless network with sensors. Wireless Sensor Networks
have been proposed for a multitude of location-dependent applications. Localization (location estimation) capability is
essential in most wireless sensor network applications. In environmental monitoring applications such as animal habitat
monitoring, bush fire surveillance, water quality monitoring and precision agriculture, the measurement data are
meaningless without an accurate knowledge of the location from where the data are obtained. Finding position without the
aid of GPS in each node of an ad hoc network is important in cases where GPS is either not accessible, or not practical to use
due to power, form factor or line of sight conditions. So here we are going to used DV-Hop algorithm, i.e. distance vector
routing algorithm for finding the position of sensor. Here we summarizes the performance evaluation criteria of the
wireless sensor network and algorithms, classification methods, and highlights the principles and characteristics of the
algorithm and system representative of the field in recent years, and several algorithms simulation and analysis.
IRJET- Design and Analysis of Passive Multi-Static Radar SystemIRJET Journal
This document presents a new algorithm for passive multi-static radar detection called Range-Doppler Transformation. The algorithm relies on large networks of inexpensive radar receivers to detect targets. It transforms target detections in the Range-Doppler domain at each receiver into ellipses in the spatial domain. These ellipses are intersected and the point of highest consensus is identified as the target location. The algorithm is more accurate, robust to synchronization errors, and has better time complexity than current passive radar detection methods. It was tested in simulations with medium success at locating targets within error bounds of the simulation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Crowd control system using ir transmitter and receivereSAT Journals
Abstract An efficient crowd control system is needed for safety of lives, property, time and economy. Crowd control system presents a design and implementation of low cost, low power consummated and more reliable and an infrared based intelligent crowd control system. The system contains Infrared transmitters and receiver. The basic concept of IR (Infrared) obstacle detection is to transmit the IR signal (radiation) in a direction and signal is received at the IR receiver when the IR radiation bounces back from a surface of the object. The system can response rapidly with violation of crowd limit. System describes highly accurate crowd control system using infrared communication. Proposed system achieves high accuracy and more efficiency at four way terminals. In every direction the road will consist of an IR transmitter-receiver pair at a certain distance. When crowd will be heavy in one particular direction during emergency situation it will indicate the administrator by sending message. So the heavy crowd can be routed to other route by preventing the stampede. Keywords: Crowd, IR transmitter, IR receiver, Stampede
Location Fingerprinting is a very familiar Wi-Fi positioning method, which determines a device by retrieving the information recorded containing the location fingerprint. These methods deploy the signal strength (RSS) to predict the coordinate. There are feedbacks for using the absolute RSS either the absolute RSS in a time interval may not be representable of the IEEE 802.11 signal, as the signal may fluctuate or a manual error prone calibration is needed across different mobile platform. The main target is to propose the use of Fourier descriptors in LF. We convert the IEEE 802.11b Wi-Fi signal into a Fourier domain. Then, the Fourier descriptors are used to predict the location by applying the K-Nearest Neighbor algorithm. The results show that the effectiveness of LF methods based on Fourier descriptors lead to substantially more accurate and robust localization.
The document describes a student project to develop an A-GPS (Assisted GPS) system. 10 computer science students developed a GPS calculations module for a GSM network and an application to demonstrate its use. The project involved designing and implementing an A-GPS server to provide assisted GPS data to terminals, as well as a simulation tool to test the server's performance and an application called Trace Tool for demonstrating and testing the system.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
The system continuously collects accelerometer and GPS data from sensors on vehicles. The data is sent via LoRa networks to AWS services for processing. Lambda functions filter the data and Kinesis aggregates it into S3 storage. Anomalies are detected by comparing acceleration to statistical norms for each area. The visualizer retrieves anomaly data from S3 and plots classified anomalies on a Google Maps interface.
This document summarizes a simulation of wireless sensor networks to analyze power-efficient protocols and algorithms. It describes simulating three techniques - power control, closest-first and farthest-first routing algorithms, and sleep mode. The simulation analyzes these techniques individually and together to evaluate their impact on network lifetime and mean delay.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
This document presents a thesis on developing an intrusion detection system for wireless sensor networks using k-barrier coverage. The thesis is supervised by Mr. Sandeep Sharma and presented by Jaiprakash Nagar. It introduces wireless sensor networks and the problem of intrusion detection. It then outlines the network and mobility model, sensing model, and measurements used for coverage. The document mathematically models the average relative speed of mobile sensors, sensor coverage rate, and probability of k-barrier coverage. Results are analyzed on the effects of different parameters on k-barrier coverage probability. The conclusions discuss the performance of mobile sensor networks for intrusion detection based on k-barrier coverage.
This document describes an automated car parking system project developed by students at the University of Jordan. The objective of the project is to monitor parking lot availability using a wireless sensor network. Sensor nodes equipped with ultrasonic sensors are deployed in parking spaces and send data to a central sink node regarding space occupancy. This data is sent to a server then to a smartphone application, allowing users to check parking availability from their phones. The document discusses hardware choices for the sensor nodes, including sensors, microcontrollers and wireless communication modules. It also describes the network protocols and code used for node communication. Furthermore, it outlines the server software for storing and accessing the parking data, as well as the client smartphone application interface.
This document discusses using moments to estimate the performance of re-routing in vehicular ad hoc networks (VANETs). It first provides background on VANETs and their characteristics. It then discusses using an ant colony optimization algorithm to optimize re-routing and estimating the performance analytically using moments to allow for intermediate step analysis. This improves the accuracy of re-routing estimation by considering locations of nodes between the starting and ending points. The document provides an example algorithm and procedure for computing potential re-routes and identifying the shortest path using node locations and distances.
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...IJMER
Wireless sensor network is collection of one or more homogeneous or heterogeneous sensor
nodes which sense some events and inform sink for that by sending that data towards it to perform some
action. Data transmission is the most effective factor in sensor network that directly regret energy of
sensor node but though energy of sensor node is very crucial one need to save that energy by means of
minimizing redundancy and retransmission of data. Till the day many routing protocols are introduced
to route data efficiently in order to improve network life time but all protocols have some deficiency.
One of the most popular data centric dissemination protocols is Sensor Protocol for Information via
Negotiation (SPIN). It efficiently disseminates data among other nodes in the network. This protocol
uses meta-data for negotiation and eliminates the transmission of the outmoded data throughout the
network. This paper introduced improved SPIN which is further enhancement of SPIN protocol.
Wireless Sensor Network (WSN) consists of sensor nodes which interact with each other through physical parameters like sunlight, wind, vibration, humidity etc. Routing protocols provide an optimal data transmission route from sensor nodes to sink node to save energy of nodes. From Base Station (BS) Sensor node sends and receives data to or from wireless stations. Clustering mechanism is one of the popular routing mechanisms used in WSN for optimizing the problem in sensor nodes. There are two types of clustering schemes known as homogeneous schemes and heterogeneous schemes. In Homogeneous scheme initial energy is same for each node but in heterogeneous scheme initial energy is different for each node and also used to determine the efficiency of sensor networks. Enhanced Modified LEACH (EMODLEACH) is a reactive protocol which is implemented for homogeneous network model. We have implemented the concept of Efficient Cluster head Replacement scheme and Dual transmitting power level scheme of MODLEACH along with the concept of Efficient Intra Cluster transmission Scheme of TEEN in LEACH. We analyze the PEGASIS protocol and modified the exiting protocol called improved energy balanced routing protocol (IEBRP).This IEBRP is based on cluster formation, cluster routing and other aspects of LEACH protocol.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
This document proposes an energy efficient method for k-target coverage in wireless sensor networks. The method aims to cover targets with the minimum number of sensor nodes to conserve energy. Sensor nodes are deployed randomly and may fail over time. The method selects a supervisor node for each cluster that collects data from sensors and relays it to other supervisor nodes until it reaches the sink. This allows targets to be monitored by k sensors while putting excess sensors into sleep mode to save energy. The document outlines the problem formulation and proposes using an energy consumption model to select active sensors and relay nodes to efficiently monitor targets and extend network lifetime.
The document discusses localization techniques in wireless sensor networks (WSNs). It begins with an introduction to WSNs and why GPS is not suitable for localization in these networks. It then covers taxonomy of localization methods, including target/source localization, node self-localization techniques like range-based and range-free methods. Specific techniques discussed include DV-Hop, pattern matching localization, and classifications like centralized vs distributed localization. The summary restates key points about distance estimation methods, single/multiple localization, and classifications of localization approaches.
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
A 2D location detection system is constructed by using Wireless Sensor Nodes (WSN) to create aVirtual
Fingerprint map, specifically designed for use in an indoor environment. WSN technologies and
programmable ZigBee wireless network protocols are employed. This system is based on radio-location
fingerprinting technique. Both Linear taper functions and exponential taper functions are utilized with the
received signal strength distributions between the fingerprint nodes to generate virtual fingerprint maps.
Thus, areal and virtual combined fingerprint map is generated across the test area. K-nearest
neighborhood algorithm has been implemented on virtual fingerprint maps, in conjunction with weight
functions used to find the coordinates of the unknown objects. The system Localization accuracies of less
than a grid space areproved in calculations.
Range Free Localization using Expected Hop Progress in Wireless Sensor NetworkAM Publications
Wireless sensor network (WSN) combines the concept of wireless network with sensors. Wireless Sensor Networks
have been proposed for a multitude of location-dependent applications. Localization (location estimation) capability is
essential in most wireless sensor network applications. In environmental monitoring applications such as animal habitat
monitoring, bush fire surveillance, water quality monitoring and precision agriculture, the measurement data are
meaningless without an accurate knowledge of the location from where the data are obtained. Finding position without the
aid of GPS in each node of an ad hoc network is important in cases where GPS is either not accessible, or not practical to use
due to power, form factor or line of sight conditions. So here we are going to used DV-Hop algorithm, i.e. distance vector
routing algorithm for finding the position of sensor. Here we summarizes the performance evaluation criteria of the
wireless sensor network and algorithms, classification methods, and highlights the principles and characteristics of the
algorithm and system representative of the field in recent years, and several algorithms simulation and analysis.
IRJET- Design and Analysis of Passive Multi-Static Radar SystemIRJET Journal
This document presents a new algorithm for passive multi-static radar detection called Range-Doppler Transformation. The algorithm relies on large networks of inexpensive radar receivers to detect targets. It transforms target detections in the Range-Doppler domain at each receiver into ellipses in the spatial domain. These ellipses are intersected and the point of highest consensus is identified as the target location. The algorithm is more accurate, robust to synchronization errors, and has better time complexity than current passive radar detection methods. It was tested in simulations with medium success at locating targets within error bounds of the simulation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Crowd control system using ir transmitter and receivereSAT Journals
Abstract An efficient crowd control system is needed for safety of lives, property, time and economy. Crowd control system presents a design and implementation of low cost, low power consummated and more reliable and an infrared based intelligent crowd control system. The system contains Infrared transmitters and receiver. The basic concept of IR (Infrared) obstacle detection is to transmit the IR signal (radiation) in a direction and signal is received at the IR receiver when the IR radiation bounces back from a surface of the object. The system can response rapidly with violation of crowd limit. System describes highly accurate crowd control system using infrared communication. Proposed system achieves high accuracy and more efficiency at four way terminals. In every direction the road will consist of an IR transmitter-receiver pair at a certain distance. When crowd will be heavy in one particular direction during emergency situation it will indicate the administrator by sending message. So the heavy crowd can be routed to other route by preventing the stampede. Keywords: Crowd, IR transmitter, IR receiver, Stampede
Location Fingerprinting is a very familiar Wi-Fi positioning method, which determines a device by retrieving the information recorded containing the location fingerprint. These methods deploy the signal strength (RSS) to predict the coordinate. There are feedbacks for using the absolute RSS either the absolute RSS in a time interval may not be representable of the IEEE 802.11 signal, as the signal may fluctuate or a manual error prone calibration is needed across different mobile platform. The main target is to propose the use of Fourier descriptors in LF. We convert the IEEE 802.11b Wi-Fi signal into a Fourier domain. Then, the Fourier descriptors are used to predict the location by applying the K-Nearest Neighbor algorithm. The results show that the effectiveness of LF methods based on Fourier descriptors lead to substantially more accurate and robust localization.
The document describes a student project to develop an A-GPS (Assisted GPS) system. 10 computer science students developed a GPS calculations module for a GSM network and an application to demonstrate its use. The project involved designing and implementing an A-GPS server to provide assisted GPS data to terminals, as well as a simulation tool to test the server's performance and an application called Trace Tool for demonstrating and testing the system.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
The system continuously collects accelerometer and GPS data from sensors on vehicles. The data is sent via LoRa networks to AWS services for processing. Lambda functions filter the data and Kinesis aggregates it into S3 storage. Anomalies are detected by comparing acceleration to statistical norms for each area. The visualizer retrieves anomaly data from S3 and plots classified anomalies on a Google Maps interface.
This document summarizes a simulation of wireless sensor networks to analyze power-efficient protocols and algorithms. It describes simulating three techniques - power control, closest-first and farthest-first routing algorithms, and sleep mode. The simulation analyzes these techniques individually and together to evaluate their impact on network lifetime and mean delay.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
This document presents a thesis on developing an intrusion detection system for wireless sensor networks using k-barrier coverage. The thesis is supervised by Mr. Sandeep Sharma and presented by Jaiprakash Nagar. It introduces wireless sensor networks and the problem of intrusion detection. It then outlines the network and mobility model, sensing model, and measurements used for coverage. The document mathematically models the average relative speed of mobile sensors, sensor coverage rate, and probability of k-barrier coverage. Results are analyzed on the effects of different parameters on k-barrier coverage probability. The conclusions discuss the performance of mobile sensor networks for intrusion detection based on k-barrier coverage.
This document describes an automated car parking system project developed by students at the University of Jordan. The objective of the project is to monitor parking lot availability using a wireless sensor network. Sensor nodes equipped with ultrasonic sensors are deployed in parking spaces and send data to a central sink node regarding space occupancy. This data is sent to a server then to a smartphone application, allowing users to check parking availability from their phones. The document discusses hardware choices for the sensor nodes, including sensors, microcontrollers and wireless communication modules. It also describes the network protocols and code used for node communication. Furthermore, it outlines the server software for storing and accessing the parking data, as well as the client smartphone application interface.
This document discusses using moments to estimate the performance of re-routing in vehicular ad hoc networks (VANETs). It first provides background on VANETs and their characteristics. It then discusses using an ant colony optimization algorithm to optimize re-routing and estimating the performance analytically using moments to allow for intermediate step analysis. This improves the accuracy of re-routing estimation by considering locations of nodes between the starting and ending points. The document provides an example algorithm and procedure for computing potential re-routes and identifying the shortest path using node locations and distances.
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
In recent years, the Mobile Wireless Sensor Network
is the emerging solution for monitoring of a specified region of
interest. Several anomalies can occur in WSNs that impair their
desired functionalities resulting in the formation of different
kinds of holes, namely: coverage holes, routing holes. Our
ultimate aim is to cover total area without coverage hole in
wireless sensor networks. We propose a comprehensive solution,
called holes detection and healing. We divided our proposed
work into two phases. The first phase consists of three sub- tasks;
Hole-identification, Hole-discovery and border detection. The
second phase treats the Hole-healing with novel concept, hole
healing area. It consists of two sub-tasks; Hole healing area
determination and node relocation.
The wireless sensor node can only be equipped with a
limited power source. In some application scenarios,
replenishment of power resources might be impossible. Sensor
node lifetime, therefore, shows a strong dependence on battery
lifetime. Hence, power conservation and power management take
on additional importance. The main task of a sensor node in a
sensor field is to detect events, perform quick local data
processing, and then transmit the data. Power consumption can
hence be divided into three domains: sensing, communication,
and data processing. One of the most commonly used Power
management techniques is to allow a node to follow sleep-wake
up-sample-compute-communicate cycle. Based on the amount of
the battery availability, by adopting the proper information
dissemenitation schemes, the network life time can be extended.
This process relies on hardware support for implementing sleep
states, permits the power consumption of a node to be reduced by
many orders of magnitude.
Improvising Network life time of Wireless sensor networks using mobile data a...Editor IJCATR
This document discusses improving the lifetime of wireless sensor networks using a mobile data aggregator. It proposes a polling-based scheme where sensor nodes transmit data to nearby polling points (PPs), which then transmit aggregated data to a mobile collector. The mobile collector plans an optimal tour to visit each PP to collect data in sequence. Simulation results show this approach reduces energy consumption and travel time compared to existing approaches, thus improving network lifetime.
The document discusses wireless sensor networks and their applications. It provides information on key aspects of wireless sensor networks including smart sensors, ad hoc network topology, wireless communication modalities, and applications such as environmental monitoring, civil structure monitoring, and health care. Distributed relaying is shown to decrease the power consumption per sensor node. Hierarchical data processing and communication architectures can improve energy efficiency in large sensor networks.
This document discusses potential methods for monitoring vehicular traffic through location monitoring and position estimation of mobile users in Sri Lanka. It analyzes both passive methods that utilize existing network signaling and active methods involving paging users. While active paging offers accurate position estimates, it could overload the network. A handset-based application that reports user position and speed to an external server is proposed as the best solution, avoiding network constraints while providing accurate estimates. Technical feasibility has been established but market factors for the application need to be addressed. An algorithm would also be required to aggregate position samples across the network into traffic speed estimates on highways.
A Novel Range-Free Localization Scheme for Wireless Sensor NetworksGiselleginaGloria
This paper present a low-cost yet effective localization scheme for the wireless sensor networks. There are many studies in the literature of locating the sensors in the wireless sensor networks. Most of them require either installing extra hardware or having a certain amount of sensor nodes with known positions. The localization scheme we propose in this paper is range-free, i.e., not requiring extra hardware devices, and meanwhile it only needs two anchor nodes with known position. Firstly, we install the first anchor node at the lower left corner (Sink X) and the other anchor node at the lower right corner (Sink Y). Then we calculate the minimum hop counts for each unknown node to both Sink X and Sink Y. According to the minimum hop count pair to Sink X and Sink Y of each node, we can virtually divide the monitored region into zones. We then estimate the coordinate of each sensor depending on its located zone. Finally, we adjust the location estimation of each sensor according to its relative position in the zone. We simulate our proposed scheme and the well-known DV-Hop method. The simulation results show that our proposed scheme is superior to the DV-Hop method under both low density and high density sensor deployments.
Iaetsd use of mobile communication in data-intensiveIaetsd Iaetsd
This document summarizes a research paper on using mobile communication to improve energy efficiency in data-intensive wireless sensor networks. The paper proposes using mobile relay nodes that move to optimize positions for transmitting data from sensor sources to a base station. An algorithm is presented that iteratively relocates the mobile relay nodes to minimize the total energy used for both wireless transmission and node movement. The algorithm finds optimal positions for relay nodes within a fixed routing tree topology without changing the tree structure. This approach aims to reduce energy consumption in a holistic way compared to other mobility approaches.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
The document describes the design and implementation of an electronic gesture recognition system using an accelerometer to control a robotic arm. The system uses an ADXL335 3-axis accelerometer attached to a human arm to capture gestures. The accelerometer outputs analog voltages that are converted to digital signals and transmitted wirelessly to an LPC1768 microcontroller. The microcontroller controls a KSR10 robotic arm in response to the received signals. Experiments showed the system could successfully control the robotic arm movements in both dynamic and static modes using human gestures detected by the accelerometer.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document describes a system to control a robotic arm wirelessly using gestures detected by an accelerometer. The system uses an ADXL335 accelerometer attached to a human arm to capture gestures. An Arduino microcontroller digitizes the analog accelerometer and flex sensor data and sends the data wirelessly to an LPC1768 Cortex M3 microcontroller board. The LPC1768 controls the movements of a 5-axis robotic arm through motor drivers based on the received gesture character commands. The goal is to allow more intuitive control of industrial robots through wireless gesture recognition compared to traditional teach pendants.
This document discusses constrained passive tracking using wireless sensor networks. It begins with an introduction to wireless sensor networks and target tracking. It then describes the proposed system for passive tracking using a wireless sensor network. The system includes initializing the network, forming clusters using K-medoids clustering, creating an object to track, determining the sensor node nearest to the object, gathering information from sensors to the base station, and analyzing the results. It discusses the K-medoids clustering and Kalman filtering algorithms used for clustering and tracking, respectively. The document provides an example of applying the K-medoids algorithm to cluster a sample dataset.
Location Update In Mobile Ad Hoc Network Using Markov ModelEditor IJMTER
The location in a mobile ad-hoc network, where each node needs to maintain its location
information. which frequently updating its location information within its neighboring region, which is
called neighborhood update (NU).and updating its location information to certain distributed location server
in the network, which is called location server update (LSU). The operation costs in location updates and the
performance losses of the target application due to location application costs which imposes question for
nodes to decide the optimal strategy to update the location information, where the optimality is used for
minimizing the costs. The location update decision problem is modeled as a Markov Decision Process
(MDP). The monotonicity properties of optimal NU and LSU operations with respect to location application
cost under a general cost setting. Separable cost structure shows the location update decisions of NU and
LSU. Which can be independently carried out without loss of optimality that is a separation property. From
the separation property of the problem structure and the monotonicity properties of optimal actions which
finds that 1) there always exists a simple optimal update rule for LSU operations 2) for NU operations. If no
prior knowledge of the MDP model is available, then also it introduces a model-free learning approach to
find a near-optimal solution for the problem.
1) The document proposes implementing an efficient K-means clustering algorithm to enhance connectivity and lifetime in wireless sensor networks.
2) It compares the proposed K-means algorithm to an existing Jumper Firefly algorithm based on energy consumption, network lifetime, and end-to-end delay.
3) Simulation results show the proposed K-means algorithm improves performance by reducing energy consumption from 16 to 12 Joules, increasing network lifetime by 96% compared to 83% for the existing algorithm, and lowering end-to-end delay from 3.7 to 2.7 seconds.
This document discusses performance analysis and fault tolerance in software environments. It begins by introducing the importance of performance analysis and fault tolerance for software, as faults can lead to losses. It then discusses different fault tolerance techniques, which generally involve some type of replication to handle node and network failures. The two main approaches are replication and coordination, which rely on modeling computation as a deterministic state machine. The document will analyze performance and fault tolerance of software environments.
Auto-navigation of Unmanned Helicopter to Detect and Extinguish Forest FireJerome Stanislaus
Auto-Navigation of unmanned helicopter to extinguish forest fire using wireless sensor networks (WSN). The prototype was made using an RC helicopter, thermostat and IRIS motes for WSN.
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
With the development in data acquisition system, information-collection plays an increasingly important role in the field of Wireless Technology. There has been tremendous increase in the use of sensors in each and every field. In order to get fast response from these sensors the delay should be reduced. Also the congestion in the network should be tackled to increase the efficiency. Wireless Sensor Networks (WSNs) consist of many tiny wireless sensors which operate in an environment in order to collect data. In a typical WSN, data is gathered from environment by sensor nodes and then transmitted to a base station. All these operations are executed by sensor nodes with keeping in mind the limitation of power. Reliable communication, power efficiency, network congestion issues are among major concerns. So in our project our main focus is to avoid the packet loss by increasing the network efficiency and handling the congestion in the network by proper buffer management. Finally visualization of processed data is done at the base station and the future enhancement could be to directly send the sensed data to cloud storage.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal,
Similar to Internet of Things: Energy Efficient Public Sensing (20)
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Internet of Things: Energy Efficient Public Sensing
1. Seminar
Internet of Things: Energy Efficient Public Sensing
Rashed Hossain Miraj
Examiner: Dr. Adnan Tariq
Supervisor: Zohaib Riaz
WS2015
Universität Stuttgart
Institut für Parallele und Verteilte Systeme
(IPVS)
Universitätsstraße 38D-70569 Stuttgart
1
2. Outline
Internet-Of-Things(IoT):
Introduction
Application Example
IoT : Public Sensing
Introduction
Opportunities
Challenges
PSense:
Naive Sensing Approach
Motivation
Introduction
Adaptive Positioning
Query Adaptation
Ad-Hoc Information exchange
Ad-Hoc Query Adaption
Evaluation
Opportunistic Position Update
Protocols:
Introduction
Energy Characteristics
Opportunistic Position Update
Scenarios
Markov Decision Process
Cost Model
Time-, Distance Based Position Update
Protocols.
Dead Reckoning Position Update
Protocols
Evaluation
DrOPS: Model Driven Optimization for
Public Sensing :
Introduction
System Model
Model Driven Approach
Model Driven Sensing Algorithm
Model Management: MOCHA
Model Management: OLA
Evaluation
Summary
2
3. Internet of Things(IoT)
What is IoT?
Connecting everyday objects with
the internet to make them smarter.
439 million smartphones added in
2014.
By 2020, there will be 50 billion!
things connected.
Huge impact on our everyday life.
3
4. Internet of Things(IoT)
Example: Industry 4.0
A German innovation concept.
The term was first used in 2011 at
the Hannover Fair.
Connects all parts of the
production process: machines,
products, systems, and people.
4
5. IoT: Public Sensing
Collecting sensor data from mobile
devices.
Real time collection of sensor data(e.g.
noise, temperature)
Number of smartphone users
worldwide will surpass 2 billion in
2016.
www.nilmedia.com
5
6. Public Sensing: Opportunities
Compared to traditional sensor networks, Public Sensing brings
two major advantages:
1. No sensors have to be deployed since most of the nowadays
mobile devices already come with a set of integrated
sensors.
2. Wide spatial range can be covered by the mobile sensors.
6
7. Public Sensing: Challenges
Sensing has to be performed in an opportunistic manner.
Maintaining certain quality of service (QoS) requirements.
Must not influence the normal operation of a mobile device.
Things to consider:
1. Battery life of a mobile device.
2. Performance of the normal operation mode of the device.
7
8. Public Sensing: Energy Efficient
Sensing Approaches
PSense.
Opportunistic Position Update Protocols.
DrOPS.
8
9. Naive Sensing Approach
Consists of one server and arbitrary number
of mobile devices.
Server accepts sensing queries 𝑄 that
contain set of desired locations.
Each sensing location specified by : spatial
coordinates (𝑥𝑙, 𝑦𝑙) and a particular sensor
type 𝑡𝑦𝑝𝑒(𝑙).
The server assigns sensing tasks to mobile
devices that move within the vicinity of the
queried sensing locations
Furthermore, a device can read a sensing
location l at time t if the following conditions
are satisfied:
1. l is compatible with m by sensor s
2. dist((𝑥𝑙, 𝑦𝑙) , (𝑥 𝑚(𝑡), 𝑦 𝑚(𝑡)) ) ≤ range(s)
www.comnsense.de
9
10. Naive Sensing Approach
The server distributes L to all mobile devices that are located in
the queried area.
After receiving L , the mobile device starts periodically updating
its position every 𝑡 𝑝𝑜𝑠 seconds.
After each position fix the device checks whether the conditions
for reading sensing locations in L are fulfilled.
If that is the case for l, the device reads l and uploads the data
to the server.
The server delivers it to the user and removes l from L.
The server notifies the devices every time L is changed.
10
11. Naive Sensing Approach: Pros
and Cons
Pros:
Provides a naive way for providing requested sensor data to the
user.
Ensures that no mobile device passes a sensing location without
noticing it (at least if 𝑡 𝑝𝑜𝑠 is chosen sufficiently small).
Cons:
High energy consumption due to continuous fixing of positions.
11
12. PSense: Why?
Existing approaches assumes that mobile device are always aware
of their position.
Position fix is a very energy consuming operation.
PSense:
Avoiding unnecessary position fixes reduces energy consumption
of mobile devices by 70%.
12
13. PSense: System Model
Each device m comes with a set of
specific sensors 𝑆 𝑚.
Each sensor 𝑠 ∈ 𝑆 𝑚 has limited
reading range 𝑟𝑎𝑛𝑔𝑒 𝑠 and type
𝑡𝑦𝑝𝑒 𝑠 which specifies type of
data that can be sensed.
Mobile device’s maximum speed
𝑣 𝑚𝑎𝑥.
Cellular mobile network for the
communication between server
and mobile devices.
13
15. Adaptive Positioning
Finds an adaptive positioning interval of length 𝑡 𝑎 that determines the
time until the next GPS fix.
𝑑 𝑚𝑖𝑛 = distance to its closest compatible sensing location l.
𝑣 𝑚𝑎𝑥 = mobile device’s maximum speed.𝑡 𝑎
=
𝑑 𝑚𝑖𝑛
𝑣 𝑚𝑎𝑥
If l is within range, reads the data immediately and uploads to server.
If the device cannot sense l, it uses the provided 𝑑 𝑚𝑖𝑛 to calculate 𝑡 𝑎 and
schedules its next position fix to time 𝑡 𝑎.
The decrease in the number of position fixes outweighs the energy spent for
sending positioning queries.
15
16. Query Adaption
Why?
Adaptive Positioning does not proactively send the set of current
sensing locations to the mobile devices.
Therefore, the individual positioning interval of some mobile
devices may no longer be appropriate when a new sensing query
arrives.
Example:
A user issues a query for data at time t from a sensing location l
that is next to a mobile device m.
If l is compatible with m, but m has already scheduled its next
position fix to some time 𝑡′> t, it is possible that m misses to read
l.
To avoid this, the server has to recalculate the distance to the
closest compatible sensing location by taking into account the
newly queried sensing locations
16
17. Query Adaption
Fig : Arrival of new sensing locations
Upon receiving a new query
Q the server checks for every
device m if there are sensing
locations l ∈ Q that are
compatible with m.
If 𝑑 𝑚𝑖𝑛
′
< 𝑑 𝑚𝑖𝑛, the server
queries device m for its
position.
Knowing this position the
server returns a fresh sensing
update.
17
18. Ad-Hoc information Exchange
Why?
Adaptive Positioning decreases the amount of GPS fixes but
increases the number of messages exchanged with server.
If a mobile device receives a sensing update from the server it
can locally forward this information via its ad-hoc interface.
Nearby mobile devices can now use this information to adapt their
respective positioning interval without communicating with the
server.
To implement this concept, the adaptive positioning algorithm is
augmented by two extensions:
First: Message Exchange
Second: Ad-hoc Query Adaptation
18
19. Message Exchange
𝑚 𝑠 𝑚 𝑟
d(l)
range(ah)
dist
Ad-hoc range
range(s)
𝑚 𝑠 sends ad-hoc broadcast. Each
receiving device 𝑚 𝑟 does the following:
1. Check if l is compatible with 𝑚 𝑟. If
not, stop.
2. Check if 𝑆𝑟⊆ 𝑆𝑆. If not, stop.
3. Compute 𝑡 𝑎
′ according to the
following equation:
𝑡 𝑎
′
=
𝑑 𝑙 − 𝑟𝑎𝑛𝑔𝑒(𝑠)
𝑣 𝑚𝑎𝑥
=
𝑑𝑖𝑠𝑡
𝑣 𝑚𝑎𝑥
4. If 𝑡 𝑎
′ is bigger than the remaining
time until the next position fix is
performed, then reschedule the next
position fix to 𝑡 𝑎
′
. If not, stop.
5. Send an ACK-message back to 𝑚 𝑟
19
20. Ad-Hoc Query Adaption
Why?
The server does not take notice of the ad-hoc messages that the
devices exchange. As a result, it cannot determine which devices
need an update if a query Q arrives.
To avoid this, the query adaption is extended as follows:
𝑚 𝑠 remembers the set of other devices 𝑀0 that returned ACK-
meesage .
If the server now receives a new sensing location which causes
an update for 𝑚 𝑠 device 𝑚 𝑠 returns the set 𝑀0 to the server.
The server subsequently queries each device m ∈ 𝑀0for its
position and returns a fresh sensing update.
Based on this update each of theses devices adapts now its
positioning interval.
20
21. Evaluation
Figure: Total Energy Consumption Figure: Positioning Operations Figure: GPRS Communication
Figure: Sensing Effectiveness
Operation Energy[mJ]
GPS Position Fix 75
GPRS Send (1000 Bit)
GPRS Receive (1000Bit)
80
40
802.11b Send (1000Bit)
802.11b Receive (1000Bit)
2
1
Table: Energy Model
21
22. Opportunistic Position Update
Protocols for Mobile devices
Location based applications (LBAs) enjoying great popularity.
The mobile object updates its position on the remote Location
Server(LS) instead of sending its position to each LBA individually.
Energy requirement by a device for sending its positions to the LS
is a big concern.
Opportunistic Position Update Protocols Improves energy
efficiency of these protocols by taking into account the energy
characteristics of mobile network interface.
22
26. Markov Decision Process(MDP)
Why?
To decide whether an opportunistic position update should be sent with
the current transmission or not.
Figure: Markov Decision Process
A generic state 𝑆 𝑑 represents
the starting point of our
decision.
Possible actions from state
𝑆 𝑑 are 𝐴 = {𝑠𝑒𝑛𝑑, 𝑠𝑒𝑛𝑑}
Three possible states 𝑆0,
𝑆1, 𝑆2
c values defines the
respective state transition
cost.
26
27. Markov Decision Process(MDP)
State 𝑆0 :
Action send is taken and an
opportunistic position update
is sent right after the current
transmission.
State 𝑆1 :
Action send is taken and no other
transmission occurs before
the quality constraint will be violated.
State 𝑆2 :
utt
1T ut
ut1t
ut
2t1t
2T
?
State 𝑆0 State 𝑆1
State 𝑆2
Figure: States of MDP
Action 𝑠𝑒𝑛𝑑 is taken and at least one
other transmission occurs on the
device before 𝑡 𝑢.
27
28. Cost Model
Relate the transition costs of MDP to energy cost as our goal is to
minimize energy consumption.
𝑐1 = 𝐸 𝑢
𝑐2 = 0
𝑐0 = 𝐸 𝑢.
𝑡 𝑢 − 𝑡
𝑡 𝑢 − 𝑡 𝑢−1
28
29. Deciding an Action
P( 𝑋𝑡 ≤ 𝑡 𝑢 |𝑋𝑡−1 = 𝜏 𝑡−1 ) <
𝑡−𝑡 𝑢−1
𝑡 𝑢−𝑡 𝑢−1
…………(1)
If this inequality is fulfilled, the expected energy costs for sending
an opportunistic position update are less than the cost of not
sending an opportunistic update.
In this case the opportunistic position update is sent.
Solving Equation (1) requires knowledge about the due time of
position updates 𝑡 𝑢 .
Estimation of 𝑡 𝑢 for the time-, distance-based and dead reckoning
position update protocols follows.
?
29
30. Time-based Update Protocol
Time-based update protocol forces a position update to the LS in a
predefined time interval δ 𝑇
𝑡 − 𝑡 𝑢−1 ≥ δ 𝑇
𝑡 𝑢−1 denotes the time when the last position update was sent.
For this protocol, all the parameters to evaluate Equation (1) are
known, since time 𝑡 𝑢 can be easily calculated based on the time of
the last update.
30
31. Distance-based Update Protocol
The update condition is defined by the Euclidean Distance
between the current position of the mobile device 𝑃𝑑(𝑡) and the
current position 𝑃𝑠(𝑡) stored on the LS.
When this distance at time t is bigger than accuracy threshold δ 𝐷, a
position update is sent:
𝑑𝑖𝑠𝑡(𝑃𝑑 𝑡 , 𝑃𝑆(𝑡)) ≥ δ 𝐷
𝑡 𝑢 is not known at decision time, but is needed to calculate eqn. 1
Figure: Prediction of 𝑡 𝑢
The time until the next update can be
predicted by the value of Δ𝑇 for which
the distance between 𝑃𝑑 𝑡 + Δ𝑡. 𝑣
and 𝑃𝑆(𝑡) is equal to the threshold δ 𝐷.
31
32. Dead Reckoning Update Protocol
Defines a threshold on the deviation between the position on the
device and the LS.
But the position on the LS is not statically set to the position that
was contained in the last position update rather evolves over time.
LS estimates the device position 𝑃𝑒𝑠𝑡 𝑡 at time t as follows:
𝑃𝑒𝑠𝑡 𝑡 = 𝑃𝑢−1 + 𝑣(𝑡 − 𝑡 𝑢−1)
Position update is triggered at time t if
𝑑𝑖𝑠𝑡(𝑃𝑑 𝑡 , 𝑃𝑒𝑠𝑡(𝑡)) ≥ δ 𝐷𝑅
Figure: Prediction of 𝑡 𝑢
𝑡 𝑢 needs to be predicted.
The time until the next position
update can be predicted by predicted
by Δ𝑇 for which the distance between
𝑃𝑑 𝑡 + Δ𝑡. 𝑣 𝑑and 𝑃𝑒𝑠𝑆 𝑡 + Δ𝑡. 𝑣 is
equal to the threshold δ 𝐷𝑟.
32
33. Evaluation – Energy Consumption
Figure: Energy Consumption of Update Protocols
33
34. Evaluation: Update Messages
Figure: Sent Position updates
The basic approach sends lowest number of position updates.
Non-predictive approach sends the most position updates.
Opportunistic approach can be considerer as tradeoff between these two
extremes. Although number of position updates increases compared to
the basic approach, a large fraction of messages are opportunistically
sent in an energy efficient manner.
34
35. Evaluation – Position Accuracy
Figure: Distance Based Protocol Figure: Dead Reckoning Protocol
The position of the mobile device is updated more often on the LS and
the deviation between device position and LS position decreases on
average.
Thus opportunistic extensions not only decrease the energy consumption
of the basic update protocols but also increase the position accuracy on
the LS.
35
36. DrOPS: Model-Driven Optimization of
Public Sensing Systems Motivation
Motivation:
Due to the mobility of participants, capturing sensor data at certain
points of interests (POI) is more challenging than for fixed sensor
networks where a sensor could simply be installed at each POI.
Existing model driven sensing approaches takes a long time to
obtain the model.
No data is available if there is no sensor in the vicinity of a POI.
36
37. Model-Driven Approach: Introduction
Sensors placed on walls facing the sun will report similar values.
Sensors placed on walls facing away from the sun will report similar
values.
Sensors in each group show a high correlation.
37
38. DrOPS: Introduction
DrOPS utilizes a model-driven
approach, where readings from mobile
smartphones is reduced by inferring
readings from the model.
Virtual Sensors (v-sensors) are placed
at each POI as a mobility transparent
abstraction of PS System.
PS system is responsible for selecting
suitable mobile devices in the vicinity
of the v-sensor to capture the data
associated with this v-sensor.
Model is used to infer readings of
unavailable v-sensors.
38
39. System Model and Architecture
Consists of gateway server
and mobile devices.
DrOPS accepts queries
Q=(V,P,QoS) issued by clients
V= set of v-sensors
P= sampling period
QoS= set of quality parameters
set by client.
At the end of each sampling
period a result set 𝑅 𝑄 is sent
to client.
𝑅 𝑄 contains all effective
readings as well as inferred
readings computed by the
gateway for virtual sensors.
Figure: Sensing Task execution
39
40. Model-Driven Approach
Initially, DrOPS uses the basic sensing algorithm to execute the
query and learns the model in parallel.
Once a model is created, DrOPS switches to an optimized operation
phase.
A validity check algorithm continuously monitors model accuracy and
causes an update of the model if necessary.
The inference process INFER(MGD,P) infers readings of unavailable
v-sensors using model.
Identifies strongly correlated v-sensors to infer other sensors’ values.
40
46. Summary
PSense:
Significantly reduces the number of GPS fixes.
Adaptive sensing approach increase amount of cellular messages.
Ad-Hoc exchange mechanism replaces energy intensive cellular
messages.
Opportunistic Position Update Protocols:
Energy characteristics of cellular network interface is taken into account.
Position updates are sent opportunistically together with other messages.
Markov Decision Process optimizes the cost with respect to energy.
DrOPS:
Reduces set of mobile nodes that are queried to reduce energy
consumption.
Missing readings are compensated.
Extra
46