Yohannes Bishaw presented on wireless underground sensor networks (WUSN). WUSN consist of wireless sensors buried completely underground to monitor conditions like soil information. This differs from above-ground wireless networks due to the challenging underground communication medium. WUSN offer applications in intelligent irrigation and agriculture but face design challenges including power conservation, topology planning, antenna design for underground use, and operating in harsh underground environments. The presentation covered types of wireless sensor networks, applications of WUSN, current underground sensing technology, and communication architecture considerations for WUSN.
Investigation of energy efficient protocols based on stable clustering for en...journalBEEI
There are certain challenges faced with wireless sensor networks (WSNs) performances, consumption can be seen amongst all these challenges as a serious area of research. Data from sensor nodes are transmitted by most WSN energy either among many nodes or to the base station (BS), and due this connection, several routing protocols were developed for supporting in data transmission in the WSNs. Extending network lifetime in an operational environment is the major objective of the wireless sensor network. Charging or exchanging sensor node batteries is almost impossible. Energy balancing and energy efficiency are significant research scopes as per designing of routing protocols aimed at self-organized WSNs. A heterogeneous WSN is one where every node has different amount of energy linked to it before it is deployed in a network. Therefore, different energy efficient routing protocols have been proposed which enables lesser consumption of energy, longer stability period which leads to the network lifetime increasing. In this study, the average energy of a WSN is computed after every logical round of operation for our protocol-HPEEA and compare it with two well-known heterogeneous protocols namely-SEP and CCS. At the end of the considered number of logical operations, MATLAB with simulation results confirm that HPEEA protocol have a reduction in the energy consumption compared to other protocols.
INTRODUCTION TO WIRELESS SENSOR NETWORKS.
This powerpoint generally defines Wireless Sensor Networks, the advantages, disadvantages and the general types.
Development in the technology of sensor such as Micro Electro Mechanical Systems (MEMS), wireless communications, embedded systems, distributed processing and wireless sensor applications have contributed a large transformation in Wireless
Sensor Network (WSN) recently. It assists and improves work performance both in the field of industry and our daily life. Wireless Sensor Network has been widely used in many areas especially for surveillance and monitoring in agriculture and habitat monitoring. Environment monitoring has become an important field of control and protection, providing real-time system and control communication
with the physical world. An intelligent and smart Wireless Sensor Network system can gather and process a large amount of data from the beginning of the monitoring and manage air quality, the conditions of traffic, to weather situations.
Investigation of energy efficient protocols based on stable clustering for en...journalBEEI
There are certain challenges faced with wireless sensor networks (WSNs) performances, consumption can be seen amongst all these challenges as a serious area of research. Data from sensor nodes are transmitted by most WSN energy either among many nodes or to the base station (BS), and due this connection, several routing protocols were developed for supporting in data transmission in the WSNs. Extending network lifetime in an operational environment is the major objective of the wireless sensor network. Charging or exchanging sensor node batteries is almost impossible. Energy balancing and energy efficiency are significant research scopes as per designing of routing protocols aimed at self-organized WSNs. A heterogeneous WSN is one where every node has different amount of energy linked to it before it is deployed in a network. Therefore, different energy efficient routing protocols have been proposed which enables lesser consumption of energy, longer stability period which leads to the network lifetime increasing. In this study, the average energy of a WSN is computed after every logical round of operation for our protocol-HPEEA and compare it with two well-known heterogeneous protocols namely-SEP and CCS. At the end of the considered number of logical operations, MATLAB with simulation results confirm that HPEEA protocol have a reduction in the energy consumption compared to other protocols.
INTRODUCTION TO WIRELESS SENSOR NETWORKS.
This powerpoint generally defines Wireless Sensor Networks, the advantages, disadvantages and the general types.
Development in the technology of sensor such as Micro Electro Mechanical Systems (MEMS), wireless communications, embedded systems, distributed processing and wireless sensor applications have contributed a large transformation in Wireless
Sensor Network (WSN) recently. It assists and improves work performance both in the field of industry and our daily life. Wireless Sensor Network has been widely used in many areas especially for surveillance and monitoring in agriculture and habitat monitoring. Environment monitoring has become an important field of control and protection, providing real-time system and control communication
with the physical world. An intelligent and smart Wireless Sensor Network system can gather and process a large amount of data from the beginning of the monitoring and manage air quality, the conditions of traffic, to weather situations.
Analysis of CODBR and CEEDBR Protocols in Underwater Wireless Sensor Networksbijcicnjounal
UWSNs (underwater wireless sensor networks) are essential for doing any type of task underwater. Huge broadcast lag, great error degree, small bandwidth, and restricted energy in Underwater Sensor Networks interest concentration of utmost investigators. In UWSNs, the efficient use of energy is one of the main problems, as the substitution of energy sources in this kind of location is extremely costly. UWSNs are utilized in many fields, like measuring pollution, issuing tsunami cautions, conducting offshore surveys, and strategic tracing. For numerous functions, the efficacy and dependability of network regarding prominent operation, energy preservation, small bit error rate, and decreased interruption are fundamental. Nevertheless, UWSN’s exclusive features like small bandwidth accessibility, large interruptions in broadcast, very vivacious network topology, and extreme possibility of error present numerous problems in the growth of effective and dependable communication procedures. As opposed to current deepness-based routing techniques, we are focusing on CoDBR (Cooperative Depth-based Routing) and CEEDBR (Cooperative Energy Efficient Depth-based Routing) procedures to improve network lifespan, energy efficacy, and amount.
Analysis of CoDBR and CEEDBR protocols in underwater wireless sensor networksbijcicnjournal
Underwater wireless sensor networks (UWSNs) are essential for doing any type of task underwater. Huge broadcast lag, great error degree, small bandwidth, and restricted energy in Underwater Sensor Networks interest concentration of utmost investigators. In UWSNs, the efficient use of energy is one of the main problems, as the substitution of energy sources in this kind of location is extremely costly. UWSNs are utilized in many fields, like measuring pollution, issuing tsunami cautions, conducting offshore surveys, and strategic tracing. For numerous functions, the efficacy and dependability of network regarding prominent operation, energy preservation, small bit error rate, and decreased interruption are fundamental. Nevertheless, UWSN’s exclusive features like small bandwidth accessibility, large interruptions in broadcast, very vivacious network topology, and extreme possibility of error present numerous problems in the growth of effective and dependable communication procedures. As opposed to current deepness-based routing techniques, we are focusing on CoDBR (Cooperative Depthbased Routing) and CEEDBR (Cooperative Energy Efficient Depth-based Routing) procedures to improve network lifespan, energy efficacy, and amount.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In recent years, many of the bridges are monitored using non-destructive testing methods. These methods are used for checking the structural damage, wreckage, strength of the bridges. To reduce the human losses, economic losses, protect the strength and structure of bridge we are introducing a smart bridge monitoring using sensors where it gives high and low values depending upon the problem occurred in the bridge. Now a day we are in hike of power supply, so we are using Wireless Sensor Networks (WSN) technology for regular monitoring of the bridge which consumes less power with accurate values. This project describes the real time working and getting real time values. Outcome of the project is to bring a product based module. R. Dhivya Devi | S. Dinesh | S. Gowri Shankar | K. Ravi Teja"Pontem Monitoring using IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11517.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11517/pontem-monitoring-using-iot/r-dhivya-devi
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
Similar to Wireless underground Sensor Network based on IOT water saved agriculture (20)
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Wireless underground Sensor Network based on IOT water saved agriculture
1. State of the Art Seminar
Presentation on
IOT-WUSN(Wireless Underground Sensor networks )
Presented by Yohannes Bishaw
EmailJohn.fhy@gmail.com
2. Contents Covered
Introduction
Types of WUSN
Current technology for WUSN
WUSN design challenges
Conclusion
Application of WUSN
Communication Architecture WUSN
3. Introduction
The Internet of things (IoT) is the inter-networking of physical
devices, vehicles (also referred to as "connected devices" and "smart
devices"), buildings, and other items—embedded with electronics,
software, sensors, actuators, and network connectivity that enable
these objects to collect and exchange data.
4. Introduction…
In WUSN the node is completely underground.
WUSN consist of wireless devices that operate below the ground
surface. These devices are buried completely under dense soil. The
main difference between WUSN and the terrestrial wireless sensor
network is the communication medium.
Wireless Underground Sensor Networks (WUSN) have the potential to
impact a wide variety of new applications including intelligent
irrigation, soil information monitoring, etc, the internet of tings for
water-saving agriculture.
5. Types of WSN
Terrestrial WSN Distributed in given area either in ad-hoc manner
Under Ground WSN Sensors buried underground , agriculture or
in cave or mines that monitors underground conditions.
Under Water WSN Sensors are located under water.
Multimedia WSN sensors are equipped with cameras and
microphones.
7. Application of wireless underground sensor
network
Environmental monitoring of the water-saving agriculture
Safety detection of mine
Quality monitoring of underground facilities
Navigation of ground vehicle
Intelligent mines
8. Current technology for underground sensing
The current system consists of a buried sensor and a data logger on the
surface
Very useful for a variety of applications
Suffer from several shortcomings when compared to wireless
underground sensor networks
Concealment
Ease of deployment
Timeliness of data
Reliability
Coverage density
9. Concealment
In current systems the data loggers are deployed on surface
Communication is easier as no underground communication is
involved
Above ground equipment is vulnerable to agricultural and landscaping
equipment or unacceptable for aesthetic reasons
In WUSN the equipment is underground secure from any theft and
protected from damage
10. Ease of deployment
Current technology uses wired system
Tough to add new sensors or data loggers
No scalability issues with WUSN as its fully wireless
Timeliness of data
Due to wireless nature the data from sensors is forwarded in real
time to sink
In data loggers the data may be stored for later retrieval
11. Reliability
Current systems are fully dependent on data loggers
Data logger failure means whole network failure
WUSN eliminate the need of data logger
Each sensor can forward sensor readings independently
WUSN’s are self healing
12. Coverage density
Current systems require the sensor to be deployed close to the data
logger.
It results in less coverage.
WUSN eliminate the need of data logger.
Sensors can be deployed anywhere , hence increasing the coverage area.
14. Power conservation
Underground sensor nodes require more power as attenuation is more
Difficult to recharge or replace batteries
Solar or any alternate energy form also can’t be used
Power conservation is the key
Should be implemented by using power efficient hardware and
communication protocols
15. Topology design
Considerations
Application-The density of sensor deployment is dictated by the
application. Security application require dense whereas soil monitoring
less dense deployment.
Power usage minimization-Power usage can be minimized by designing
a topology with a large number of short-distance hops rather than a
smaller number of long-distance hops.
Cost-Deeper and Denser deployments result in more costs. Establish
trade offs.
16. Underground topology
All sensor devices underground
Sink may be underground or above it
Can be single depth or multi depth
Provides maximum concealment of network
Ground air ground path can be used
17. Hybrid topology
Mixture of underground and aboveground sensor devices
Power intensive underground hops can be traded for less expensive
hops in a terrestrial network.
Terrestrial devices can be easily recharger or replaced
Network is not fully concealed
18. Antenna design
Issues to be considered
Variable requirements-Devices near the surface air interface have
different requirements from those deeper inside as they suffer from
reflection.
Size-Lower frequencies require larger antennas, this is a challenge as
sensor device size should be small.
Directionality-The antennas should be oriented for both horizontal
and vertical communication.
19. Environmental extremes
Underground environment is not ideal for electronic devices
Protection from water, animals, insects etc. is needed.
Devices should be resistant to pressure of people or objects moving
overhead
21. Physical layer
Lower frequencies are ideal for WUSN
They face less attenuation but the antenna size becomes large
Lower frequencies result in lesser bandwidth
Due to this the data rate in WUSN is very less
22. Data link layer
In WUSN the focus should be on less retransmissions
Traditional link layer protocols are contention based or TDMA
based
Collision avoidance using CTS/RTS involves too much overhead
In TDMA based scheme the synchronization may be lost between
nodes
23. Network layer
Ad hoc routing protocols may be proactive, reactive or geographical
Both proactive and reactive are not applicable to WUSN due to
signaling overhead and synchronization issues
Geographical routing can be helpful for WUSN only in some cases
Routing protocols should be dynamic as link costs change due to
soil conditions, water etc.
24. Transport layer
Performs function of flow control and congestion control
Congestion control can be done by routing data to terrestrial relays
which are capable of a higher data rate
Window based mechanism for flow control may not be applicable to
WUSN as retransmissions are more
In WUSN retransmission should be less to save energy
25. Conclusion
We introduced the concept of WUSNs in which sensor devices are
deployed completely below ground. There e are existing applications of
underground sensing, such as soil monitoring for agriculture.
Sensor Networks are emerging as a great aid in improving agricultural
productivity, quality and resource optimization.
Very application dependent and close interaction between agriculture
scientist and ICT researchers will help.
Several challenges like underground wireless channel, less bandwidth,
power conservation etc.