This paper considers the problem of localizing a static transmitter using a robot with a single receiving antenna and a single communication chamiel in unknown complex environments. Existing solutions using Time -of-A...
详细信息
ISBN:
(纸本)9781665495127
This paper considers the problem of localizing a static transmitter using a robot with a single receiving antenna and a single communication chamiel in unknown complex environments. Existing solutions using Time -of-Arrival (TOA) and Angle -of-Arrival (AOA) rely on complex wireless communication systems with multiple receive antennas or multiple communication channels, which are not available for robots with off-the -shelf low-cost radios. This paper develops a localization framework using Received Signal Strength (RSS) to estimate unknown channel model parameters considering mullipath fading and spatial -correlated shadowing effects. The robot moves along a predefined trajectory to collect RSS data. AOA information is also estimated and integrated with the robot SLAM (Simultaneous Localization and Mapping) results to improve the localization accuracy. Numerical simulations and experiments in an indoor environment are conducted. Results show that 90% of the estimation error is smaller than 2 m to localize a randomly placed transmitter in a 10 x 10 m(2) area.
On trains, predetermined maintenance of wheels requires significant amounts of resources. Therefore, it is desirable to replace the scheduled maintenance by a condition-based maintenance strategy, where manual mainten...
详细信息
ISBN:
(纸本)9781509014590
On trains, predetermined maintenance of wheels requires significant amounts of resources. Therefore, it is desirable to replace the scheduled maintenance by a condition-based maintenance strategy, where manual maintenance only takes place when it is actually necessary. For a minimally invasive retrofitting of wagons, a system consisting of a Wireless sensor Network (WSN) powered by energy-harvesting offers the most convenient and least costly solution. However, tight time synchronization and high energy efficiency is essential for a successful realization. Established time synchronization techniques for WSNs do not meet the special requirements for this scenario. Looking for an alternative, we noticed that one of the main components of WSNs, the sensor, has been barely exploited for this problem. We will demonstrate the feasibility of using sensor-data-based time synchronization instead of classical message-based synchronization in wireless networks for the example scenario of on-board wheel diameter measurements on trains. In contrast to popular current time synchronization protocols for WSNs, our approach is compatible with every wireless hardware. We perform a simulative evaluation of our approach on various wireless protocols based on message delay distributions measured on Raspberry Pi.
We propose a structure named Cohorts to solve the problem of the access control of multiple entries to a critical section. Our solution is formalized as forming quorums in a k-coterie. It is resilient to node failures...
详细信息
We propose a structure named Cohorts to solve the problem of the access control of multiple entries to a critical section. Our solution is formalized as forming quorums in a k-coterie. It is resilient to node failures and/or network partitioning, invokes constant expected message cost and has comparably high availability.
This research paper aims to evaluate the efficiency and effectiveness of FLIDS in detecting multiple jamming attacks. The study conducted experiments by placing two jammers at sixteen different positions to examine th...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
This research paper aims to evaluate the efficiency and effectiveness of FLIDS in detecting multiple jamming attacks. The study conducted experiments by placing two jammers at sixteen different positions to examine the system's performance. The experiments were carried out in various scenarios of Contiki 3.1 OS and the Cooja Simulator tool using the Routing Protocol for Low-Power and Lossy Networks (RPL). Furthermore, the optimal time frame for the solution to detect real-time jamming attacks was determined after analyzing the data. The simulation results demonstrate that Fuzzy Logic is an effective technique for recognizing multiple jamming attacks with high accuracy, precision, and recall rate in different scenarios.
With the increasing deployment of Wireless sensor Networks (WSN) there has been a demand for power efficient, reliable, Wireless network based distributedcomputing system (WDC). The fading nature of the wireless chan...
详细信息
ISBN:
(纸本)9781479925711
With the increasing deployment of Wireless sensor Networks (WSN) there has been a demand for power efficient, reliable, Wireless network based distributedcomputing system (WDC). The fading nature of the wireless channel offer several challenges to WDC over traditional distributedcomputing system. Orthogonal Frequency Division Multiple Access (OFDMA) based wireless communication systems offer several advantages and are increasingly replacing single carrier communication systems. In this paper we propose resource allocation for OFDMA based wireless distributedcomputing system. The performance of the proposed system is analyzed using computer simulation.
Robustness in wireless sensor networks (WSNs) is a critical factor that largely depends on their network topology and on how devices can react to disruptions, including node and link failures. This article presents a ...
详细信息
ISBN:
(纸本)9781509014590
Robustness in wireless sensor networks (WSNs) is a critical factor that largely depends on their network topology and on how devices can react to disruptions, including node and link failures. This article presents a novel solution to obtain robust WSNs by exploiting principles of biological robustness at nanoscale. Specifically, we consider Gene Regulatory Networks (GRNs) as a model for the interaction between genes in living organisms. GRNs have evolved over millions of years to provide robustness against adverse factors in cells and their environment. Based on this observation, we apply a method to build robust WSNs, called bio-inspired WSNs, by establishing a correspondence between the topology of GRNs and that of already-deployed WSNs. Through simulation in realistic conditions, we demonstrate that bio-inspired WSNs are more reliable than existing solutions for the design of robust WSNs. We also show that communications in bio-inspired WSNs have lower latency as well as lower energy consumption than the state of the art.
We propose a comprehensive health monitoring of astronauts which is based on Ballistocardiography (BCG). BCG uses high-precision accelerometers to measure the motion of the heart at the body surface. In contrast to co...
详细信息
ISBN:
(纸本)9781665495127
We propose a comprehensive health monitoring of astronauts which is based on Ballistocardiography (BCG). BCG uses high-precision accelerometers to measure the motion of the heart at the body surface. In contrast to conventional methods (e.g. Electrocardiography (ECG)), BCG enables the derivation of heart-related parameters that can otherwise only be recorded by imaging methods such as echocardiography. A huge issue is the signal quality of the acceleration measurement, however, by means of differential arrangement of digital acceleration sensors, the signal quality and also the susceptibility to interference can be reduced when measuring the smallest accelerations. In preparation for a BCG experiment on the international Space Station (ISS), a pre-flight measurement system was developed whose architectural design is similar to the flight hardware, but extended by a reference ECG. To simplify measurement campaigns, the simultaneously recorded BCG and ECG data can be visualized in real time, which will be shown in this demo.
In this paper, we study gossip algorithms in communication models that describe the peer-to-peer networking functionality included in most standard smartphone operating systems. We begin by describing and analyzing a ...
详细信息
ISBN:
(纸本)9781665439299
In this paper, we study gossip algorithms in communication models that describe the peer-to-peer networking functionality included in most standard smartphone operating systems. We begin by describing and analyzing a new synchronous gossip algorithm in this setting that features both a faster round complexity and simpler operation than the best-known existing solutions. We also prove a new lower bound on the rounds required to solve gossip that resolves a minor open question by establishing that existing synchronous solutions are within logarithmic factors of optimal. We then adapt our synchronous algorithm to produce a novel gossip strategy for an asynchronous model that directly captures the interface of a standard smartphone peer-to-peer networking library (enabling algorithms described in this model to be easily implemented on real phones). Using new analysis techniques, we prove that this asynchronous strategy efficiently solves gossip. This is the first known efficient asynchronous information dissemination result for the smartphone peer-to-peer setting. We argue that our new strategy can be used to implement effective information spreading subroutines in real world smartphone peer-to-peer network applications, and that the analytical tools we developed to analyze it can be leveraged to produce other broadly useful algorithmic strategies for this increasingly important setting.
We present key aspects (hardware, software, topology, networking) of SenseWall, an experimental sensor network test-bed we have created for the implementation and engineering of distributedsensor network algorithms. ...
详细信息
ISBN:
(纸本)9781457705137
We present key aspects (hardware, software, topology, networking) of SenseWall, an experimental sensor network test-bed we have created for the implementation and engineering of distributedsensor network algorithms. We then describe how SenseWall has been in particular used to implement two recent state of the art algorithms for energy balanced sensor data propagation. We elaborate on the issues and challenges created by the restrictions and particularities of the experimental test-bed and how we dealt with them. We also carry out a detailed performance evaluation comparing the energy balance protocols to two baseline protocols that include only either single hop or direct data transmissions.
Although the problem of k-area coverage has been intensively investigated for dense wireless sensor networks (WSNs), how to arrive at a k-coverage sensor deployment that optimizes certain objectives in relatively spar...
详细信息
ISBN:
(纸本)9781457702952
Although the problem of k-area coverage has been intensively investigated for dense wireless sensor networks (WSNs), how to arrive at a k-coverage sensor deployment that optimizes certain objectives in relatively sparse WSNs still faces both theoretical and practical difficulties. In this paper, we present a practical algorithm LAACAD (Load bAlancing k-Area Coverage through Autonomous Deployment) to move sensor nodes toward k-area coverage, aiming at minimizing the maximum sensing range required by the nodes. LAACAD enables purely autonomous node deployment as it only entails localized computations. We prove the convergence of the algorithm, as well as the (local) optimality of the output. We also show that our optimization objective is closely related to other frequently considered objectives. Therefore, our practical algorithm design also contributes to the theoretical understanding of the k-area coverage problem. Finally, we use extensive simulation results both to confirm our theoretical claims and to demonstrate the efficacy of LAACAD.
暂无评论