This paper presents the application of computer systems to provide distributed decision making for intelligent logistics using a communications system architecture enabled by a multi-band antenna system. This communic...
详细信息
This paper presents the application of computer systems to provide distributed decision making for intelligent logistics using a communications system architecture enabled by a multi-band antenna system. This communication system architecture is described for a commercial vehicle application that is linked to off board databases for distributed decision making. The distributed decision making provides useful functions such as 1) need for servicing and location of the nearest service center with the necessary parts in stock, 2) routing and navigation and 3) load brokering and co-ordination. The paper references a U.S. patent that was granted prior to the introduction of the component sensor and communication technology which enable the overall system architecture to be practical. The paper also references a U. S patent for a multi-band antenna issued in 2006. These enabling technologies are described and referenced herein. Moreover recent progress in the development of distributed intelligent and multi-agent control systems is being published which will allow the realization of the communications system architecture.
For wireless sensor networks (WSNs), It Is a challenging task how to schedule the energy resource to extend the network lifetime due to the fact that WSNs are usually powered by limited and non-rechargeable battery. A...
详细信息
Communication between arbitrary pairs of nodes has become critical to support in emerging sensor networking applications. Traditional routing techniques for multi-hop wireless networks either require high control over...
详细信息
Communication between arbitrary pairs of nodes has become critical to support in emerging sensor networking applications. Traditional routing techniques for multi-hop wireless networks either require high control overhead in computing and maintaining routes, or may lead to unbounded route-stretch. In order to bound the route-stretch, we propose a distributed shortest-path roadmap based routing paradigm that embodies two ideas: routing hole approximation that summaries the critical information about hole boundaries and controlled advertisement that advertises the boundary information of each hole within limited neighborhoods. We show that our approach makes a desired tradeoff between the worst case route-stretch and the message overhead through both analysis and simulations.
The usage of workflow technology to model and execute business processes is widespread in many enterprises and within the software industry. With the growing maturity of sensors, wireless communication, and distribute...
详细信息
The usage of workflow technology to model and execute business processes is widespread in many enterprises and within the software industry. With the growing maturity of sensors, wireless communication, and distributedcomputing environments, we can enhance this approach to enable smart workflows, which are business processes crossing the boundary to the physical world. Applications for such processes can be found in many application domains, like logistics or in smart factory environments. To realize smart workflows, workflow engines can be coupled with existing context provisioning systems. However, there is a gap between the rather low- level provisioning of context (e.g., sensor data and stock information) and the concepts needed in smart workflows (e.g., "is a spare tool available?"). The main contribution of this paper is to bridge this gap: we show how integration processes can be used to provide context information at different semantical levels for smart workflows.
In this paper, we propose a novel duty cycling algorithm for a large-scale dense wireless sensor networks. The proposed algorithm is based on a social behavior of nodes in the sense that individual node's sleep/wa...
详细信息
ISBN:
(纸本)9781424431748
In this paper, we propose a novel duty cycling algorithm for a large-scale dense wireless sensor networks. The proposed algorithm is based on a social behavior of nodes in the sense that individual node's sleep/wakeup decision is influenced by the state of its neighbors. We analyze the behavior of the proposed duty cycling algorithm using a stochastic spatial process. In particular, we consider a geometric form of neighborhood dependence and a reversible Markov chain, and apply this model to analyze the behavior of the duty cycling network. We then identify a set of parameters for the reversible spatial process model, and study the steady state of the network with respect to these parameters. We report that our algorithm is scalable to a large network, and can effectively control the active node density while achieving a small variance. We also report that the social behavior of nodes has interesting and non-obvious impacts on the performance of duty cycling. Finally, we present how to set the parameters of the algorithm to obtain a desirable duty cycling behavior.
Wireless sensor networks become ubiquitous to collect people's information in many people-centric applications, such as, health care, smart space and public safety. Because any misusage of these personal data migh...
详细信息
Wireless sensor networks become ubiquitous to collect people's information in many people-centric applications, such as, health care, smart space and public safety. Because any misusage of these personal data might result in the leakage of privacy, it is expected that the data requesters can only access to the data what they are entitled to read. Based on a revised hash chain technique, we proposed a novel time-based privacy protection (TPP) scheme for multi-attribute data in WSNs. In the scheme, all the personal data are divided into 2-D subspaces representing data attribute and generation time. Data in each subspace is encrypted with a sub-key before its transmission to the sink. Anyone who wants to read data attribute at a particular time must get the corresponding sub-key from the sender node. TPP can generate a sub-key for data in each subspace in an efficient manner in terms of less sub-key generation time and low memory space usage. The simulation results show that the schemes can be applied to the resource limited WSNs efficiently.
Detecting event regions in a monitored environment is a canonical task of wireless sensor networks (WSNs). It is a hard problem because sensor nodes are prone to failures and have scarce energy. In this paper, we seek...
详细信息
Detecting event regions in a monitored environment is a canonical task of wireless sensor networks (WSNs). It is a hard problem because sensor nodes are prone to failures and have scarce energy. In this paper, we seek distributed and localized algorithms for fault-tolerant event region detection. Most existing algorithms only assume that events are spatially correlated, but we argue that events are usually both spatially and temporally correlated. By examining the temporal correlation of sensor measurements, we propose two detection algorithms by applying statistical hypothesis test (SHT). Our analyses show that SHT-based algorithm is more accurate in detecting event regions. Moreover, it is more energy efficient since it gets rid of frequent measurement exchanges. In order to improve the capability of fault recognition, we extend SHT-based algorithm by examining both spatial and temporal correlations of sensor measurements, and our analyses show that extended SHT-based algorithm can recognize almost all faults when sensor network is densely deployed.
Ubiquitously available mobile devices can contribute to grids not only for accessing resources but also to provide resources, such as, computational power or memory in mobile scenarios. When utilizing networked mobile...
详细信息
Ubiquitously available mobile devices can contribute to grids not only for accessing resources but also to provide resources, such as, computational power or memory in mobile scenarios. When utilizing networked mobile resources challenges arise due to, e.g., disconnections, disturbances on the wireless medium, and limited energy *** propose an opportunistic job scheduling approach to harness cycles. Mobile nodes decide autonomously which job to take by matching the job's requirements against their capabilities and coordinate among each other based on shared job queues. Reactive and proactive fault tolerance mechanisms assure *** main contribution of this work is the introduction of five different fairness strategies for self-organizing balanced load distribution based on gossiping about the other mobile nodes' states and comparing the own status against this information. In simulation runs, we achieved an improvement of fair load distribution which remained robust even in the presence of faults.
With the development of electronic and networking technologies, ubiquitous computing is now an exploring focused area. Due to characteristics of ubiquitous computing, privacy and security issues are always quite chall...
详细信息
ISBN:
(纸本)9781424418657
With the development of electronic and networking technologies, ubiquitous computing is now an exploring focused area. Due to characteristics of ubiquitous computing, privacy and security issues are always quite challenging for application development. This paper presents a novel paradigm to enhance the privacy and security in ubiquitous environments. Unlike previous context model, the proposed composite sensor-based context model (Comsensor) captures both complicated context entities and security requirements. Security agent governs security and privacy by privacy rules defined in Comsensor. One security agent is responsible for privacy management for one context objects. Sensitive context raw data and information are kept only in distributed security agents, from which context queries are processed and context information is disclosed in different accurate levels according to privacy rules. Based on Comsensor and security agent, decentralized trust management architecture is proposed, which is appropriate for different kinds of ubiquitous applications. Examining results on a prototype show that this paradigm is scalable and runs in real-time mode.
Intelligent agents offer a viable paradigm for enabling AmI applications and services. As WSN technologies are anticipated to provide an indispensable component in many application domains, the need for enabling the a...
详细信息
Intelligent agents offer a viable paradigm for enabling AmI applications and services. As WSN technologies are anticipated to provide an indispensable component in many application domains, the need for enabling the agent paradigm to encompass such technologies becomes more urgent. The resource-constrained ad-hoc nature of WSNs poses significant challenges to conventional agent frameworks. In particular, the implications for agent functionality and behaviour in a WSN context demand that issues such as unreliable message delivery and limited power resources, amongst others, be considered. In this paper, the practical issues of agent migration and communication are considered in light of WSN constraints. The discussion is illustrated through a description of approaches adopted by Agent Factory Micro Edition (AFME).
暂无评论