This paper demonstrates a technique to write in air using Micaz motes. The application, named MicaPen is low-cost and can be used by the disabled who does not have fingers or limbs. Patients can wear the mote as a wri...
详细信息
ISBN:
(纸本)9781728143514
This paper demonstrates a technique to write in air using Micaz motes. The application, named MicaPen is low-cost and can be used by the disabled who does not have fingers or limbs. Patients can wear the mote as a wrist watch or bracelet and move their hands based on what character they want to write. The mote detects the movement pattern using the accelerometer of MTS310 sensorboard and displays the characters on the screen. The application can also be extended in several applications including virtual touchscreen or remotely interact with different controlled devices.
Leveraging the concept of controlled node mobility in this paper we develop an algorithm for tracking and controlling proximity malware propagation in Wireless sensor Networks (WSN). Our proposal aims at: (i) notifyin...
详细信息
ISBN:
(纸本)9781479946181
Leveraging the concept of controlled node mobility in this paper we develop an algorithm for tracking and controlling proximity malware propagation in Wireless sensor Networks (WSN). Our proposal aims at: (i) notifying the nodes of malware propagation, (ii) leading a flying robot along a path in the WSN that guarantees the minimum recovery time to (iii) heal the infected nodes. We formulate the targeted curing problem as a binary integer problem and determine the optimal solution by a central solver. We use the analytical result as a benchmark to evaluate the recovery time of the proposed solution. The achieved results show a satisfactory performance in terms of tracking the presence of an ongoing epidemic and healing the nodes.
Constrained Application Protocol (CoAP) was developed to support the communication between resource constrained nodes via low-power links. As an Internet protocol, CoAP needs congestion control primarily to stabilize ...
详细信息
ISBN:
(纸本)9781509014590
Constrained Application Protocol (CoAP) was developed to support the communication between resource constrained nodes via low-power links. As an Internet protocol, CoAP needs congestion control primarily to stabilize the networking operation. In this paper we propose a new round trip time based adaptive congestion control scheme, which improves CoAP by utilizing the retransmission count information in estimating the retransmission timeout. An experiment is conducted based on Californium CoAP framework and real devices. It shows that the proposed scheme significantly improves CoAP in terms of throughput and rate of successful transaction.
We present MaWi - a smart phone based scalable indoor localization system. Central to MaWi is a novel framework combining two self-contained but complementary localization techniques: Wi-Fi and Ambient Magnetic Field....
详细信息
ISBN:
(纸本)9781479946181
We present MaWi - a smart phone based scalable indoor localization system. Central to MaWi is a novel framework combining two self-contained but complementary localization techniques: Wi-Fi and Ambient Magnetic Field. Combining the two techniques, MaWi not only achieves a high localization accuracy, but also effectively reduces human labor in building fingerprint databases: to avoid war-driving, MaWi is designed to work with low quality fingerprint databases that can be efficiently built by only one person. Our experiments demonstrate that MaWi, with a fingerprint database as scarce as one data sample at each spot, outperforms the state-of-the-art proposals working on a richer fingerprint database.
Wireless power transfer technologies lead the way towards new paradigms for pervasive networking and have already penetrated the mobile and portable user device research and market. Their use is not only limited to ch...
详细信息
ISBN:
(纸本)9781728143514
Wireless power transfer technologies lead the way towards new paradigms for pervasive networking and have already penetrated the mobile and portable user device research and market. Their use is not only limited to charging devices like smartphones wirelessly by using a central wireless charger, but it is also extended to peer-to-peer (P2P) wireless crowd charging, when a user device shares energy directly with another user device. This paper surveys the literature over the period 2014-2020 on both P2P and central wireless crowd charging from the point of view of algorithmic applications as it applies to ubiquitously networked user devices and identifies some open research challenges for the future.
We present a technique to identify transmission timing for ieee802.15.4 based Wireless sensor Networks (WSNs) in the presence of WiFi interference. Our technique is based on modeling WiFi traffic with a Modulated Mark...
详细信息
ISBN:
(纸本)9781509014590
We present a technique to identify transmission timing for ieee802.15.4 based Wireless sensor Networks (WSNs) in the presence of WiFi interference. Our technique is based on modeling WiFi traffic with a Modulated Markov Poisson Process (MMPP) model in order to enable us to predict when WiFi transmissions take place and avoid them. We have evaluated the accuracy of our model in a small test-bed. Results are promising and suggest that our approach can increase the reliability of ieee802.15.4 transmissions.
Recently proposed applications for monitoring the behavior of real-world crowds with wireless sensor nodes rely on decentralized in-network aggregation. Although some of the aggregation algorithms for wireless sensor ...
详细信息
ISBN:
(纸本)9781479946181
Recently proposed applications for monitoring the behavior of real-world crowds with wireless sensor nodes rely on decentralized in-network aggregation. Although some of the aggregation algorithms for wireless sensor networks seem appealing for such applications, we are not aware of any deployments of these algorithms in real-world scenarios with crowd mobility. As a step toward filling this gap, we thus discuss our experiences with decentralized in-network aggregation from a few such deployments involving up to 177 nodes. We compare two main classes of algorithms for basic aggregates. We show that algorithms based on probabilistic, order- and duplicate-insensitive sketches outperform algorithms based on gradual variance reduction. To this end, however, they have to be adapted considerably to minimize the traffic, latency, and errors of the aggregation process, and to account for some real-world issues. In short, while the algorithms do have a potential for the envisioned crowd-monitoring applications, deploying them is not trivial.
The adaptive configuration of nodes in a sensor network optimizes the use of scarce network resources to improve target tracking performance. Moreover, the effective fusion of measurements from heterogeneous sensing n...
详细信息
ISBN:
(纸本)9781728105703
The adaptive configuration of nodes in a sensor network optimizes the use of scarce network resources to improve target tracking performance. Moreover, the effective fusion of measurements from heterogeneous sensing nodes provides diversity in information on the state of the target for additional performance gains. However, the joint configuration of the heterogeneous parameters of nodes and the fusion of heterogeneous measurements for sequential estimation are challenging tasks. To tackle these challenges, a sequential Monte Carlo method is presented in this work that adaptively configures heterogeneous sets of sensing nodes and fuses heterogeneous data for target tracking. A simulation experiment is provided as an example application of the method to demonstrate the configuration of cognitive foveal and radar nodes and the fusion of heterogeneous data for accurate and efficient single target tracking.
One of the main challenges for communication in Vehicular Ad Hoc Networks (VANETs) is efficient network channel utilization for the transmission of network packets. With the growing number of vehicles in the network, ...
详细信息
ISBN:
(纸本)9781728105703
One of the main challenges for communication in Vehicular Ad Hoc Networks (VANETs) is efficient network channel utilization for the transmission of network packets. With the growing number of vehicles in the network, the number of safety messages increases quickly, which results in the network channel congestion. In this paper, we introduce a new approach to adapt the transmission power, which is based on the vehicle density of the network. The aim is to reduce congestion on the network channel and improve the overall performance of network. Our simulation results indicate that this approach can lead to enhanced performance in terms of reduced packet loss and inter-packet delay.
This paper describes the development of an experimental wireless sensor network (WSN) testbed for studying the nature of irradiance measurements at the sensor nodes that are deployed at different points in the WSN, an...
详细信息
ISBN:
(纸本)9781728143514
This paper describes the development of an experimental wireless sensor network (WSN) testbed for studying the nature of irradiance measurements at the sensor nodes that are deployed at different points in the WSN, and oriented differently depending on the deployment geometry. The network was developed on the roof of an academic building at the University of North Carolina at Charlotte (UNC Charlotte), where the sensor nodes are equipped with pyranometer sensors to periodically collect the irradiance measurements at different points and send then to a centralized base station using multi-hop communication. The collected data is analyzed to demonstrate the spatial and temporal variation of energy availability at each individual node, resulting from the localized variations in the light levels.
暂无评论