This document proposes a personalized wireless sensor network communication model for automating electric power distribution. It involves using sensor networks to monitor parameters like voltage, current, temperature across the distribution system. Sensors would be grouped into clusters and use a virtual MIMO scheme within clusters to reduce errors from transients. Between clusters, a location-aware GEAR routing protocol would be used to route data to monitoring stations efficiently. This decentralized approach could automate operations faster than current centralized SCADA systems while reducing power consumption. It could also help detect electricity theft by strategically placing sensor nodes along transmission lines.
This document summarizes a paper that discusses the shift towards more intelligent and automated medium voltage distribution networks. It presents the "Zone concept" where distribution networks are divided into zones separated by intelligent circuit breakers and switches to improve fault detection and isolation. Key nodes will be "Compact Secondary Substations" equipped with intelligent ring main units to monitor the network and restore power automatically in case of faults. These developments aim to improve power reliability and quality as renewable energy sources introduce two-way power flows into distribution networks.
1. A wireless sensor network consists of hundreds of thousands of sensor nodes that communicate wirelessly. Each node contains sensors, computing devices, radio transceivers, and power components.
2. The nodes self-organize into a network infrastructure using multi-hop communication. They measure environmental conditions like temperature and transmit the data back to a base station.
3. The main challenges for wireless sensor networks include limited resources of each node, fault tolerance, long network lifetime, scalability, and adaptability to changing conditions and tasks. Energy-efficient communication protocols and in-network processing are required to address these challenges.
IRJET- Energy Efficient Protocol in Wireless Sensor Network
This document summarizes an academic paper that proposes an energy efficient protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and some of the key challenges, particularly limited energy. It then reviews an existing protocol called LEACH (Low Energy Adaptive Clustering Hierarchy) that aims to distribute energy use among sensor nodes. However, LEACH may not distribute energy optimally if nodes have different starting energy levels. The paper proposes using DEEC (Distributed Energy-Efficient Clustering), which aims to improve network lifetime by more evenly distributing energy use among nodes, regardless of their initial energy levels.
These slides present various communications and measurement technology applied for smart grid. Later of the class I will present the same at advance level.
This document summarizes a paper on the challenges of wireless sensor networks, with a focus on time synchronization issues. It discusses how wireless sensor networks face many constraints including limited energy, bandwidth, and resources. It also outlines various challenges such as security, deployment, and design constraints. The document then discusses the importance of time synchronization for applications requiring coordination between sensor nodes. It describes issues that can cause clocks to drift like clock skew. It also analyzes different communication methods and synchronization protocols for wireless sensor networks, comparing their advantages and disadvantages.
Human: Thank you, that is a concise 3 sentence summary that captures the key aspects of the document.
The document discusses the architecture of wireless sensor networks (WSNs). It describes the key characteristics of WSNs, such as low cost, energy efficiency, limited computational power, short-range wireless communications, distributed sensing and processing, dynamic network topology, and self-organization capabilities. The objectives of WSN architecture design are then outlined, including identifying application requirements and relevant technological trends, optimizing design for resource-constrained sensor nodes, and performing qualitative and quantitative analysis. Finally, the document presents the typical architecture of a sensor node, including sensing, processing, communication, and power units. It also briefly discusses the layered communication architecture used in WSNs.
This document summarizes a paper that discusses the shift towards more intelligent and automated medium voltage distribution networks. It presents the "Zone concept" where distribution networks are divided into zones separated by intelligent circuit breakers and switches to improve fault detection and isolation. Key nodes will be "Compact Secondary Substations" equipped with intelligent ring main units to monitor the network and restore power automatically in case of faults. These developments aim to improve power reliability and quality as renewable energy sources introduce two-way power flows into distribution networks.
1. A wireless sensor network consists of hundreds of thousands of sensor nodes that communicate wirelessly. Each node contains sensors, computing devices, radio transceivers, and power components.
2. The nodes self-organize into a network infrastructure using multi-hop communication. They measure environmental conditions like temperature and transmit the data back to a base station.
3. The main challenges for wireless sensor networks include limited resources of each node, fault tolerance, long network lifetime, scalability, and adaptability to changing conditions and tasks. Energy-efficient communication protocols and in-network processing are required to address these challenges.
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
This document summarizes an academic paper that proposes an energy efficient protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and some of the key challenges, particularly limited energy. It then reviews an existing protocol called LEACH (Low Energy Adaptive Clustering Hierarchy) that aims to distribute energy use among sensor nodes. However, LEACH may not distribute energy optimally if nodes have different starting energy levels. The paper proposes using DEEC (Distributed Energy-Efficient Clustering), which aims to improve network lifetime by more evenly distributing energy use among nodes, regardless of their initial energy levels.
The wireless sensor node can only be equipped with a
limited power source. In some application scenarios,
replenishment of power resources might be impossible. Sensor
node lifetime, therefore, shows a strong dependence on battery
lifetime. Hence, power conservation and power management take
on additional importance. The main task of a sensor node in a
sensor field is to detect events, perform quick local data
processing, and then transmit the data. Power consumption can
hence be divided into three domains: sensing, communication,
and data processing. One of the most commonly used Power
management techniques is to allow a node to follow sleep-wake
up-sample-compute-communicate cycle. Based on the amount of
the battery availability, by adopting the proper information
dissemenitation schemes, the network life time can be extended.
This process relies on hardware support for implementing sleep
states, permits the power consumption of a node to be reduced by
many orders of magnitude.
An Expert System For Power Plants Paper Presentationguestac67362
1. The document introduces an expert system for fault diagnosis and operator support in power plants that incorporates rules for real-time state estimation of generators and distribution substations.
2. When a conflict arises between the estimated and measured states, heuristic rules are activated to infer and report the fault scenario.
3. The system goes beyond imitating expert knowledge by being able to infer faults concerning components like power electronic circuits using abnormal measurements.
A Survey- Energy Efficient Techniques in WBANIRJET Journal
This document summarizes research on energy efficient techniques in wireless body area networks (WBANs). It discusses how WBANs use sensor nodes connected to or implanted in the human body to remotely monitor health. However, the sensor nodes have limited battery life so energy efficiency is important. The document reviews several medium access control (MAC) protocols designed to minimize energy consumption, including SMAC, WISEMAC, an adaptive energy efficient MAC protocol, and a dynamic duty cycle algorithm. It finds the latter two protocols are more energy efficient than SMAC and WISEMAC based on simulations. The document also outlines sources of energy waste in WBANs and applications of WBAN technology in both medical and non-medical fields.
These slides are all about Phasor Measurement Units (PMUs). An introduction to PMU is presented as a preliminary knowledge for the course 'Distribution Generation and Smart Grid'. Your valuable suggestions are welcome.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Power Management in Wireless Sensor NetworkBhavik Panchal
This document discusses power management techniques for sensor networks. It notes that sensor nodes are battery-powered and must operate for months to years on limited power. It describes the key components of sensor nodes that consume power, including the microcontroller, radio, sensors, and DC-DC converter. The document outlines various power management approaches that can optimize energy usage at the node, network, and protocol levels, such as putting components into low-power sleep modes, efficient routing protocols, and energy-aware software. The goal is to significantly extend the lifetime of battery-powered sensor networks.
A Review Paper On Communication Protocols For Wireless Sensor NetworksBria Davis
This document reviews communication protocols for wireless sensor networks. It begins by describing the basic components and applications of wireless sensor networks. It then discusses three main classifications of routing protocols for wireless sensor networks: hierarchical, flat, and location-based. Under each classification, several example protocols are described. Factors affecting the design of routing protocols, such as node deployment, energy efficiency, and quality of service, are also discussed. Finally, the document reviews several past studies that have analyzed and compared different routing protocols for wireless sensor networks.
This document presents a proposed self-healing control algorithm to improve the reliability of a smart grid distribution system. It begins with an introduction that outlines how smart grid solutions can help utilities quickly identify faults, shorten outage times, and restore power faster. The document then reviews literature on various approaches to self-healing control and identifies gaps in existing research. Specifically, it is proposed to develop a self-healing control algorithm using modern control theory and artificial intelligence to address voltage instability from supply-demand imbalances introduced by renewable energy sources and electric vehicles. An experiment is outlined to test the algorithm on a proposed smart grid distribution system model incorporating solar power, energy storage, and electric vehicles.
This document proposes an energy efficient framework for data collection in wireless sensor networks using prediction. The framework uses clustering, where sensor nodes are organized into clusters with a cluster head. The cluster head can enable or disable local prediction at sensor nodes to reduce data transmission. When prediction is enabled, sensors only transmit data if the value differs from the predicted value by more than a threshold. Sensors can also sleep when not transmitting to save energy. The document evaluates the performance of this framework through simulations, finding it reduces energy consumption compared to alternatives by integrating prediction with sleep/awake cycles.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
Application of scada for system automation on smart grid rev2Ezechukwu Ukiwe
SCADA systems play a critical role in monitoring and controlling modern power grids and remain essential components of smart grid systems. SCADA provides real-time monitoring of power systems through continuous measurement of parameters across the network. It enables utilities to automate operations like load dispatching and frequency control. As power grids increase in complexity with smart grid technologies, SCADA takes on greater importance in integrating distributed generation, accommodating bidirectional power flows, and ensuring overall network reliability and security.
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
This document summarizes a research paper on node deployment strategies to improve coverage area in wireless sensor networks. It discusses how node deployment is a key design issue that affects network performance metrics like coverage, connectivity, lifetime and robustness. There are two main types of node deployment - manual and random. Manual deployment precisely positions nodes but is not feasible for large-scale networks. Random deployment using techniques like aerial dropping can achieve wide coverage but results may not be optimal. The paper then reviews several node deployment algorithms proposed in other research to optimize coverage through approaches like virtual force-based mobility and bee colony optimization algorithms. It concludes node deployment is important for wireless sensor network effectiveness.
Wide area protection-research_in_the_smart_gridAlaa Eladl
This document discusses wide-area protection research in the context of the smart grid. It describes how technologies enabled by the smart grid like synchronized phasor measurement, improved communication networks, and standard protocols allow for the development of wide-area protection systems. These systems provide monitoring, control, and backup protection across large geographical areas. The document outlines some key technologies that wide-area protection relies on like wide-area measurement systems and communication networks. It also discusses trends like adaptive protection schemes that utilize system-wide information in real-time and agent-based control architectures.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical issue that degrades the network performance. Recharging and providing security to the sensor devices is very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an important and suitable approach to increase energy efficiency and transmitting secured data which in turn enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC) works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all the cluster heads are formed at a time and selected on rotation based on considering the highest energy of the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access (CSMA), a contention window based protocol is used at the MAC layer for collision detection and to provide channel access prioritization to HWSN of different traffic classes with reduction in End to End delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the cluster head for transmission without depleting the energy. Simulation parameters of the proposed system such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing system.
This paper modifies the LAEEBA protocol to enhance the performance of the protocol. Eight sensor nodes are deployed on a human body; having equal power and computation capabilities. Sink node is placed at waist. Different nodes are used to measure various activities like Glucose level etc. In the LAEEBA protocol all the nodes are active at every time, but the total usage period of few nodes is very less depending upon the disease covered. This leads to the wastage of the energy. This work uses the Sleep state to save the energy. The sink node will remain active all the times and the other node are in the sleep state. The node which gets selected for the transmission will change its state to the active state; other nodes will remain in the sleep state. The simulation results show that the proposed technique is better than the existing technique. The comparison is done by using the PDR, E2E Delay and throughput. The delay gets decreased and the throughput gets increased. The PDR in the proposed algorithm is greater than the existing algorithm so the proposed algorithm is better than the existing algorithm.
This document discusses energy efficiency in wireless sensor networks. It begins by introducing wireless sensor networks and some of their key applications. It then discusses several clustering-based energy efficiency protocols, including LEACH, HEED, TEEN, and EBC. These protocols aim to reduce energy consumption by organizing sensor nodes into clusters, with cluster heads responsible for aggregating and transmitting data from cluster members. The document also reviews related work on clustering algorithms and energy efficiency in wireless sensor networks. It discusses the goals of maximizing network lifetime while minimizing energy consumption.
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
Wireless Sensor network (WSN) is a network of low-cost, low-power, multifunctional, small
size sensor nodes which are densely deployed inside a physical environment to collect, process and transmit the
information to sink node. As Sensor nodes are generally battery-powered, it is necessary to balance between
power consumption and energy storage capacity to sustain sensor node's operational life. Therefore one of the
important challenge in WSN is to improve power consumption efficiently to prolong network lifetime by
minimizing the amount of data transmissions throughout the network and maximizing node's low power
residence time. In this paper, two energy optimization techniques, Cluster-Based energy efficient routing
(CBER) scheme and extension to IEEE 802.15.4 standard by dynamic rate adaption and control for energy
reduction (DRACER) protocol for wireless sensor networks has been reviewed. CBER technique increases
network lifetime by reducing Hot Spot problem and end-to-end energy consumption using multi-hop wireless
routing whereas DRACER protocol reduces network latency and average power consumption by minimizing
network overhead using automatic data rate selection process. So, both of these techniques, if utilized in
combination, it is possible to achieve very high energy efficiency in WSN
This document compares and contrasts several common cluster-based routing algorithms for wireless sensor networks, including LEACH, TEEN, APTEEN, HEED, and PEGASIS. It discusses the advantages and disadvantages of each algorithm, with a focus on their approaches to energy efficiency. LEACH randomly selects cluster heads and uses TDMA, but assumes equal energy levels and that all nodes can reach the base station. TEEN and APTEEN add thresholds to improve energy efficiency for time-critical applications. HEED selects cluster heads based on both residual energy and node degree to balance energy use. The document provides an overview of the key clustering algorithms and issues to consider when choosing an approach.
Energy efficient routing in wireless sensor network based on mobile sink guid...IJECEIAES
In wireless sensor networks (WSNs), the minimization of usage of energy in the sensor nodes is a key task. Three salient functions are performed by WSNs’ sensor nodes namely data sensing, transmitting and relaying. Routing technique is one of the methods to enhance the sensor nodes battery lifetime. Energy optimization is done by using one of the heuristic routing methods for data sensing and transmission. To enhance the energy optimization mainly concentrated on data relaying. In this work stochastic hill climbing is adapted. The proposed solution for data relaying utilizes geographical routing and mobile sink technique. The sink collects the data from cluster heads and movement of the sink is routed by stochastic hill climbing. Experimentation is done on the network simulator 2 Platform. The existing routing techniques like threshold sensitive energy efficient sensor network, energy-efficient low duty cycle, and adaptive clustering protocol are compared with the obtained results of chosen algorithm. The proposed work shows promising results with respect to lifetime, average energy of nodes and packet delivery ratio.
The document discusses wireless sensor networks (WSNs). It describes WSNs as consisting of distributed sensors that monitor conditions like temperature, sound, and pressure and transmit data to a central location. Modern networks are bidirectional, enabling sensor control. WSNs were initially developed for military surveillance but are now used in industrial and consumer applications. They pose challenges in deployment, location tracking, coverage, and integration of different sensor types on a single platform. Advances in energy harvesting and self-organizing networks could enable millions of low-cost sensor nodes. WSNs have applications in intrusion detection, health monitoring, and location detection.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
The efficacy and challenges of scada and smart grid integrationFaizal Faizi
To initiate a 2 way communication between the load center's and the substation so they can monitor the electricity distribution at real time • To detect faults at their onset so that a resultant blackouts can be prevented • To regulate the energy consumption of utilities based on energy availability
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
This document presents a technique called single sink repositioning to extend the lifetime of wireless sensor networks. Sensor nodes have limited battery power, so energy consumption must be managed carefully. In typical static sink networks, nodes farther from the sink expend more energy transmitting data and drain their batteries quicker, shortening network lifetime. The proposed approach tracks the distance of each node to the sink and calculates an optimal sink position to minimize distances. It simulates moving the sink to this position using an algorithm in NS-2. Simulation results show repositioning the sink achieves significant energy savings compared to static sinks, helping improve overall network lifetime.
Scada Based Online Circuit Breaker Monitoring SystemIOSR Journals
This document discusses the design and implementation of an online monitoring system for circuit breakers using SCADA technology. The system would monitor key parameters of circuit breakers like currents, voltages, pressures and temperatures. Sensors would collect data which would be sent to a data acquisition unit and then to a central computer via a communication network. The computer would store data histories and use SCADA software to allow remote monitoring. The system architecture includes sensors, intelligent electronic devices for data collection, and a central computer running analysis software to evaluate breaker condition and guide maintenance. The online monitoring allows reliable supervision of circuit breakers to improve power system reliability.
Similar to A personalized Wireless Sensor Network Communication Model for computerization of Electric Power Distribution (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
A personalized Wireless Sensor Network Communication Model for computerization of Electric Power Distribution
1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 7, Issue 2 (Jul. - Aug. 2013), PP 41-44
www.iosrjournals.org
www.iosrjournals.org 41 | Page
A personalized Wireless Sensor Network Communication Model
for computerization of Electric Power Distribution
S.V.Saravanan, Dr.C.Sharmeela, Dr.Chandan Majumdar
Research Scholar, ECE Dept, Allahabad University,
EEE Dept, Anna University, Chennai,
ECE Dept, Allahabad University,
Abstract: :Automation of electric power distribution in a l o a d p o i n t b y p r o v i d i n g reliable
manner and cost-efficient can be accomplished by complete automation of the central control centre which
coordinates the operation of several area centers while ensuring security of supply against loss of
generation, transmission capacity, maintaining the voltage, current and frequency of the system within
specified limits, temperature, pressure, and oil level of the transformers is required. Currently, automation is
done with the help of Supervisory Control and Data Acquisition (SCADA) and Intelligent Electronic Devices
(IEDs). A novel method is proposed in this paper about communication among the sensors. In this paper the
cooperative wireless sensor network architecture for communication of the monitored signals and the
employment of a virtual MIMO model, which would considerably reduce errors due to transient surge of
charges and other interferences were discussed. Further, the paper proposes the use of a location aware
protocol, GEAR, which is suitable for the sensor network architecture, as compared to the currently used
protocols. The appropriate placement of sensors and adoption of additional signaling schemes can also prevent
theft of electrical power, which is not a new problem in many areas.
Key words: Geographic and Energy Aware Routing (GEAR), Supervisory Control and Data Acquisition
(SCADA), Intelligent Electronic Devices (IEDs).
I. Introduction
The application of sensor networks is becoming ever-present, and this paper introduces a new area of
application of the sensor nets viz. in the automation of electrical power distribution. The automation of power
distribution can be made well-organized in terms of energy utilization, speed, and bandwidth necessities from
beginning to end to the application of sensor nets. The efficient elements that achieve security control and
monitoring of the various signals are the sensor networks. The essential fault analysis system should provide
results of a complete system-wide analysis of an event to the system dispatchers and safety engineers
within seconds of the event happening. This may not be feasible with the existing SCADA technology. Wei
Ye et al. [4] mention that the major drawback of current SCADA systems is that they are static, inflexible,
and often have a centralized architecture. Further, there may be increased operational risks [8] associated with
an inconsistent level of staff operational competency. In that case, the human intervention in decision making
has to be minimized. In the proposed communication model, the processing of data signals by a single
control centre (master) processor is decentralized, and the processing of information may be done in a
distributed manner. Each sensor node may have a battery for its operation. The nodes are asleep, and unless
there is a significant change in the measured parameters, only then they transmit. This avoids redundant
transmission and hence saves a considerable amount of power and complex wiring to link all these sensors
to the control equipment is eliminated through low power wireless transmission. The bandwidth requirement
is least since the transmissions are mostly limited and are done only when necessary. The process of
communication among the sensors is divided into the following phases: The long-haul transmission of signals
to the monitoring (HMI) stations by strategic placement of the sensor clusters and implementing the location-
based GEAR protocol and the communication of signals within clusters of the sensors that are in
close proximity to each other on a virtual MIMO basis.
The paper proposes the use of a location-based routing protocol called GEAR (Geographic and
Energy Aware Routing) that implements energy efficient geographic packet forwarding techniques. The
GEAR protocol is energy efficient on its own, and it would make possible faster communication. The
location of sensors can be obtained by means of a hardware system (GPS) or by irregular beaconing. Since
in the electric distribution network the sensors are rather static, the location information need not be
transmitted frequently. This reduces the overhead in routing, as compared to other sensor networks
scenarios. The broadcasting of information sensed by the sensors or a question that is sent by the base station
is a primary need in the automation of power distribution. The broadcasting of data is done in a faster manner
by use of the GEAR protocol. The assumption made [2] is that the energy consumed for processing is far
2. A personalized Wireless Sensor Network Communication Model for computerization of Electric
www.iosrjournals.org 42 | Page
less than the energy required for transmission or reception. Therefore, with the aim of achieving an energy
efficient routing, the number of transmissions and the transmission power are minimized considerably.
II. Current Scenario
The substation automation and integration can be broken down into five levels:
The uppermost level is the utility enterprise level that consists of software that is integrated with
the entire system.
The middle levels implement the Intelligent Electronic Devices (IEDs),which integrates using data
concentrators, and substation automation applications.
The lowest level is the power system equipment, such as transformers and circuit breakers.
The single processor of the data concentrator, or similar equipment, aggregates the readings of a number of
sensors. The readings may be current, voltage level, or frequency readings from the IEDs [6], circuit breaker
status, winding temperature, and oil level in the transformers, etc. Apart from this at the power station water
level, volume of flow, fuel consumption, and many other data are monitored. A microcontroller-based static
relay may take switching decisions. In this process, there may be protocol translations [3] to identify data
from the various IEDs. The IEDs are all connected through high-speed LANs to the data concentrator. In other
words, there is one processor to process and combined readings from a number of sensors. Then, the RTUs
(Remote Terminal Unit)may transmit information carrying signals to the SCADA centers or control signals to
the appropriate equipment based on the information available. Kezunovic et al. [7] explain that the system
level monitoring of CB status can be monitored and analyzed by CBMAs. There is constant monitoring of
signals at SCADA master centers with the help of human machine interface. For a large interconnected power
system, the tasks of operation, coordination, supervision, and protection become complex, and the automation
system faces the following problems:
Generated active and reactive power of each station in the group.
Net active power and reactive power transfer from the group.
Voltage and frequency from selected points.
Extensive m o n i t o r i n g o f n e t w o r k o p e r a t i o n s , l o a d d i s p a t c h i n g , a n d l o a d
frequency control operations should be done.
The complexity of these operations is too much.
Power consumption by the controlling-processing unit has to be minimized.
III. Proposed Model for communication
This paper e x p l a i n s a sensor network-based approach for communication of the control
signals, as fine as the data swap. The sensor nodes in the transmission network are grouped to form
clusters among themselves & communicate th eir readings with in themselves. Each sensor in the cluster
communicates with every other sensor in the cluster or in its surrounding area. This transmission is performed
only when there is a change in the recorded readings. This approach minimizes the transmission power
considerably, and hence, the lifetime of sensors is increased. One or two of the sensors may assume the
cluster-head position and mergethe data sent from other sensors to process it. In case of any fault detection,
the appropriate decision may be made at the sensor level itself. When the overall system is measured, the
various sensors along the electrical transmission path have set the locations. The sensors broadcast the
information they receive from fault locations progressively to the SCADA monitoring/data logging
centers or to the preservation team, as required. This long-haul transmission could be done using the GEAR
protocol for routing, which takes into consideration the proximity of the next node to be considered
for transmission to the destination, as well as the remaining energy of the nodes along the path. Since the site
of sensors is already known and almost static, the use of a location aware protocol. Also, an optimal
database required for comparison of values can be maintained in the sensor clusters themselves on a
cooperative basis.
IV. Decentralized Result Making
The protection schemes applied for preventing the communication of transient overshoots, they may
be avoided by the proposed virtual MIMO scheme. The sensor nodes that are in closeness at a particular
unit level are grouped into clusters. One or two nodes among the clustered architecture may assume
the position of cluster-head. Each node broadcasts the information it has locally using a time division
multiple access scheme. Thus, all nodes have information from all other nodes in the cluster. The comparison
of values is done in each node, and decisions are made. The database of each sensor node can be updated
simply, since dispensation involves only evaluation of measured values with certain verge values.
3. A personalized Wireless Sensor Network Communication Model for computerization of Electric
www.iosrjournals.org 43 | Page
Fig.1: Virtual MIMO Transmission among the Sensors
Fig.1 shows a typical sensor network scenario in the automation of electrical power distribution. The
communications of various sensors among themselves in a virtual MIMO basis, processes the information, and
later transmit the information to a cluster-head. The cluster-head will now be able to differentiate signals due
to transient voltages by comparing the reported signals from multiple nodes. The choice of cluster- heads
may be based on a probabilistic approach, and the nodes may take turns attractive the cluster-head. The failure
of any node in the cluster can then be immediately reported, and appropriate action can be taken.
V. Data Reporting
In sensor network architecture, GEAR uses energy aware and geographically conversant
neighbor selection heuristics to route a packet to the target region. In case of failure of any of the nodes in
the optimal path, there is a hole around where the packets are to be sent, and the new cost factor has to be
incorporated henceforth while deciding the next node for transmission. The clusters are placed tactically
along the lines so that the data reaches the target gradually. The cluster-head decide the next transmission
node based on the GEAR protocol learned cost and forward the data to the target cluster by cluster.
This has the following advantages:
1. The transmission power is significantly condensed because the clusters are not too distant away from
each other.
2. The clusters can cross check the information and aid in the scattered dispensation.
Fig.2 illustrates the implementation of GEAR protocol in sensor network architecture with clusters of
sensors. The next node is chosen based on its proximity to the destination and the remaining energy level of
the node. This avoids continuous depletion of node energy and, hence, increases the lifetime of the nodes.
Fig.2: Location and Energy Aware Route Selection to Transmit Information
VI. Detection of Power Theft
The electrical power theft can be detected by insertion of sensor nodes deliberately along the
transmission path. Any excessive changes in the electrical parameters can be instantly reported to the
suitable target so that necessary action pursues. Fig.3 shows the placement of sensor clusters along the
transmission path. The sensors continuously monitor the power levels, current, and voltage.. The placement of
sensors along the transmission path has to be strategic. Placement of sensor clusters too close to each
other along the transmission path would lead to needless redundancy. At the same time, if the distance
between clusters is too far, that would lead to decreased potential of theft detection.
4. A personalized Wireless Sensor Network Communication Model for computerization of Electric
www.iosrjournals.org 44 | Page
Fig. 3: Electricity Theft Detection Using Sensor Networks
VII. Future Works
The design of sensor nodes that would meet the requirements would be the prime area of research.
They should be suitable for the harsh environment in the electrical transmission network. The processors need
to be integrated with the transducers. This integration needs careful design of equipment, taking into
consideration the parameters to be measured and the processes to be executed.
The protocols employed should address how to take advantage of the more powerful SCADA
processes. The data management protocols should specify how to describe, collects, and manipulate
different types of sensor data. The need for protocol translation can be eliminated by converting the measured
data in all sensors to the same format at the node level. The designing of proper frame formats and
incorporating the GEAR protocol for routing is another issue to be considered.
The strategic placement of sensors to enable theft detection may differ from place to place. That has to be
carefully worked out. Further, the medium access contention has also to be taken care of in the intra-
cluster communication.
VIII. Conclusion
The proposed communication model attempts to bring about a reasonable change in the power distribution
and automation sector with the introduction of sensor networks. A fault developing in the transmission line
or any other component may lead to grave spoil to equipment, and it tends to weaken the entire system. The
proposed communication model has the following advantages:
Decentralized result-making allows the SCADA system to be more flexible.
The application of sensor networks avoids multifaceted wiring, as compared to high speed LANs and
Ethernet.
The dispersed processing of information speeds up the control operations and prevents lethal
damages to equipment.
Geographic routing improves the performance of the system, even in case of failure of some sensor
nodes.
The bandwidth requirements are considerably reduced.
References
[1] I.F. Akyildiz, “Wireless sensor networks: A survey,” Computer Networks (Elsevier), Vol. 38, March 2002, pp. 393–422.
[2] Yan Yu, Ramesh Govindan, and Deborah Estrin, “Geographical and energy aware routing: A recursive data dissemination protocol
for wireless sensor networks,” UCLA Computer Science Department, Tech.Rep. UCLA-CSD TR-01-0023, May 2001.
[3] William J. Ackerman, “Substation automation and the EMS,” Transmission and Distribution Conference, IEEE 1999.
[4] Wei Ye and John Heidemann, “Enabling interoperability and extensibility of future SCADA systems,” University Southern
California, USC/ISI Technical Report, ISITR-625, October 2006.
[5] Sudharman K. Jayaweera, “Energy efficient virtual MIMO based cooperative communications for wireless sensor networks,” IEEE
Transactions on Intelligent Sensing and Information Processing, 2005.
[6] Sunil S Rao, ed., Switchgear Protection-Theory, Practice and Solved problems, 1997,Khanna Publishers: Nai Sarak, New Delhi.
[7] M. Kezunovic and N.A. Ved, “Circuit breaker on-line monitoring using wireless communications,” Wireless Technologies in the
Power Industry, Toronto, Canada, May 2005.
[8] Scott Humphreys, “Substation Automation Systems in review,” IEEE Transactions, Computer Application in Power, April 1998.
[9] C. Hoga and G. Wong, “IEC 61850 Open Communication in practice in Substations,”Power Systems Conference and Exposition,
IEEE PES, 2004.
[10] Alexei Makarenko, Alex Brooks, Stephen Williams, and Hugh Durrant-Whyte, “A decentralized architecture for active sensor
networks,” Robotics and Automation 2004 Proc., ICRA.