The core motivations of deploying a sensor network for a specific application come from the autonomy of
sensors, their reduced size, and their capabilities for computing and communicating in a short range.
However, many challenges for sensor networks still exist: minimizing energy consumptions, and ensuring
the performance of communication that may be affected by many parameters. The work described in this
paper covers mainly the analysis of the impact of the temperature and humidity variations on link quality of
XM1000 operating under TinyOS. Two-way ANOVA test has been applied and the obtained results show
that both the temperature and humidity variations impact RSSI.
A wireless sensor network consists of spatially distributed sensor nodes that monitor physical conditions and communicate wirelessly. Nodes sense data, process it, and transmit it to other nodes or a central gateway. The gateway provides a connection to the wired world to collect, process, analyze and present measurement data. Routers can extend the communication range between nodes and the gateway. Sensor nodes are small, require little power, are programmable and cost-effective to purchase and maintain.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
Wireless Sensor Network – Theoretical Findings and Applications
Wireless sensor networks (WSN) consist of tiny sensor nodes scattered on a relatively large geographical area. The nodes are cooperative in nature, that is, they can communication with one another or to a central control unit. The work of each such node is to collect the information from surrounding like pressure, temperature, humidity, magnetic fields, optical fields etc [2]. Actually they are ad hoc network with some additional constraints. The node should be capable enough for power consumption, collection of data, self healing, mobility, self configuration to name a few. These features of WSN node differentiate it from conventional ad hoc networks [14]. This survey paper aims at reporting wireless sensor network, its design, networking of nodes, and security in system. In this paper, fundamentals of wireless sensor network are discussed. Different component like sensor, microcontroller, battery require for sensor networks are explained in detail. We have tried to include all the aspects of WSN. The Protocols, Operating Systems, tools require for WSN node programming and some security issues are also discussed.
This document contains two papers. The first paper summarizes a study that designed a prototype smoke detection device for a student dormitory at Klabat University using a microcontroller, MQ-7 and UV-Tron sensors, buzzer, and SMS gateway to detect cigarette smoke and notify users. The second paper proposes a wireless sensor network design for environmental monitoring applications to measure temperature, humidity, CO2, and other factors.
5.a robust frame of wsn utilizing localization technique 36-46
This document discusses localization techniques for wireless sensor networks. It begins by defining localization as identifying a sensor node's position and explains that localization is a fundamental challenge for wireless sensor networks. It then describes two main categories of localization techniques: range-based and range-free. Range-based techniques use distance or angle measurements between nodes to determine positions but require expensive hardware. Range-free techniques estimate positions based on neighboring node information and are less expensive but less accurate. The document reviews several specific localization algorithms from previous research and discusses their advantages and limitations.
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
This document discusses localization techniques for wireless sensor networks. It begins by defining localization as identifying a sensor node's position and explains how accuracy is important. It then describes two main categories of localization techniques: range-based and range-free. Range-based uses distance or angle measurements between nodes for higher accuracy but requires expensive hardware. Range-free relies on information from nearby nodes and is less accurate but cheaper. The document reviews several specific localization algorithms from previous research and their limitations. It concludes by stating that energy efficiency is critical for wireless sensor networks due to limited battery life.
Intelligent Sensing Using Metal Oxide Semiconductor Based-on Support Vector M...IJECEIAES
Classifying odor in real experiment presents some challenges, especially the uncertainty of the odor concentration and dispersion that can lead to a difficulty in obtaining an accurate datasets. In this study, to enhance the accuracy, datasets arrangement based on MOS sensors parameters using SVM approach for odor classification is proposed. The sensors are tested to determine the sensors' time response, sensors' peak duration, sensors' sensitivity, and sensors' stability when applied to the various sources at different range. Three sources were used in experimental test, namely: ethanol, methanol, and acetone. The gas sensors characteristics are analyzed in open sampling method to see the sensors' performance in real situation. These performances are considered as the base of choosing the position in collecting the datasets. The sensors in dynamic experiment have average of precision of 93.8-97.0%, the accuracy 93.3-96.7%, and the recall 93.3-96.7%. This values indicates that the collected datasets can support the SVM in improving the intelligent sensing when conducting odor classification work.
The document describes a wireless sensor network (WSN) modeling framework that consists of three modeling languages: the software architecture modeling language, the node configuration modeling language, and the physical environment modeling language. The software architecture modeling language allows modeling the structure and behavior of WSN applications using components, ports, connections, events, conditions, and actions. The node configuration modeling language specifies attributes of node types like the operating system, MAC protocol, installed sensors/actuators. The physical environment modeling language models attributes of the deployment environment.
This document proposes an improved method for detecting sensor node failures in wireless sensor networks. It begins by discussing how sensor node failures can degrade network quality of service and the need to identify and replace faulty nodes. It then reviews existing methods for fault detection and identifies issues with those approaches. The document proposes measuring the round-trip time of data traveling round-trip paths through the network and comparing it to a threshold. Nodes common to paths with delays exceeding the threshold would be identified as faulty. Details of implementing this round-trip time and path based approach are provided. Related works applying other fault detection methods are also summarized.
A wireless sensor network consists of spatially distributed sensor nodes that monitor physical conditions and communicate wirelessly. Nodes sense data, process it, and transmit it to other nodes or a central gateway. The gateway provides a connection to the wired world to collect, process, analyze and present measurement data. Routers can extend the communication range between nodes and the gateway. Sensor nodes are small, require little power, are programmable and cost-effective to purchase and maintain.
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
A Bio-inspired clustering algorithm based on BFO has been proposed and investigation on energy efficient clustering algorithms related to WSNs has been done in this paper. The contribution of this paper related to use of Bacteria foraging algorithm firstly for WSNs for enhancing network lifetime of sensor nodes.
Wireless Sensor Network – Theoretical Findings and ApplicationsAshishDPatel1
Wireless sensor networks (WSN) consist of tiny sensor nodes scattered on a relatively large geographical area. The nodes are cooperative in nature, that is, they can communication with one another or to a central control unit. The work of each such node is to collect the information from surrounding like pressure, temperature, humidity, magnetic fields, optical fields etc [2]. Actually they are ad hoc network with some additional constraints. The node should be capable enough for power consumption, collection of data, self healing, mobility, self configuration to name a few. These features of WSN node differentiate it from conventional ad hoc networks [14]. This survey paper aims at reporting wireless sensor network, its design, networking of nodes, and security in system. In this paper, fundamentals of wireless sensor network are discussed. Different component like sensor, microcontroller, battery require for sensor networks are explained in detail. We have tried to include all the aspects of WSN. The Protocols, Operating Systems, tools require for WSN node programming and some security issues are also discussed.
This document contains two papers. The first paper summarizes a study that designed a prototype smoke detection device for a student dormitory at Klabat University using a microcontroller, MQ-7 and UV-Tron sensors, buzzer, and SMS gateway to detect cigarette smoke and notify users. The second paper proposes a wireless sensor network design for environmental monitoring applications to measure temperature, humidity, CO2, and other factors.
5.a robust frame of wsn utilizing localization technique 36-46Alexander Decker
This document discusses localization techniques for wireless sensor networks. It begins by defining localization as identifying a sensor node's position and explains that localization is a fundamental challenge for wireless sensor networks. It then describes two main categories of localization techniques: range-based and range-free. Range-based techniques use distance or angle measurements between nodes to determine positions but require expensive hardware. Range-free techniques estimate positions based on neighboring node information and are less expensive but less accurate. The document reviews several specific localization algorithms from previous research and discusses their advantages and limitations.
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...Alexander Decker
This document discusses localization techniques for wireless sensor networks. It begins by defining localization as identifying a sensor node's position and explains how accuracy is important. It then describes two main categories of localization techniques: range-based and range-free. Range-based uses distance or angle measurements between nodes for higher accuracy but requires expensive hardware. Range-free relies on information from nearby nodes and is less accurate but cheaper. The document reviews several specific localization algorithms from previous research and their limitations. It concludes by stating that energy efficiency is critical for wireless sensor networks due to limited battery life.
Fault diagnosis of a high voltage transmission line using waveform matching a...ijsc
This paper is based on the problem of accurate fault diagnosis by incorporating a waveform matching technique. Fault isolation and detection of a double circuit high voltage power transmission line is of immense importance from point of view of Energy Management services. Power System Fault types namely single line to ground faults, line to line faults, double line to ground faults etc. are responsible for transients in current and voltage waveforms in Power Systems. Waveform matching deals with the approximate superimposition of such waveforms in discretized versions obtained from recording devices and Software respectively. The analogy derived from these waveforms is obtained as an error function of voltage and current, from the considered metering devices. This assists in modelling the fault identification as an optimization problem of minimizing the error between these sets of waveforms. In other words, it utilizes the benefit of software discrepancies between these two waveforms. Analysis has been done using the Bare Bones Particle Swarm Optimizer on an IEEE 2 bus, 6 bus and 14 bus system. The performance of the algorithm has been compared with an analogous meta-heuristic algorithm called BAT optimization on a 2 bus level. The primary focus of this paper is to demonstrate the efficiency of such methods and state the common peculiarities in measurements, and the possible remedies for such distortions.
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage in Sen...ambitlick
This document describes a new probabilistic coverage protocol (PCP) for sensor networks that can employ both deterministic and probabilistic sensing models. The PCP aims to be general, efficient in terms of energy consumption, and able to provide probabilistic coverage of a target area above a given threshold. It is shown to work with common disk sensing models as well as more realistic probabilistic models. Through simulations, the PCP is found to outperform other protocols in aspects like number of active sensors, total energy consumed, and network lifetime.
Shridhar Kulkarni is a design engineer and graduate student studying electrical engineering with a focus on electronics, embedded systems, and sensors. He has experience developing IoT and wearable technology using ARM microcontrollers and protocols like I2C and SPI. His expertise includes designing low power systems, firmware development, and collaborating with data scientists on machine learning applications.
Framework for Channel Attenuation Model Final PaperKhade Grant
This document describes a framework for validating wireless channel attenuation models for body sensor networks. The framework uses MATLAB to develop validation software that compares output from test attenuation models to reference signals using various signal analysis methods. The software was tested on sample data and returned validity values consistent with expectations, demonstrating it can effectively evaluate how well models predict channel attenuation effects. The validation framework will enable evaluation of future attenuation models to incorporate realistic attenuation simulations into body sensor network modeling.
This document provides an overview of wireless sensor networks (WSNs), including their technologies, applications, standards, design features, and evolutions. WSNs enable new applications through spatially distributed sensors that monitor physical conditions and wirelessly transmit data to a central location. They require a balance between communication and processing capabilities given constraints like low power and complexity. The IEEE 802.15.4 standard enables many WSN applications. Performance depends on network size and data type. Sensors are key network components that detect physical properties and convert them to signals. Common sensor types include thermal, electromagnetic, mechanical, and motion sensors. WSNs face unique challenges from ad hoc deployment and constrained node resources.
This document describes a wireless sensor network project to remotely monitor an artificial aquatic ecosystem. The network uses Mote-IRIS sensor nodes connected to a base station via a MIB520 interface board. Sensors measure pH, temperature, and humidity to evaluate water quality. Data is analyzed using a Water Quality Index method. Results from testing different water samples showed the network could accurately assess water quality levels from excellent to poor. The project aims to develop a robust monitoring system to better understand aquatic ecosystems and water quality issues.
This document discusses localization techniques in wireless sensor networks (WSNs). It begins with an introduction to WSNs and their applications that require location information. While GPS could provide location data, it is not practical for WSNs due to cost and physical constraints. The document then categorizes localization methods as range-based, which use distance or angle measurements, and range-free, which do not directly measure distance. Specific techniques like time of arrival, received signal strength, and DV-Hop localization are described. The document concludes with classifications of localization methods and topics for future work.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
This document summarizes research on supporting multimedia applications over wireless mesh networks. It proposes an efficient routing algorithm and a QoS approach at the MAC layer. The routing algorithm aims to transport multimedia traffic with QoS requirements. The MAC layer approach improves 802.11e to better facilitate video transport over the mesh network. Related work on routing protocols, QoS solutions at the network and MAC layers, and clustering approaches are also reviewed.
Systemic racism creates hidden barriers for indigenous students in Australia. Indirect racial discrimination results in unequal treatment and outcomes for indigenous students due to factors like their racial or ethnic origin. Some of the hidden barriers indigenous students face include regular absenteeism from school due to issues like involvement in the criminal justice system, family unemployment, cultural obligations, and health problems. Additionally, the Eurocentric model of teaching falsely assumes a one-size-fits-all approach and that indigenous students who maintain their culture cannot assimilate into white society. Poor teacher quality in remote indigenous communities also fails to meet the needs of indigenous students and contribute to distrust between families and schools.
Rob peglar introduction_analytics _big data_hadoopGhassan Al-Yafie
This document provides an introduction to analytics and big data using Hadoop. It discusses the growth of digital data and challenges of big data. Hadoop is presented as a solution for storing and processing large, unstructured datasets across commodity servers. The key components of Hadoop - HDFS for distributed storage and MapReduce for distributed processing - are described at a high level. Examples of industries using big data analytics are also listed.
¿Necesito una pantalla o necesito comunicar con mis clientes?crambovisuales
El documento habla sobre los pasos para diseñar e implementar un proyecto de comunicación digital. Primero se debe definir el objetivo, público, recursos y escenario. Luego se confecciona la idea mediante consultoría de marketing, se diseña la solución usando tecnología y contenido, e involucrando al cliente. Finalmente se produce en equipo, se implementa en el escenario, se comunica el éxito y se mantiene actualizado. El objetivo es encontrar el cóctel perfecto.
A secure routing process to simultaneously defend against false report and wo...ieijjournal
This document proposes a new secure routing scheme to simultaneously detect and defend against wormhole attacks and false report attacks in wireless sensor networks. Existing security schemes focus on defending against single attacks but their performance degrades when multiple attacks occur simultaneously. The proposed scheme uses a key partition-based routing protocol to mitigate the detection probability reduction caused by wormholes. It also defines a new event report format containing verification counts and wormhole detection mechanisms. The scheme aims to detect attacks with few hops and low overhead even if the sender or receiver is compromised.
The document summarizes research on black hole and grey hole attacks in wireless mesh networks. It provides background on these attacks and how they work. The key points are:
1. Black hole attacks involve a malicious node accepting all packets by sending fake route replies, appearing to have the shortest path, then dropping all packets. Grey hole attacks involve selectively dropping packets.
2. The document reviews previous research on detecting and preventing these attacks. It then discusses using the OPNET simulator to analyze delay in networks under black hole and grey hole attacks.
3. Simulation results show increased network delay when nodes launch black hole and grey hole attacks compared to no attacks. Applying the OLSR routing protocol with a secure path scheme
Tarta de bizcocho y helado en una macetawebosdeoro
Este documento presenta recetas para tres tipos de bizcochos y una tarta de bizcocho y helado en forma de maceta. La primera receta explica cómo hacer una tarta de bizcocho y helado en una maceta de plástico utilizando bizcocho de yogur, helado y galletas molidas. Las siguientes recetas describen cómo preparar bizcochos de leche condensada y limón.
Sample Academic Book Opinion and Reflection - MamdaniJames Addoms
This summary provides an overview of Ron Eglash's book "African Fractals" which argues that fractal geometry is reflected in indigenous African social organization, knowledge systems, and aesthetics. Eglash defines fractal geometry and its key components of recursion, scaling, self-similarity, infinity, and fractional dimension. He provides examples of fractals in African architecture, art, body modifications, and social structures. While fractals may occur unintentionally in aspects like urban sprawl, Eglash argues they also occur intentionally through aesthetics in art and an implicit influence. Architecture specifically demonstrates fractals through intentional and explicit construction that reflects African social and political structures.
This document provides an introduction and overview of Git, including its benefits over other version control systems like ClearCase and SVN. It discusses Git's distributed workflow and how to set up a Git server and clone repositories. It also gives step-by-step instructions for basic Git commands to initialize a repository, add and commit files, and view logs. The goal is to explain the basic Git workflow and commands for first-time Git users to get started with version control.
Ensp energy efficient next hop selection in a probabilistic voting based filt...ieijjournal
In wireless sensor networks, sensor nodes are easily compromised due to their restricted hardware resources. These compromised nodes inject fabricated votes into legitimate reports, and generate false report and false vote injection attacks. These attacks deplete energy resources and block report transmission. A probabilistic voting-based filtering scheme was proposed to detect the bogus votes in reports en-route to protect against attacks. Although this method detects false votes in intermediate nodes, the sensor network needs to be effectively operated in consideration of a node's conditions. In this paper, the proposed method selects effective verification nodes by considering the condition of nodes based on a fuzzy logic system. In the proposed method, the intermediate node selects between two next hop nodes in its range through a fuzzy logic system before forwarding the report. Experimental results suggest that, compared to the original method, the proposed method improves energy savings up to 11% while maintaining a high security level.
In general, analysing cameras is a difficult problem and solutions are often found only for geometric
approach. In this paper, the image capturing capability of a camera is presented from optical perspective.
Since most compact cameras can acquire only visible light, the description and propagation method of the
visible part of the electromagnetic spectrum reflected by a scene object is made based on Maxwell’s
equations. We then seek to use this understanding in the modelling of the image formation process of the
camera. The dependency of camera sensor field distribution on aperture dimension is emphasized. This
modelling leads to an important camera and image quality parameter called Modulation Transfer
Function. The model presented is based on a wave optics in which the wavefront is modified by the lens
after diffraction has taken place at the camera rectangular aperture positioned at the front focal point of
the lens. Simulation results are presented to validate the approach.
Este documento discute o desenvolvimento de competências para atender às necessidades educacionais especiais de alunos com deficiência física ou neuro-motora. Ele apresenta 1) uma introdução sobre o objetivo de desenvolver tais competências nos professores, 2) um texto sobre deficiências físicas e neuro-motoras e suas implicações no processo de ensino-aprendizagem e 3) recomendações sobre identificar necessidades educacionais especiais e propor estratégias alternativas de ensino.
Dynamic task scheduling on multicore automotive ec usVLSICS Design
Automobile manufacturers are controlled by stringent govt. regulations for safety and fuel emissions and
motivated towards adding more advanced features and sophisticated applications to the existing electronic
system. Ever increasing customer’s demands for high level of comfort also necessitate providing even more
sophistication in vehicle electronics system. All these, directly make the vehicle software system more
complex and computationally more intensive. In turn, this demands very high computational capability of
the microprocessor used in electronic control unit (ECU). In this regard, multicore processors have
already been implemented in some of the task rigorous ECUs like, power train, image processing and
infotainment. To achieve greater performance from these multicore processors, parallelized ECU software
needs to be efficiently scheduled by the underlaying operating system for execution to utilize all the
computational cores to the maximum extent possible and meet the real time constraint. In this paper, we
propose a dynamic task scheduler for multicore engine control ECU that provides maximum CPU
utilization, minimized preemption overhead, minimum average waiting time and all the tasks meet their
real time deadlines while compared to the static priority scheduling suggested by Automotive Open Systems
Architecture (AUTOSAR).
An effective pre processing algorithm for information retrieval systemsijdms
The Internet is probably the most successful distributed computing system ever. However, our capabilities
for data querying and manipulation on the internet are primordial at best. The user expectations are
enhancing over the period of time along with increased amount of operational data past few decades. The
data-user expects more deep, exact, and detailed results. Result retrieval for the user query is always
relative o the pattern of data storage and index. In Information retrieval systems, tokenization is an
integrals part whose prime objective is to identifying the token and their count. In this paper, we have
proposed an effective tokenization approach which is based on training vector and result shows that
efficiency/ effectiveness of proposed algorithm. Tokenization on documents helps to satisfy user’s
information need more precisely and reduced search sharply, is believed to be a part of information
retrieval. Pre-processing of input document is an integral part of Tokenization, which involves preprocessing
of documents and generates its respective tokens which is the basis of these tokens probabilistic
IR generate its scoring and gives reduced search space. The comparative analysis is based on the two
parameters; Number of Token generated, Pre-processing time.
Wireless sensor networks have profound effects on many application fields like security management which
need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a
major issue in chemical industry field. This paper describes the design of chemical warehouse security
system using the concept of active products and wireless sensor networks. A security application layer is
developed to supervise and exchange messages between nodes and the control center to prevent industrial
accident. Different security rules are proposed on this layer to monitor the internal state and incompatible
products distance. If a critical event is detected, the application generates alert message which need a short
end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is
also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
Application and Network Layers Design for Wireless Sensor Network to Supervis...IJCSEA Journal
Wireless sensor networks have profound effects on many application fields like security management which need an immediate and fast system reaction. Indeed, the monitoring of a dangerous product warehouse is a major issue in chemical industry field. This paper describes the design of chemical warehouse security system using the concept of active products and wireless sensor networks. A security application layer is developed to supervise and exchange messages between nodes and the control center to prevent industrial accident. Different security rules are proposed on this layer to monitor the internal state and incompatible products distance. If a critical event is detected, the application generates alert message which need a short end to end delay and low packet loss rate constraints by network layer. Thus, a QoS routing protocol is also developed in the network layer. The proposed solution is implemented in Castalia/OMNeT++ simulator. Simulation results show that the system reacts perfectly for critical event and can meet the QoS constraints of alert message.
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
The document discusses improving quality of service in cellular base stations using femtocells. It proposes using femtocells, which are small low-power cellular base stations installed in homes or businesses, to improve coverage, capacity, and throughput. Femtocells could help reduce packet loss and congestion by closing gaps between network cells. The document reviews existing approaches like hedonic regression models and packet delivery ratio, and analyzes signal-to-noise ratios, interference, and system capacity for macro and small cells. Femtocells may enhance conventional networks by extending coverage areas and improving mobile data capacity.
Design of a Wireless Sensor Network from an Energy Management Perspective?? ?
This document describes the design of a wireless sensor network for monitoring temperature in vineyards from an energy management perspective. The network uses IRIS motes connected to an MDA 300 data acquisition board with 4 temperature sensors. The goal was to maximize battery lifespan by implementing energy management strategies at the hardware, operating system, and application layers. Testing showed the battery lifespan was shorter than estimated, likely due to additional energy use from communication and other operations beyond the theoretical calculations. Overall, the document outlines the system design and implementation of energy saving techniques at multiple layers of the sensor network.
This document summarizes a research paper on medium access control (MAC) protocols for wireless sensor networks. It discusses how MAC protocols are needed to manage shared access to communication channels in wireless sensor networks and outlines some key characteristics and requirements for efficient MAC protocols, including energy efficiency, scalability, and supporting variable traffic loads. It then reviews some traditional MAC protocols, including time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA). The full paper provides a more in-depth survey and comparison of schedule-based and contention-based MAC protocols designed specifically for wireless sensor networks.
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
As wireless sensor networks (WSNs) continue to attract more and more researchers attention, new ideas for
applications are continually being developed, many of which involve consistent coverage with good
network connectivity of a given area of interest. For the successful operation of the wireless Sensor
Network, the active sensor nodes must maintain both coverage and also connectivity. These are two closely
related essential prerequisites and they are also very important measurements of quality of service (QoS)
for wireless sensor networks. This paper presents the design and analysis of novel protocols that can
dynamically configure a sensor network to result in guaranteed degrees of coverage and connectivity. This
protocol is simulated using NS2 simulated and compared against a distributed probabilistic coveragepreserving configuration protocol (DPCCP) with SPAN [1] protocol in the literature and show that it
activates lesser number of sensor nodes, consumes much lesser energy and maximises the network lifetime
significantly.
This document discusses a proposed cost-based energy efficient routing algorithm for wireless body area networks (WBANs). WBANs use wireless sensor nodes placed on or inside the body to monitor vital health signals. The proposed algorithm aims to maximize network lifetime by selecting optimal forwarding nodes based on a cost function that considers residual energy and distance to the sink node. Simulation results show the proposed algorithm performs better than traditional routing methods by achieving a longer stability period with more uniform energy consumption across nodes.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
This document provides a comprehensive review of research in the field of wireless sensor networks (WSNs). It begins with an introduction to WSNs and discusses sensor nodes, network architectures, communication protocols, applications, and open research issues. It then reviews several related surveys that focus on specific aspects of WSNs such as applications, energy consumption techniques, security protocols, and testbeds. The document aims to provide an overview of all aspects of WSN research and identify promising directions like bio-inspired solutions. It discusses sensors and network types, architectures and services, and challenges like fault tolerance.
Survey of Wireless Sensor Network Applicationijsrd.com
Sensor networks offer a powerful combination of distributed sensing, computing and communication. They lend themselves to countless applications and, at the same time, offer numerous challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected. The distinguishing traits of sensor networks have a direct impact on the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. Various hardware platforms have already been designed to test the many ideas spawned by the re-search community and to implement applications to virtually all fields of science and technology. We are convinced that CAS will be able to provide a substantial contribution to the development of this exciting field. A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. This has been enabled by the availability, particularly in recent years, of sensors that are smaller, cheaper, and intelligent. These sensors are equipped with wireless interfaces with which they can communicate with one another to form a network. The design of a WSN depends significantly on the application, and it must consider factors such as the environment, the application's design objectives, cost, hardware, and system constraints. The goal of our survey is to present a comprehensive review of the recent literature since the publication of [I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, 2002]. Following a top-down approach, we give an overview of several new applications and then review the literature on various aspects of WSNs. We classify the problems into three different categories: (1) Internal platform and underlying operating system, (2) Communication protocol stack, and (3) Network services, provisioning, and deployment. We review the major development in these three categories and outline new challenges.
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksIJCNCJournal
An Algorithm to extend sensor lifetime and energy is implemented for different scenarios of ad hoc and wireless sensor networks. The goal is to prolong the lifetimes of sensors, covering a number of targeted zones by creating subsets of sensors, in which each subset covers entirely the targeted zones. Probabilistic analysis is assumed in which each sensor covers one or more targets, according to their coverage failure probabilities. Case studies of different sensor subsets arrangements are considered such as load switching, variable target load demands as well as a perturbation in sensor planner locations.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
The sensors in the WSN sense the surrounding, collects the data and transfers the data to the sink node. It
has been observed that the sensor nodes are deactivated or damaged when exposed to certain radiations or
due to energy problems. This damage leads to the temporary isolation of the nodes from the network which
results in the formation of the holes. These holes are dynamic in nature and can grow and shrink depending
upon the factors causing the damage to the sensor nodes. So a solution has been presented in the base paper
where the dual mode i.e. Radio frequency and the Acoustic mode are considered so that the data can be
transferred easily. Based on this a survey has been done where several factors are studied so that the
performance of the system can be increased.
WSN nodes power consumption using multihop routing protocol for illegal cutti...TELKOMNIKA JOURNAL
The need for an automation system from a remote area cannot be separated from the role of the wireless sensor network. However, the battery consumption is still a problem that influences the lifetime of the system. This research focused on studying how to characterize the power consumption on each sensor node using multihop routing protocol in the illegal logging field, to get the prediction lifetime of the network. The system is designed by using six sensor nodes in a master-slave connection and implemented in a tree topology. Each sensor node is consisting of a sound sensor, vibration sensor, Xbee communication, current and voltage sensor, and Arduino nano. The system is tested using battery 10050 mAH with several scenarios to have calculated how long the battery lifetime can be predicted. The results stated that the master node on the network depleted the power of the battery faster than the slave node since the more slaves connected to the master, the more energy the battery consumes.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachIJRES Journal
In a wireless networking environment, the network is comprised of sensor nodes and backbones are subsets of sensors or actuators that suffice for performing basic data communication operations. They are applied for energy efficient broadcasting. In a broadcasting (also known as data dissemination) task, a message is to be sent from one node, which could be a sink or an actuator, to all the sensors or all the actuators in the network. The goal is to minimize the number of rebroadcasts while attempting to deliver messages to all sensors or actuators. Neighbor detection and route discovery algorithms that consider a realistic physical layer are described. An adaptive broadcasting protocol without parameters suitable for delay tolerant networks is further discussed. In existing solutions for minimal energy broadcasting problem, nodes can adjust their transmission powers. Wireless Sensor Networks (WSNs) are sets of many sensors that gather data and collaborate together. So, the procedures of broadcast or multicast are more important than traditional point-to-point communication in computer network. This paper focuses on broadcasting in structured WSNs. In such a kind, the procedure of network communications is easier than in unstructured WSNs. Thus, it will make an overview of Multi Point Relay (MPR) to show its weakness. Then define a cluster-based architecture for WSNs which is constructed using MPR. Next, provide a new broadcast algorithm based on the previous cluster architecture called 3B (Backbone Based Broadcasting). By the end, an illustration of 3B shows that it minimizes the energy consumption for accomplishing broadcast compared to MPR.
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
This paper addresses the maximizing network lifetime problem in wireless sensor networks (WSNs) taking
into account the total Symbol Error rate (SER) at destination. Therefore, efficient power management is
needed for extend network lifetime. Our approach consists to provide the optimal transmission power
using the orthogonal multiple access channels between each sensor. In order to deeply study the
properties of our approach, firstly, the simple case is considered; the information sensed by the source
node passes by a single relay before reaching the destination node. Secondly, global case is studied; the
information passes by several relays. We consider, in the previous both cases, that the batteries are nonrechargeable. Thirdly, we spread our work the case where the batteries are rechargeable with unlimited
storage capacity. In all three cases, we suppose that Maximum Ratio Combining (MRC) is used as a
detector, and Amplify and Forward (AF) as a relaying strategy. Simulation results show the viability of
our approach which the network lifetime is extended of more than 70.72%when the batteries are non
rechargeable and 100.51% when the batteries are rechargeable in comparison with other traditional
method.
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
This paper addresses the maximizing network lifetime problem in wireless sensor networks (WSNs) taking
into account the total Symbol Error rate (SER) at destination. Therefore, efficient power management is
needed for extend network lifetime. Our approach consists to provide the optimal transmission power
using the orthogonal multiple access channels between each sensor. In order to deeply study the
properties of our approach, firstly, the simple case is considered; the information sensed by the source
node passes by a single relay before reaching the destination node. Secondly, global case is studied; the
information passes by several relays. We consider, in the previous both cases, that the batteries are nonrechargeable. Thirdly, we spread our work the case where the batteries are rechargeable with unlimited
storage capacity. In all three cases, we suppose that Maximum Ratio Combining (MRC) is used as a
detector, and Amplify and Forward (AF) as a relaying strategy. Simulation results show the viability of
our approach which the network lifetime is extended of more than 70.72%when the batteries are non
rechargeable and 100.51% when the batteries are rechargeable in comparison with other traditional
method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline MonitoringIJECEIAES
One of the key components of the Internet of Things (IoT) is the Wireless Sensor Network (WSN). WSN is an effective and efficient technology. It consists of senor nodes; smart devices that allows data collection and pre-processing wirelessly from real world. However, issues related to power consumption and computational performance still persist in classical wireless nodes since power is not always available in application like pipeline monitoring. Moreover, they could not be usually suitable and adequate for this kind of application due to memory shortage and performance constraints. Designing new IoT WSN system that matches the application specific requirements is extremely important. In this paper, we present WiRoTip, a WSN node prototype for water pipeline application. An experimental and a comparative studies have been performed for the different node’s components to achieve a final adequate design.
Similar to Impact of the temperature and humidity variations on link quality of xm1000 mote sensors (20)
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
Are you interested in dipping your toes in the cloud native observability waters, but as an engineer you are not sure where to get started with tracing problems through your microservices and application landscapes on Kubernetes? Then this is the session for you, where we take you on your first steps in an active open-source project that offers a buffet of languages, challenges, and opportunities for getting started with telemetry data.
The project is called openTelemetry, but before diving into the specifics, we’ll start with de-mystifying key concepts and terms such as observability, telemetry, instrumentation, cardinality, percentile to lay a foundation. After understanding the nuts and bolts of observability and distributed traces, we’ll explore the openTelemetry community; its Special Interest Groups (SIGs), repositories, and how to become not only an end-user, but possibly a contributor.We will wrap up with an overview of the components in this project, such as the Collector, the OpenTelemetry protocol (OTLP), its APIs, and its SDKs.
Attendees will leave with an understanding of key observability concepts, become grounded in distributed tracing terminology, be aware of the components of openTelemetry, and know how to take their first steps to an open-source contribution!
Key Takeaways: Open source, vendor neutral instrumentation is an exciting new reality as the industry standardizes on openTelemetry for observability. OpenTelemetry is on a mission to enable effective observability by making high-quality, portable telemetry ubiquitous. The world of observability and monitoring today has a steep learning curve and in order to achieve ubiquity, the project would benefit from growing our contributor community.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
What's New in Copilot for Microsoft365 May 2024.pptx
Impact of the temperature and humidity variations on link quality of xm1000 mote sensors
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
DOI : 10.5121/ijasuc.2014.5603 21
IMPACT OF THE TEMPERATURE AND
HUMIDITY VARIATIONS ON LINK QUALITY OF
XM1000 MOTE SENSORS
Samia Allaoua Chelloug
Networks and Communication Systems Department, College of Computer and
Information Sciences, Princess Nourah bint AbdulRahman University, Riyadh
Kingdom of Saudi Arabia
ABSTRACT
The core motivations of deploying a sensor network for a specific application come from the autonomy of
sensors, their reduced size, and their capabilities for computing and communicating in a short range.
However, many challenges for sensor networks still exist: minimizing energy consumptions, and ensuring
the performance of communication that may be affected by many parameters. The work described in this
paper covers mainly the analysis of the impact of the temperature and humidity variations on link quality of
XM1000 operating under TinyOS. Two-way ANOVA test has been applied and the obtained results show
that both the temperature and humidity variations impact RSSI.
KEYWORDS
sensor network, XM1000, TinyOS, ANOVA, temperature, humidity, RSSI, LQI.
1. INTRODUCTION
By definition, a sensor network is deployed either inside the phenomenon to be monitored or very
close to it. Each sensor consists of a microcontroller, a transceiver, a source of power, and a
sensing unit [1]. Sensor networks are being considered for use in: smart homes, E-health,
industrial automation,… Some applications have stringent requirements that concern the delay
and the reliability of communication [2]. However, recent studies show that signals fluctuate and
sometimes it is very hard to ensure a certain degree of quality of service. Hence, the aim of our
experimental study is to show how the temperature and humidity fluctuations may affect the link
quality of XM1000 sensor motes that have been manufactured by ADVENTICS and use an
MSP430 microcontroller. It provides a program flash memory and data program storage space.
XM1000 functions under TinyOS2.x operating system which is appropriate for programming
embedded systems. In particular, our experimental study focuses on understating the effect of the
two parameters (temperature and humidity) upon link quality.
This article provides a literature review of related works. Sections 3 and 4 explains the hardware
architecture of XM1000 and TinyOs. Sections 5 outlines the principles of ANOVA. Then, our
experimental results are illustrated and analyzed by two-way ANOVA.
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
22
2. IMPACT OF METEROLOGICAL CONDITIONS ON SENSOR NETWORKS
Designing appropriate protocols for sensor networks is a critical task due to their hardware
constraints. Many research works exploit some indicators that can be obtained via hardware to
process and communicate data in wireless sensor networks. In particular, the research community
faces the challenge of power control and power saving to extend the lifetime of wireless sensor
networks. Power control and power saving may be applied jointly with other sensor protocols to
efficiently localize sensors, route data packets, ovoid interference,… Extensive studies are based
on measuring the strength of the received signal (RSSI) or the link quality (LQI) that can be
calculated by the transceiver. Some results show that LQI is a good indicator for new sensor
platforms [3]. Unfortunately, meteorological conditions (temperature, humidity) may affect the
link quality. Hence, it is necessary to analyze the impact of such parameters to assure accuracy
while controlling or saving power. Some research works provided experimental studies for
understating the impact of meteorological conditions on the link quality of sensor networks.
The study presented in [4] supports greenhouse monitoring. It is based on the deployment of four
sensors to monitor temperature, humidity, light, and the level of carbon Dioxide in a green house.
The hardware platform sends compressed IPV6 packets over IEEE802.15.4 with a loss rate of
5%. Authors conclude through their experimental study that there is a relationship between the
relative temperature and humidity inside a greenhouse such that the temperature increases once
the humidity has decreased.
The focus of [5] is to understand signal propagation between fixed and a mobile sensor and
evaluate the impact of meteorological conditions on signal propagation. Memsic wireless sensors
with three integrated sensors( humidity, temperature, barometric pressure) have been used. Their
study demonstrates that the signal variation at each position is small and the variations in the
presence of large water bodies is influenced by changes in temperature, humidity, and the
refractive index of the medium.
[6] Proposed an idea for power control in wireless sensor networks that depends on the evaluated
temperature and humidity. They developed a controller that adapts power according to RSSI
feedback.
The main research interest of [7] is to study the impact of meteorological conditions on 802.15.4
links. Authors of the paper evaluated different conditions in Sweden. Their research conclude that
the temperature variations correlate the most with RSSI and PRR.
[8] Conducted experiments and designed a scheme that combines both temperature-aware link
quality compensation and a closed-loop feedback process to adapt to link quality.
In this paper, we investigate how the temperature and humidity variations may affect link quality
of XM1000 sensors. Our idea studies the influence of the two factors on RSSI and LQI and uses
ANOVA (variance analysis) to recognize the importance of each parameter.
3. XM1000 SENSOR MOTE
The consolidation of micro-electro mechanical systems (MEMS) and digital wireless
communications has led to the ability of deploying small devices that are application-specific. In
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
23
particular, sensors are provided with sensing and communicating capabilities that overcome the
limitations of traditional networks for remote real time monitoring. Many kinds of sensors are
available in the market and are designed and manufactured by leader industrial companies:
CrossBow, Atmel,… XM1000 mote module is based on TelosB specification which is the result
of the research conducted in UC Berkely. TelosB is equipped by MSP430 microcontroller which
is characterized by many features [9]:
Complete system on chip that includes LCD control, ADC, I/O ports, RAM(10 KB),
ROM, timer, UART,…
Low power consumption: 4.2 nW/instruction.
High speed: 300 ns/instruction a clock speed of 3.3MHZ.
Risc set of 27 core instructions that make the process of programming very easy.
48 KB of flash memory.
802.15.4 compliant mode and consumes low power for communications.
Current in active mode is 1.8 mA and the current in sleep mode is 5.1MA.
Three sensors are integrated on XM1000: temperature, humidity, and light sensors. Its dimensions
are 81.9mm*32.5mm*6.55mm including USB connector. It is provided by 116KB of program
flash, 8KB of data program and 1MB for logging. The radio frequency chip of XM1000 operates
in 2.4-2.485 GH with a rate of 250Kbps and can cover a range of 120m outdoor and between 20
to 30 m indoor [10].
Some research works have used XM1000 for carrying experiments:
ManOs has been tested on XM1000 to evaluate the potential to make sensor programming
accessible for a broader range of programmers [11].
[12] studied and compared a set of empirical models to estimate the path loss by means of
XM1000.
[13] demonstrated that device heterogeneity may improve energy by moving resource intensive
tasks to other nodes in the network. Their study has focused on imote2, Inga, Mulle v5-2,
Sunspot, TelosB, and XM1000.
4. TinyOS
XM1000 is compatible with TinyOs2.x which is open project that was developed at University of
California. It is based on Nesc language that is suited for programming embedded systems. Its
syntax is similar to C syntax but NesC is enhanced to support concurrency and allows to structure
a program into linked components to reduce the compile time. Unlike C, NesC locates all
functions at compile time. NesC compilers generate a C file after processing the NesC file. The C
file is then compiled to the desired microcontroller. Each NesC application program is divided
into linked modules to avoid any explicit pointer. The configuration file specifies the links
between the system modules however, the interface specifies the interaction between two
components: the user which implements a set of events and the provides that implements a set of
commands [14].
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
24
Figure1 . Component of NESC programming model.
The specification of each component (module or configuration) contains two parts: the signature
and the implementation. The signature describes if the component use or provide any interface.
5. ANOVA
ANOVA is a statistical technique that takes one or more populations as input and tests the
inequality among population means. More specifically, ANOVA analyses the effect of one or two
qualitative factors upon a quantitative variable. ANOVA is based on hypothesis test [15]:
• :0ܪ µଵ
= µଶ
= ⋯ µ
This means that all population means are equal. K is the total
number of groups.
• :ܣܪ At least two of the means differ.
ANOVA calculates the F-test such that:
ܨ =
ெௌோ
ெௌா
(1)
ܴܵܯ is the mean square of the treatment and ܧܵܯ is the mean square of error.
ܶܵܯ =
ௌௌ்
ିଵ
(2)
ܧܵܯ =
ௌௌா
ି
(3)
ܵܵܶ is the variation between however ܵܵܧ is the variation within and n is the number of samples
in each group.
F is expected to be nearly equal to 1 if all population means are equals. Otherwise, the hypothesis
0ܪ will be rejected.
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
25
6. EXPERIMENTAL STUDY
Our experimental study involves two XM1000 sensors. The first one is considered as a base
station and sends periodically a message to the second one. Upon receiving a message, the target
sensor measures the temperature, the humidity, RSSI, and LQI. The distance between the two
sensors is around 20 Cm.
Figure 2 illustrates the hardware used in our experiment. The plotting of the variation of the
measured RSSI according to the temperature is shown in figure 3. Linear regression has been
applied and the color of the trendline is black. It is clear that there is a polynomial relation
between RSSI and the temperature. Moreover, we can conclude from the result of the regression
that RSSI is very high in the first group (12-270
) and decreases once the temperature exceeds 270
Figure 2. XM1000 sensors.
Figure 3. Temperature versus RSSI.
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
26
The plotting of the variation of the measured RSSI according to humidity is shown in figure 4.
Linear regression has been applied and the color of the trendline is black. It is clear that there is a
linear relation between RSSI and humidity. We can recognize two groups of RSSI measures after
applying linear regression and RSSI increases in a linear manner from the first group that
corresponds to humidity values ranging from 9 to 13% to the second one that corresponds to
humidity values ranging from 13 to 15%.
Figure 4. Humidity versus RSSI.
Figures 5 and 6 illustrate the variation of LQI according to temperature and humidity
respectively. From the plots of linear regression, it is clear that the variation of LQI versus
temperature and humidity is linear.
Figure 5. Temperature versus LQI.
7. International Journal of Ad hoc, Sensor &
We were asking the question about the important parameter that impacts RSSI as the function of
variation of RSSI according to temperature is different from its function of variation according to
humidity. To this end, we applied ANOVA after preparing three groups of tem
warm, low) and two groups of humidity (high and low).
Three comments should be highlighted form table 1.
-The variance of each group is not far away from 1.
-The values for F are greater of F crit.
-P-values are smaller than 0.5.
So, H0 hypothesis is maintained and both temperature and humidity influence RSSI.
7. CONCLUSION
Estimating link quality is an important factor for many sensor protocols.
concerned the estimation of both RSSI and LQI in a small XM1000
show that the impact of the temperature and humidity
analysis shows that RSSI is influenced by temperature as well as humidity. Hence it is necessary
to save energy according to those two para
and saving in XM1000 sensor networks.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
Figure 6. Humidity versus LQI.
the question about the important parameter that impacts RSSI as the function of
variation of RSSI according to temperature is different from its function of variation according to
humidity. To this end, we applied ANOVA after preparing three groups of temperature (high,
warm, low) and two groups of humidity (high and low).
Three comments should be highlighted form table 1.
he variance of each group is not far away from 1.
he values for F are greater of F crit.
H0 hypothesis is maintained and both temperature and humidity influence RSSI.
Estimating link quality is an important factor for many sensor protocols. Our experimental study
concerned the estimation of both RSSI and LQI in a small XM1000 sensor network.
temperature and humidity variations on LQI are linear. ANOVA
analysis shows that RSSI is influenced by temperature as well as humidity. Hence it is necessary
to save energy according to those two parameters. We will focus in the future on power control
and saving in XM1000 sensor networks.
Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
27
the question about the important parameter that impacts RSSI as the function of
variation of RSSI according to temperature is different from its function of variation according to
perature (high,
Our experimental study
sensor network. Our results
on LQI are linear. ANOVA
analysis shows that RSSI is influenced by temperature as well as humidity. Hence it is necessary
We will focus in the future on power control
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
28
Table 1. AVOVA results.
REFERENCES
[1] Akyildiz. I-F, Su. W, Sankarasubramaniam . Y, Cayirci.E, “Wireless sensor networks, a survey” , in
the Proceedings of the International Journal of Computer and Telecommunications Networking , Vol.
38, Issue 4 pp. 393-422, 2002
[2] Boano. C-A, Tsiftes.N, Voigt.T, Brown.J, Roedig.U, “The impact of temperature on outdoor
industrial sensornet applications” , In the Proceedings of IEEE transactions of Industrial Informatics ,
Vol. 6, No. 3, pp. 451-459, 2010.
[3] Srinivasan.K, Levis.P , “RSSI is Under Appreciated”, In Proceedings of the Third Workshop on
Embedded Networked Sensors (2006) .
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.6, December 2014
29
[4] Ahonen.T , Vir ankoski.R , Elmusrati.M, “Greenhouse Monitoring with Wireless Sensor Networks:,
in the Proceedings of IEEE Mechtronic and Embeded Systems and Applications, pp.403-408, Beijing,
2008.
[5] Harun.A, Ndzi.D-L, Ramli.M-F, Shakaff.A-Y-M, Ahmad.M-N, Kamarudin.L-M, Zakaria.M, and
Yang.Y, "Signal propagation in aquaculture environment for wireless sensor network applications," in
the Proceedings of Progress In Electromagnetics Research, Vol. 131, pp.477-494, 2012
[6] Ortega-Corral.C, Palafox.L-E, García-Macías.J-A, Sanchez-Garcia.J, Aguilar.L, Van Nieto-
Hipólito.J-A, “Transmission Power Control based on temperature and relative humidity”, in the
proceedings of ISSNIP, pp.1-6, 2014.
[7] Wennerström.H, “ Meteorological Impact and Transmission Errors in Outdoor Wireless Sensor
Networks”, IT Licentiate Thesis, Uppsala, 2013.
[8] Lee.J, Chung.K, “An efficient transmission power control scheme for temperature variation in
wireless sensor networks” . in the proceedings of Sensors, vol. 11, no. 3, pp. 3078-3093, 2011.
[9] http://www.win.tue.nl/~johanl/educ/RTcourse/MSP430%20UART.pdf
[10] http://www.advanticsys.com/shop/asxm1000-p-24.html
[11] Elsts.A, Selavo.L, “Improving the Usability of Wireless Sensor Network Operating Systems” , in the
Proceedings of the Federated Conference on Computer Science and Information Systems, pp. 89-94,
2013.
[12] Donmez.R-G , “A study on path loss for indoor wireless communication networks”, Master Thesis,
2013.
[13] Reinhardt.A, Burgstahler.D, "Exploiting Platform Heterogeneity in Wireless Sensor Networks by
Shifting Resource-Intensive Tasks to Dedicated Processing Nodes", In the proceedings of IEEE 14th
International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM
2013, pp. 1-9, Spain, 2013.
[14] http://www.tinyos.net/
[15] http://www.cimt.plymouth.ac.uk/projects/mepres/alevel/fstats_ch7.pdf
Biography
Samia Allaoua Chelloug received the Engineer degree (Computer Science) in 2003, Magister degree
(Computer Science) in 2006, and the Phd degree (Networking) in 2013 (all from University of Constantine,
Algeria).
From 2006 to 2013 she was an Assistant Professor in the Faculty of Computer Science in Constantine
University.
In August 2013, she joined the Department of Networks and Communication Systems at Princess Nourah
University (Riyadh, Kingdom of Saudi Arabia) where she is presently an Assistant Professor.
Her current research interests include: wireless sensor networks, cognitive radio, Vanets, and Fourth
Generation communication standards.