Abstract: Proprietary sensor network systems are typically expensive, rigid and difficult to incorporate technologies from other vendors. When using competing and incompatible technologies, a non-proprietary system is complex to create because it requires significant technical expertise and effort, which can be more expensive than a proprietary product. This paper presents the Sensor Abstraction Layer (SAL) that provides middleware architectures with a consistent and uniform view of heterogeneous sensor networks, regardless of the technologies involved. SAL abstracts and hides the hardware disparities and specificities related to accessing, controlling, probing and piloting heterogeneous sensors. SAL is a single software library containing a stable hardware-independent interface with consistent access and control functions to remotely manage the network. The end-user has near-real-time access to the collected data via the network, which results in a cost-effective, flexible and simplified system suitable for novice users. SAL has been used for successfully implementing several low-cost sensor network systems.
Abstract: Due to heavy energy constraints in WSNs clustering is
an efficient way to manage the energy in sensors. There are many
methods already proposed in the area of clustering and research is
still going on to make clustering more energy efficient. In our paper
we are proposing a minimum spanning tree based clustering using
divide and conquer approach. The MST based clustering was first
proposed in 1970’s for large databases. Here we are taking divide and
conquer approach and implementing it for wireless sensor networks
with the constraints attached to the sensor networks. This Divide and
conquer approach is implemented in a way that we don’t have to
construct the whole MST before clustering but we just find the edge
which will be the part of the MST to a corresponding graph and
divide the graph in clusters there itself if that edge from the graph can
be removed judging on certain constraints and hence saving lot of
computation.
Abstract: Wireless Sensor Networks (WSNs) have attracted the attention of many researchers. This has resulted in their rapid integration in very different areas such as precision agriculture,environmental monitoring, object and event detection and military surveillance. Due to the current WSN characteristics this technology is specifically useful in industrial areas where security, reliability and autonomy are basic, such as nuclear power plants, chemical plants, and others. In this paper we present a system based on WSNs to monitor environmental conditions around and inside a nuclear power plant, specifically, radiation levels. Sensor nodes, equipped with radiation sensors, are deployed in fixed positions throughout the plant. In addition, plant staff are also equipped with mobile devices with higher capabilities than sensors such as for example PDAs able to monitor radiation levels and other conditions around them. The system enables communication between PDAs, which form a Mobile Ad-hoc Wireless Network (MANET), and allows workers to monitor remote conditions in the plant. It is particularly useful during stoppage periods for inspection or in the event of an accident to prevent risk situations.
Abstract: The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. It supports the decision making processes in wireless sensor networks such as pre key-distribution, cluster head selection, data aggregation, routing and self reconfiguration of sensor nodes. This paper discussed the kinds of trust model, trust metrics used to address attacks by monitoring certain behavior of network. It describes the major design issues and their countermeasures of building trust model. It also discusses existing trust models used in various decision making process of wireless sensor networks.
Abstract: With the advancement of wireless sensor network technology,
its practical utilization is becoming an important challange.
This paper overviews my past environmental monitoring project,
and discusses the process of starting the monitoring by classifying
it into four steps. The steps to start environmental monitoring can
be complicated, but not well discussed by researchers of wireless
sensor network technology. This paper demonstrates our activity and
challenges in each of the four steps to ease the process, and argues
future challenges to enable quick start of environmental monitoring.
Abstract: Recent developments in Soft computing techniques,
power electronic switches and low-cost computational hardware have
made it possible to design and implement sophisticated control
strategies for sensorless speed control of AC motor drives. Such an
attempt has been made in this work, for Sensorless Speed Control of
Induction Motor (IM) by means of Direct Torque Fuzzy Control
(DTFC), PI-type fuzzy speed regulator and MRAS speed estimator
strategy, which is absolutely nonlinear in its nature. Direct torque
control is known to produce quick and robust response in AC drive
system. However, during steady state, torque, flux and current ripple
occurs. So, the performance of conventional DTC with PI speed
regulator can be improved by implementing fuzzy logic techniques.
Certain important issues in design including the space vector
modulated (SVM) 3-Ф voltage source inverter, DTFC design,
generation of reference torque using PI-type fuzzy speed regulator
and sensor less speed estimator have been resolved. The proposed
scheme is validated through extensive numerical simulations on
MATLAB. The simulated results indicate the sensor less speed
control of IM with DTFC and PI-type fuzzy speed regulator provides
satisfactory high dynamic and static performance compare to
conventional DTC with PI speed regulator.
Abstract: The present paper represent the efforts undertaken for
the development of an semi-automatic robot that may be used for
various post-disaster rescue operation planning and their subsequent
execution using one-way communication of video and data from the
robot to the controller and controller to the robot respectively.
Wireless communication has been used for the purpose so that the
robot may access the unapproachable places easily without any
difficulties. It is expected that the information obtained from the
robot would be of definite help to the rescue team for better planning
and execution of their operations.
Abstract: Sensor networks are often deployed in unattended
environments, thus leaving these networks vulnerable to false data
injection attacks in which an adversary injects forged reports into the
network through compromised nodes, with the goal of deceiving the
base station or depleting the resources of forwarding nodes. Several
research solutions have been recently proposed to detect and drop such
forged reports during the forwarding process. Each design can provide
the equivalent resilience in terms of node compromising. However,
their energy consumption characteristics differ from each other. Thus,
employing only a single filtering scheme for a network is not a
recommendable strategy in terms of energy saving. It's very important
the threshold determination for message authentication to identify. We
propose the recursive contract net protocols which less energy level of
terminal node in wireless sensor network.
Abstract: With the intention of screening for heavy metal
tolerance, a number of bacteria were isolated and characterized from
a pristine soil. Two Gram positive isolates were identified as
Paenibacillus sp. and Bacillus thuringeinsis. Tolerance of Cd2+, Cu2+
and Zn2+ by these bacteria was studied and found that both bacteria
were highly sensitive to Cu2+ compared to other two metals. Both
bacteria showed the same pattern of metal tolerance in the order Zn+
> Cd2+ > Cu2+. When the metal tolerance in both bacteria was
compared, Paenibacillus sp. showed the highest sensitivity to Cu2+
where as B. thuringiensis showed highest sensitivity to Cd2+ and Zn2+
.These findings revealed the potential of Paenibacillus sp. in
developing a biosensor to detect Cu2+ in environmental samples.
Abstract: Nuclear matrix protein 22 (NMP22) is a FDA approved
biomarker for bladder cancer. The objective of this study is to develop
a simple NMP22 immumosensor (NMP22-IMS) for accurate
measurement of NMP22. The NMP22-IMS was constructed with
NMP22 antibody immobilized on screen-printed carbon electrodes.
The construction procedures and antibody immobilization are simple.
Results showed that the NMP22-IMS has an excellent (r2³0.95)
response range (20 – 100 ng/mL). In conclusion, a simple and reliable
NMP22-IMS was developed, capable of precisely determining urine
NMP22 level.
Abstract: In this article, we introduce a mechanism by which the same concept of differentiated services used in network transmission can be applied to provide quality of service levels to pervasive systems applications. The classical DiffServ model, including marking and classification, assured forwarding, and expedited forwarding, are all utilized to create quality of service guarantees for various pervasive applications requiring different levels of quality of service. Through a collection of various sensors, personal devices, and data sources, the transmission of contextsensitive data can automatically occur within a pervasive system with a given quality of service level. Triggers, initiators, sources, and receivers are four entities labeled in our mechanism. An explanation of the role of each is provided, and how quality of service is guaranteed.
Abstract: The wireless link can be unreliable in realistic wireless
sensor networks (WSNs). Energy efficient and reliable data
forwarding is important because each node has limited resources.
Therefore, we must suggest an optimal solution that considers using
the information of the node-s characteristics. Previous routing
protocols were unsuited to realistic asymmetric WSNs. In this paper,
we propose a Protocol that considers Both sides of Link-quality and
Energy (PBLE), an optimal routing protocol that balances modified
link-quality, distance and energy. Additionally, we propose a node
scheduling method. PBLE achieves a longer lifetime than previous
routing protocols and is more energy-efficient. PBLE uses energy,
local information and both sides of PRR in a 1-hop distance. We
explain how to send data packets to the destination node using the
node's information. Simulation shows PBLE improves delivery rate
and network lifetime compared to previous schemes. Moreover, we
show the improvement in various WSN environments.
Abstract: Rapid advancement in computing technology brings
computers and humans to be seamlessly integrated in future. The
emergence of smartphone has driven computing era towards
ubiquitous and pervasive computing. Recognizing human activity has
garnered a lot of interest and has raised significant researches-
concerns in identifying contextual information useful to human
activity recognition. Not only unobtrusive to users in daily life,
smartphone has embedded built-in sensors that capable to sense
contextual information of its users supported with wide range
capability of network connections. In this paper, we will discuss the
classification algorithms used in smartphone-based human activity.
Existing technologies pertaining to smartphone-based researches in
human activity recognition will be highlighted and discussed. Our
paper will also present our findings and opinions to formulate
improvement ideas in current researches- trends. Understanding
research trends will enable researchers to have clearer research
direction and common vision on latest smartphone-based human
activity recognition area.
Abstract: A novel circuit for generating a signal embedded with
features about data from three sensors is presented. This suggested
circuit is making use of a resistance-to-time converter employing a
bridge amplifier, an integrator and a comparator. The second resistive
sensor (Rz) is transformed into duty cycle. Another bridge with
varying resistor, (Ry) in the feedback of an OP AMP is added in
series to change the amplitude of the resulting signal in a proportional
relationship while keeping the same frequency and duty cycle
representing proportional changes in resistors Rx and Rz already
mentioned. The resultant output signal carries three types of
information embedded as variations of its frequency, duty cycle and
amplitude.
Abstract: During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Abstract: In over deployed sensor networks, one approach
to Conserve energy is to keep only a small subset of sensors
active at Any instant. For the coverage problems, the monitoring
area in a set of points that require sensing, called demand points, and
consider that the node coverage area is a circle of range R, where R
is the sensing range, If the Distance between a demand point and
a sensor node is less than R, the node is able to cover this point. We
consider a wireless sensor network consisting of a set of sensors
deployed randomly. A point in the monitored area is covered if it is
within the sensing range of a sensor. In some applications, when the
network is sufficiently dense, area coverage can be approximated by
guaranteeing point coverage. In this case, all the points of wireless
devices could be used to represent the whole area, and the working
sensors are supposed to cover all the sensors. We also introduce
Hybrid Algorithm and challenges related to coverage in sensor
networks.
Abstract: This work relates the development of an optical fiber
(OF) sensor for the detection and quantification of single walled
carbon nanotubes in aqueous solutions. The developed OF displays a
compact design, it requires less expensive materials and equipment
as well as low volume of sample (0.2 mL). This methodology was
also validated by the comparison of its analytical performance with
that of a standard methodology based on ultraviolet-visible
spectroscopy. The developed OF sensor follows the general SDS
calibration proposed for OF sensors as a more suitable calibration
fitting compared with classical calibrations.
Abstract: Article devoted to the development of technologies
for medicine and agroecology by using plant organelle – spherosome.
Technological method of purification and isolation of this organelle
by using novel nanostructured carbon sorbent – “nanocarbosorb"
ARK type are presented. Also the methods of preparation of
nanocontainers based on using of spherosome with loaded isosorbide
dinitrate, piroxicam or diclofenak are exhibited. We found that the
spherosome could be applied for ecological aims as bioregulator and
also as biosensor for determination of ammonia ions in water
reservoirs at concentration range 1mM to 100mM.
Abstract: This paper presents preliminary results regarding system-level power awareness for FPGA implementations in wireless sensor networks. Re-configurability of field programmable gate arrays (FPGA) allows for significant flexibility in its applications to embedded systems. However, high power consumption in FPGA becomes a significant factor in design considerations. We present several ideas and their experimental verifications on how to optimize power consumption at high level of designing process while maintaining the same energy per operation (low-level methods can be used additionally). This paper demonstrates that it is possible to estimate feasible power consumption savings even at the high level of designing process. It is envisaged that our results can be also applied to other embedded systems applications, not limited to FPGA-based.
Abstract: Water leakage is a serious problem in the maintenance of a waterworks facility. Monitoring the water flow rate is one way to locate leakage. However, conventional flowmeters such as the wet-type flowmeter and the clamp-on type ultrasonic flowmeter require additional construction for their installation and are therefore quite expensive. This paper proposes a novel estimation system for the flow rate in a water pipeline, which employs a vibration sensor. This assembly can be attached to any water pipeline without the need for additional high-cost construction. The vibration sensor is designed based on a condenser microphone. This sensor detects vibration caused by water flowing through a pipeline. It is possible to estimate the water flow rate by measuring the amplitude of the output signal from the vibration sensor. We confirmed the validity of the proposed sensing system experimentally.