254 research outputs found

    Swarm intelligence and its applications to wireless ad hoc and sensor networks.

    Get PDF
    Swarm intelligence, as inspired by natural biological swarms, has numerous powerful properties for distributed problem solving in complex real world applications such as optimisation and control. Swarm intelligence properties can be found in natural systems such as ants, bees and birds, whereby the collective behaviour of unsophisticated agents interact locally with their environment to explore collective problem solving without centralised control. Recent advances in wireless communication and digital electronics have instigated important changes in distributed computing. Pervasive computing environments have emerged, such as large scale communication networks and wireless ad hoc and sensor networks that are extremely dynamic and unreliable. The network management and control must be based on distributed principles where centralised approaches may not be suitable for exploiting the enormous potential of these environments. In this thesis, we focus on applying swarm intelligence to the wireless ad hoc and sensor networks optimisation and control problems. Firstly, an analysis of the recently proposed particle swarm optimisation, which is based on the swarm intelligence techniques, is presented. Previous stability analysis of the particle swarm optimisation was restricted to the assumption that all of the parameters are non random since the theoretical analysis with the random parameters is difficult. We analyse the stability of the particle dynamics without these restrictive assumptions using Lyapunov stability and passive systems concepts. The particle swarm optimisation is then used to solve the sink node placement problem in sensor networks. Secondly, swarm intelligence based routing methods for mobile ad hoc networks are investigated. Two protocols have been proposed based on the foraging behaviour of biological ants and implemented in the NS2 network simulator. The first protocol allows each node in the network to choose the next node for packets to be forwarded on the basis of mobility influenced routing table. Since mobility is one of the most important factors for route changes in mobile ad hoc networks, the mobility of the neighbour node using HELLO packets is predicted and then translated into a pheromone decay as found in natural biological systems. The second protocol uses the same mechanism as the first, but instead of mobility the neighbour node remaining energy level and its drain rate are used. The thesis clearly shows that swarm intelligence methods have a very useful role to play in the management and control iv problems associated with wireless ad hoc and sensor networks. This thesis has given a number of example applications and has demonstrated its usefulness in improving performance over other existing methods

    Mobile Emulab: A Robotic Wireless and Sensor Network Testbed

    Full text link

    A comparison of barcoding and RFID technologies in practice

    Get PDF
    This research paper highlights inconsistencies in the way Radio Frequency Identification (RFID) is compared to existing barcoding technology and the lack of empirical evidence to support one’s superiority over the other. Reference is drawn to the way in which RFID and barcoding tech- nologies are represented in the literature. Time and motion studies were conducted in a distribution company’s chilled warehouse where RFID technology had already been trialled and implemented on recyclable refrigerated food trays and in operation alongside barcoding systems. Attention was given to recording the number and nature of errors that each technology exhibited. This paper concludes that while RFID can deliver improved operational performance over tradi- tional barcode systems, it is found to be less reliable in implementation. Hybrid systems may offer operational benefits over single-technology systems, but the cost of their complexity still needs to be examined

    Value chain dynamics in the RFID technology

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, 2006.Includes bibliographical references (leaf 66).RFID (Radio Frequency Identification) technology has been one of the oldest renewed technologies with a promise of becoming a foundation of "The Internet of Things" in future. MIT's Auto-ID labs and EPCGlobal have been instrumental in advocating standards, making mass scale adoption a reality. The early adopters were found to be in the retail supply chain industry followed by many interesting applications in areas ranging from Fish Tracking to authentication of currency notes. Projects implemented till 2006 were mainly pilot in nature with a desire to understand the technology, given its limitations and challenges and conclude with value propositions or return on investment analysis for corporations. This work has attempted to study such phenomenon in greater detail, bring together the dimensions of technology and business as related to the current state of RFID. We found a very different set of value dynamics applicable to each individual component in the RFID business landscape. Analysis on presented in more detail for manufacturers (Suppliers) of goods as well as Sellers (Retailers) of goods. Further work may be in the form of analyzing the remaining components like logistics players and end customers in a similar fashion.(cont.) Case studies and interview were done to collect data. Secondary sources of information in the forms of published reports and articles are also used and referenced. Management science techniques like Systems Dynamics are used to model some of the value parameters for each component in the retail supply chain. In conclusion, we think although each component of the studied landscape has shown value enhancement and erosion (primarily to cost factors), the overall system shows net gains. As all other technologies, RFID will become cheaper with increased adoption and has a very high probability to be prevalent and ubiquitous in near future.by Milind Tavshikar.S.M

    Investigating wireless network deployment configurations for marginalized areas

    Get PDF
    In recent years, immense effort has been channelled towards the Information and Technological development of rural areas. To support this development, telecommunication networks have been deployed. The availability of these telecommunication networks is expected to improve the way people share ideas and communicate locally and globally, reducing limiting factors like distance through the use of the Internet. The major problem for these networks is that very few of them have managed to stay in operation over long periods of time. One of the major causes of this failure is the lack of proper monitoring and management as, in some cases, administrators are located far away from the network site. Other factors that contribute to the frequent failure of these networks are lack of proper infrastructure, lack of a constant power supply and other environmental issues. A telecommunication network was deployed for the people of Dwesa by the Siyakhula Living Lab project. During this research project, frequent visits were made to the site and network users were informally interviewed in order to gain insight into the network challenges. Based on the challenges, different network monitoring systems and other solutions were deployed on the network. This thesis analyses the problems encountered and presents possible and affordable solutions that were implemented on the network. This was done to improve the network‟s reliability, availability and manageability whilst exploring possible and practical ways in which the connectivity of the deployed telecommunication network can be maintained. As part of these solutions, a GPRS redundant link, Nagios and Cacti monitoring systems as well as Simple backup systems were deployed. v Acronyms AC Access Concentrators AMANDA Automatic Marylyn Network Disk Archiver CDMA Code Divison Multiple Access CGI Common Gateway Interface

    Detecção de ataques por canais laterais na camada física

    Get PDF
    Today, with the advent of IoT and the resulting fragmentation of wireless technologies, they bring not only benefits, but also concerns. Daily, several individuals communicate with each other using various communication methods. Individuals use a variety of devices for innocuous day-to-day activities; however, there are some malicious individuals (dishonest agents) whose aim is to cause harm, with the exfiltration of information being one of the biggest concerns. Since the security of Wi-Fi communications is one of the areas of greatest investment and research regarding Internet security, dishonest agents make use of side channels to exfiltrate information, namely Bluetooth. Most current solutions for anomaly detection on networks are based on analyzing frames or packets, which, inadvertently, can reveal user behavior patterns, which they consider to be private. In addition, solutions that focus on inspecting physical layer data typically use received signal power (RSSI) as a distance metric and detect anomalies based on the relative position of the network nodes, or use the spectrum values directly on models classification without prior data processing. This Dissertation proposes mechanisms to detect anomalies, while ensuring the privacy of its nodes, which are based on the analysis of radio activity in the physical layer, measuring the behavior of the network through the number of active and inactive frequencies and the duration of periods of silence and activity. After the extraction of properties that characterize these metrics,an exploration and study of the data is carried out, followed by the use of the result to train One-Class Classification models. The models are trained with data taken from a series of interactions between a computer, an AP, and a mobile phone in an environment with reduced noise, in an attempt to simulate a simplified home automation scenario. Then, the models were tested with similar data but containing a compromised node, which periodically sent a file to a local machine via a Bluetooth connection. The data show that, in both situations, it was possible to achieve detection accuracy rates in the order of 75 % and 99 %. This work ends with some ideas of resource work, namely changes in the level of pre-processing, ideas of new tests and how to reduce the percentage of false negatives.Hoje, com o advento da IoT e a resultante fragmentação das tecnologias sem fio, elas trazem não apenas benefícios, mas também preocupações. Diariamente vários indivíduos se comunicam entre si usando vários métodos de comunicação. Os indivíduos usam uma variedade de dispositivos para atividades inócuas do dia-adia; no entanto, existem alguns indivíduos mal-intencionados (agentes desonestos) cujo objetivo é causar danos, sendo a exfiltração de informação uma das maiores preocupações. Sendo a segurança das comunicações Wi-Fi uma das áreas de maior investimento e investigação no que toca a segurança na Internet, os agentes desonestos fazem uso de canais laterais para exfiltrar informação, nomeadamente o Bluetooth. A maioria das soluções atuais para deteção de anomalias em redes baseiam-se em analisar tramas ou pacotes, o que, inadvertidamente, pode revelar padrões de comportamento dos utilizadores, que estes considerem privados. Além disso, as soluções que se focam em inspecionar dados da camada física normalmente usam a potência de sinal recebido (RSSI) como uma métrica de distância e detetam anomalias baseadas na posição relativa dos nós da rede, ou usam os valores do espetro diretamente em modelos de classificação sem prévio tratamento de dados. Esta Dissertação propõe mecanismos para deteção de anomalias, assegurando simultaneamente a privacidade dos seus nós, que se baseiam na análise de atividade rádio na camada física, medindo os comportamentos da rede através do número de frequências ativas e inativas e a duração de períodos de silêncio e atividade. Depois da extração de propriedades que caracterizam estas métricas, é realizada uma exploração dos dados e um estudo das mesmas, sendo depois usadas para treinar modelos de classificação mono-classe. Os modelos são treinados com dados retirados de uma série de interações entre um computador, um AP, e um telemóvel num ambiente com ruído reduzido, numa tentativa de simular um cenário de automação doméstica simplificado. De seguida, os modelos foram testados com dados semelhantes mas contendo um nó comprometido, que periodicamente enviava um ficheiro para uma máquina local através de uma ligação Bluetooth. Os dados mostram que, em ambas as situações, foi possível atingir taxas de precisão de deteção na ordem dos 75% e 99%. Este trabalho finaliza com algumas ideias de trabalho futuro, nomeadamente alterações ao nível do pré-processamento, ideias de novos testes e como diminuir a percentagem de falsos negativos.Mestrado em Engenharia de Computadores e Telemátic

    Smart technologies and beyond: exploring how a smart band can assist in monitoring children’s independent mobility & well-being

    Get PDF
    The problem which is being investigated through this thesis is not having a device(s) or method(s) which are appropriate for monitoring a child’s vital and tracking a child’s location. This aspect is being explored by other researchers which are yet to find a viable solution. This work focuses on providing a solution that would consider using the Internet of Things for measuring and improving children’s health. Additionally, the focus of this research is on the use of technology for health and the needs of parents who are concerned about their child’s physical health and well-being. This work also provides an insight into how technology is used during the pandemic. This thesis will be based on a mixture of quantitative and qualitative research, which will have been used to review the following areas covering key aspects and focuses of this study which are (i) Children’s Independent Mobility (ii) Physical activity for children (iii) Emotions of a child (iv) Smart Technologies and (v) Children’s smart wearables. This will allow a review of the problem in detail and how technology can help the health sector, especially for children. The deliverable of this study is to recommend a suitable smart band device that enables location tracking of the child, activity tracking as well as monitoring the health and wellbeing of the child. The research also includes an element of practical research in the form of (i) Surveys, the use of smart technology and a perspective on the solution from parents. (ii) Focus group, in the form of a survey allowing opinions and collection of information on the child and what the parents think of smart technology and how it could potentially help with their fears. (iii) Observation, which allows the collection of data from children who were given six activities to conduct while wearing the Fitbit Charge HR. The information gained from these elements will help provide guidelines for a proposed solution. In this thesis, there are three frameworks which are about (i) Research process for this study (ii) Key Performance Indicators (KPIs) which are findings from the literature review and (iii) Proposed framework for the solution, all three combined frameworks can help health professionals and many parents who want an efficient and reliable device, also deployment of technologies used in the health industry for children in support of independent mobility. Current frameworks have some considerations within the technology and medical field but were not up to date with the latest elements such as parents fears within today’s world and the advanced features of technology

    A comparison of processing techniques for producing prototype injection moulding inserts.

    Get PDF
    This project involves the investigation of processing techniques for producing low-cost moulding inserts used in the particulate injection moulding (PIM) process. Prototype moulds were made from both additive and subtractive processes as well as a combination of the two. The general motivation for this was to reduce the entry cost of users when considering PIM. PIM cavity inserts were first made by conventional machining from a polymer block using the pocket NC desktop mill. PIM cavity inserts were also made by fused filament deposition modelling using the Tiertime UP plus 3D printer. The injection moulding trials manifested in surface finish and part removal defects. The feedstock was a titanium metal blend which is brittle in comparison to commodity polymers. That in combination with the mesoscale features, small cross-sections and complex geometries were considered the main problems. For both processing methods, fixes were identified and made to test the theory. These consisted of a blended approach that saw a combination of both the additive and subtractive processes being used. The parts produced from the three processing methods are investigated and their respective merits and issues are discussed

    Reducing risk in pre-production investigations through undergraduate engineering projects.

    Get PDF
    This poster is the culmination of final year Bachelor of Engineering Technology (B.Eng.Tech) student projects in 2017 and 2018. The B.Eng.Tech is a level seven qualification that aligns with the Sydney accord for a three-year engineering degree and hence is internationally benchmarked. The enabling mechanism of these projects is the industry connectivity that creates real-world projects and highlights the benefits of the investigation of process at the technologist level. The methodologies we use are basic and transparent, with enough depth of technical knowledge to ensure the industry partners gain from the collaboration process. The process we use minimizes the disconnect between the student and the industry supervisor while maintaining the academic freedom of the student and the commercial sensitivities of the supervisor. The general motivation for this approach is the reduction of the entry cost of the industry to enable consideration of new technologies and thereby reducing risk to core business and shareholder profits. The poster presents several images and interpretive dialogue to explain the positive and negative aspects of the student process

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering
    • …
    corecore