9,633 research outputs found

    Serial distributed detection strategies for wireless sensor networks

    Get PDF
    The interest in wireless sensor networks (WSNs) has been significantly increased over the past years due to their promising future in wide range of application areas like health, military and home. Various technical issues of WSNs have been investigated recently such as topology management, efficient routing protocols and collaborative signal processing. This thesis considers serial distributed detection in WSNs. Unlike traditional distributed detection algorithms where error-free transmissions of local decisions to the fusion center are assumed, lossless communication is not applicable in WSNs since wireless transmission channels are subjected to fading and interference. Suggested distributed detection algorithms in WSNs should deal with the channel uncertainty due to fading and noisy effects of non-ideal channel under low power transmission. In this thesis, we first propose suboptimal fusion rules to the optimal fusion rule for serial distributed detection. In particular, we derive the low and high SNR approximations of the optimal rule in order to relieve some requirements of the optimal fusion rule. Then, we investigate effects of node failure to the serial distributed detection performance and we suggest more robust decision fusion rules under node failure. Lastly, we analyze effects of decision feedback at serial network topology. In order to improve serial distributed detection performance we propose feedback strategies and derive appropriate decision fusion rules for suggested strategies

    Water Pipeline Leakage Detection Based on Machine Learning and Wireless Sensor Networks

    Get PDF
    The detection of water pipeline leakage is important to ensure that water supply networks can operate safely and conserve water resources. To address the lack of intelligent and the low efficiency of conventional leakage detection methods, this paper designs a leakage detection method based on machine learning and wireless sensor networks (WSNs). The system employs wireless sensors installed on pipelines to collect data and utilizes the 4G network to perform remote data transmission. A leakage triggered networking method is proposed to reduce the wireless sensor network’s energy consumption and prolong the system life cycle effectively. To enhance the precision and intelligence of leakage detection, we propose a leakage identification method that employs the intrinsic mode function, approximate entropy, and principal component analysis to construct a signal feature set and that uses a support vector machine (SVM) as a classifier to perform leakage detection. Simulation analysis and experimental results indicate that the proposed leakage identification method can effectively identify the water pipeline leakage and has lower energy consumption than the networking methods used in conventional wireless sensor networks

    Network-aware design-space exploration of a power-efficient embedded application

    Get PDF
    The paper presents the design and multi-parameter optimization of a networked embedded application for the health-care domain. Several hardware, software, and application parameters, such as clock frequency, sensor sampling rate, data packet rate, are tuned at design- and run-time according to application specifications and operating conditions to optimize hardware requirements, packet loss, power consumption. Experimental results show that further power efficiency can be achieved by considering also communication aspects during design space exploratio

    Randomized Initialization of a Wireless Multihop Network

    Full text link
    Address autoconfiguration is an important mechanism required to set the IP address of a node automatically in a wireless network. The address autoconfiguration, also known as initialization or naming, consists to give a unique identifier ranging from 1 to nn for a set of nn indistinguishable nodes. We consider a wireless network where nn nodes (processors) are randomly thrown in a square XX, uniformly and independently. We assume that the network is synchronous and two nodes are able to communicate if they are within distance at most of rr of each other (rr is the transmitting/receiving range). The model of this paper concerns nodes without the collision detection ability: if two or more neighbors of a processor uu transmit concurrently at the same time, then uu would not receive either messages. We suppose also that nodes know neither the topology of the network nor the number of nodes in the network. Moreover, they start indistinguishable, anonymous and unnamed. Under this extremal scenario, we design and analyze a fully distributed protocol to achieve the initialization task for a wireless multihop network of nn nodes uniformly scattered in a square XX. We show how the transmitting range of the deployed stations can affect the typical characteristics such as the degrees and the diameter of the network. By allowing the nodes to transmit at a range r= \sqrt{\frac{(1+\ell) \ln{n} \SIZE}{\pi n}} (slightly greater than the one required to have a connected network), we show how to design a randomized protocol running in expected time O(n3/2log2n)O(n^{3/2} \log^2{n}) in order to assign a unique number ranging from 1 to nn to each of the nn participating nodes

    Is There Light at the Ends of the Tunnel? Wireless Sensor Networks for Adaptive Lighting in Road Tunnels

    Get PDF
    Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a key component of a closed-loop control system for adaptive lighting in operational road tunnels. WSN nodes along the tunnel walls report light readings to a control station, which closes the loop by setting the intensity of lamps to match a legislated curve. The ability to match dynamically the lighting levels to the actual environmental conditions improves the tunnel safety and reduces its power consumption. The use of WSNs in a closed-loop system, combined with the real-world, harsh setting of operational road tunnels, induces tighter requirements on the quality and timeliness of sensed data, as well as on the reliability and lifetime of the network. In this work, we test to what extent mainstream WSN technology meets these challenges, using a dedicated design that however relies on wellestablished techniques. The paper describes the hw/sw architecture we devised by focusing on the WSN component, and analyzes its performance through experiments in a real, operational tunnel

    Detailed Diagnosis of Performance Anomalies in Sensornets

    Get PDF
    We address the problem of analysing performance anomalies in sensor networks. In this paper, we propose an approach that uses the local flash storage of the motes for logging system data, in combination with online statistical analysis. Our results show not only that this is a feasible method but that the overhead is significantly lower than that of communication-centric methods, and that interesting patterns can be revealed when calculating the correlation of large data sets of separate event types.GINSENGCONE

    Detection Performance in Balanced Binary Relay Trees with Node and Link Failures

    Full text link
    We study the distributed detection problem in the context of a balanced binary relay tree, where the leaves of the tree correspond to NN identical and independent sensors generating binary messages. The root of the tree is a fusion center making an overall decision. Every other node is a relay node that aggregates the messages received from its child nodes into a new message and sends it up toward the fusion center. We derive upper and lower bounds for the total error probability PNP_N as explicit functions of NN in the case where nodes and links fail with certain probabilities. These characterize the asymptotic decay rate of the total error probability as NN goes to infinity. Naturally, this decay rate is not larger than that in the non-failure case, which is N\sqrt N. However, we derive an explicit necessary and sufficient condition on the decay rate of the local failure probabilities pkp_k (combination of node and link failure probabilities at each level) such that the decay rate of the total error probability in the failure case is the same as that of the non-failure case. More precisely, we show that logPN1=Θ(N)\log P_N^{-1}=\Theta(\sqrt N) if and only if logpk1=Ω(2k/2)\log p_k^{-1}=\Omega(2^{k/2})
    corecore