6 research outputs found
A critical analysis of research potential, challenges and future directives in industrial wireless sensor networks
In recent years, Industrial Wireless Sensor Networks (IWSNs) have emerged as an important research theme with applications spanning a wide range of industries including automation, monitoring, process control, feedback systems and automotive. Wide scope of IWSNs applications ranging from small production units, large oil and gas industries to nuclear fission control, enables a fast-paced research in this field. Though IWSNs offer advantages of low cost, flexibility, scalability, self-healing, easy deployment and reformation, yet they pose certain limitations on available potential and introduce challenges on multiple fronts due to their susceptibility to highly complex and uncertain industrial environments. In this paper a detailed discussion on design objectives, challenges and solutions, for IWSNs, are presented. A careful evaluation of industrial systems, deadlines and possible hazards in industrial atmosphere are discussed. The paper also presents a thorough review of the existing standards and industrial protocols and gives a critical evaluation of potential of these standards and protocols along with a detailed discussion on available hardware platforms, specific industrial energy harvesting techniques and their capabilities. The paper lists main service providers for IWSNs solutions and gives insight of future trends and research gaps in the field of IWSNs
Recommended from our members
Precise positioning in real-time using GPS-RTK signal for visually impaired people navigation system
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 24/9/2010.This thesis presents the research carried out to investigate and achieve highly reliable and accurate navigation system of guidance for visually impaired pedestrians. The main aim with this PhD project has been to identify the limits and insufficiencies in utilising Network Real-Time Kinematic Global Navigation Satellite Systems (NRTK GNSS) and its augmentation techniques within the frame of pedestrian applications in a variety of environments and circumstances. Moreover, the system can be used in many other applications, including unmanned vehicles, military applications, police, etc. NRTK GNSS positioning is considered to be a superior solution in comparison to the conventional standalone Global Positioning System (GPS) technique whose accuracy is highly affected by the distance dependent errors such as satellite orbital and atmospheric biases.
Nevertheless, NRTK GNSS positioning is particularly constrained by wireless data link coverage, delays of correction and transmission and completeness, GPS and GLONASS signal availability, etc., which could downgrade the positioning quality of the NRTK results.
This research is based on the dual frequency NRTK GNSS (GPS and GLONASS). Additionally, it is incorporated into several positioning and communication methods responsible for data correction while providing the position solutions, in which all identified contextual factors and application requirements are accounted.
The positioning model operates through client-server based architecture consisted of a Navigation Service Centre (NSC) and a Mobile Navigation Unit (MNU). Hybrid functional approaches were consisting of several processing procedures allowing the positioning model to operate in position determination modes. NRTK GNSS and augmentation service is used if enough navigation information was available at the MNU using its local positioning device (GPS/GLONASS receiver).The positioning model at MNU was experimentally evaluated and centimetric accuracy was generally attained during both static and kinematic tests in various environments (urban, suburban and rural). This high accuracy was merely affected by some level of unavailability mainly caused by GPS and GLONASS signal blockage. Additionally, the influence of the number of satellites in view, dilution of precision (DOP) and age corrections (AoC) over the accuracy and stability of the NRTK GNSS solution was also investigated during this research and presented in the thesis.
This positioning performance has outperformed the existing GPS service. In addition, utilising a simulation evaluation facility the positioning model at MNU performance was quantified with reference to a hybrid positioning service that will be offered by future Galileo Open Service (OS) along with GPS. However, a significant difference in terms of the service availability for the advantage of the hybrid system was experienced in all remaining scenarios and environments more especially the urban areas due to surrounding obstacles and conditions.
As an outcome of this research a new and precise positioning model was proposed. The adaptive framework is understood as approaching an integration of the available positioning technology into the context of surrounding wireless communication for a maintainable performance. The positioning model has the capability of delivering indeed accurate, precise and consistent position solutions, and thus is fulfilling the requirements of visually impaired people navigation application, as identified in the adaptive framework
Availability Constrained Routing And Wavelength Assignment And Survivability In Optical Wdm Networks
Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2009Thesis (PhD) -- İstanbul Technical University, Institute of Science and Technology, 2009Bu çalışmada, optik ağlarda kullanılabilirlik kısıtı altında yol ve dalgaboyu atama konusu farklı sürdürülebilirlik politikaları altında çalışılmış ve elde edilen sonuçlar benzetim aracılığıyla doğrulanarak sunulmuştur. Öncelikle paylaşılan yol koruması altında sınırsız kaynak bulunması durumunda kullanılabilirlik kısıtı altında yol ve dalgaboyu atamaya yönelik planlama amaçlı bağlantı kurma yöntemleri sezgisel ve optimizasyona dayalı olarak önerilmiştir. Sonrasında bu teknikler kısıtlı kaynak altında ve farklılaştırılmış kullanılabilirlik düzeyi gereksinimleri ile gelen bağlantı isteklerinin olması koşulu altında çalışabilecek şekilde adapte edilmiş ve başarımları sınanmıştır. Önerilen tekniklerin literatürde yaygın olarak bilinen bağlantı kurma tekniklerinin başarımını bağlantı düşürme olasılığı ve bağlantı kullanılabilirliği açısından yükselttiği, bunun yanında yedek kaynak tüketim fazlasını da gözeterek kabul edilir bir düzeyde tuttuğu gözlenmiştir. Özellikle optimizasyon tabanlı bağlantı kurma tekniğinin, farklılaştırılmış bağlantı isteklerinin bulunduğu ortamda kaynak tüketimini de düşürdüğü gösterilmiştir. Son olarak da, segmanlı koruma için önceden önerilmiş bir kullanılabilirlik analizine rastlanamadığı için, paylaşılan segmanlı koruma için kullanılabilirlik analizi yöntemi önerilerek benzetim aracılığıyla doğrulanmıştır. Bu analiz kullanılarak da segmanlı koruma altında kullanılabilirliği gözeten yol ve dalgaboyu atama yöntemleri oluşturularak başarımları kaynak kısıtlı ve kaynakça zengin ortamlarda denenerek uygulanabilirlikleri belirlenmiştir.In this study, we have proposed availability aware routing and wavelength assignment schemes for optical networks under different survivability policies. The proposed techniques are evaluated by simulation. First, we have proposed heuristic and optimization driven connection provisioning schemes under shared backup path protection in resource plentiful environment. Then, the proposed schemes are modified to work in resource limited environment where connections arrive with differentiated availability requirements. The proposed techniques are compared to a conventional reliable connection provisioning algorithm. The simulation results show that the proposed techniques lead to lower connection blocking probability and better connection availability. Besides this, it is also shown that the proposed techniques also keep the resource overbuild due to protection in a feasible range. Moreover, the experimental results also show that the optimization driven technique leads to a decreased resource overbuild under resource limited environment for connection arrivals with differentiated availability requirements. The last part of this work deals with shared segment protection. Since there is no specific availability analysis method for shared segment protection, an availability analysis method for this protection scheme is proposed and validated by simulation. Based on this analysis, availability aware connection provisioning schemes are constructed, their performance is evaluated in resource plentiful and resource scarce environments, and the applicability of the schemes are determined in terms of environmental constraints.DoktoraPh
Intensional Cyberforensics
This work focuses on the application of intensional logic to cyberforensic
analysis and its benefits and difficulties are compared with the
finite-state-automata approach. This work extends the use of the intensional
programming paradigm to the modeling and implementation of a cyberforensics
investigation process with backtracing of event reconstruction, in which
evidence is modeled by multidimensional hierarchical contexts, and proofs or
disproofs of claims are undertaken in an eductive manner of evaluation. This
approach is a practical, context-aware improvement over the finite state
automata (FSA) approach we have seen in previous work. As a base implementation
language model, we use in this approach a new dialect of the Lucid programming
language, called Forensic Lucid, and we focus on defining hierarchical contexts
based on intensional logic for the distributed evaluation of cyberforensic
expressions. We also augment the work with credibility factors surrounding
digital evidence and witness accounts, which have not been previously modeled.
The Forensic Lucid programming language, used for this intensional
cyberforensic analysis, formally presented through its syntax and operational
semantics. In large part, the language is based on its predecessor and
codecessor Lucid dialects, such as GIPL, Indexical Lucid, Lucx, Objective
Lucid, and JOOIP bound by the underlying intensional programming paradigm.Comment: 412 pages, 94 figures, 18 tables, 19 algorithms and listings; PhD
thesis; v2 corrects some typos and refs; also available on Spectrum at
http://spectrum.library.concordia.ca/977460
Intensional Cyberforensics
This work focuses on the application of intensional logic to cyberforensic analysis and its benefits and difficulties are compared with the finite-state-automata approach. This work extends the use of the intensional programming paradigm to the modeling and implementation of a cyberforensics investigation process with backtracing of event reconstruction, in which evidence is modeled by multidimensional hierarchical contexts, and proofs or disproofs of claims are undertaken in an eductive manner of evaluation. This approach is a practical, context-aware improvement over the finite state automata (FSA) approach we have seen in previous work. As a base implementation language model, we use in this approach a new dialect of the Lucid programming language, called Forensic Lucid, and we focus on defining hierarchical contexts based on intensional logic for the distributed evaluation of cyberforensic expressions. We also augment the work with credibility factors surrounding digital evidence and witness accounts, which have not been previously modeled.
The Forensic Lucid programming language, used for this intensional cyberforensic analysis, formally presented through its syntax and operational semantics. In large part, the language is based on its predecessor and codecessor Lucid dialects, such as GIPL, Indexical Lucid, Lucx, Objective Lucid, MARFL, and JOOIP bound by the underlying intensional programming paradigm