98 research outputs found

    Traffic Adaptive Schedule-Based Mac Protocol For Wirelesssensor Networks

    Get PDF
    Wireless sensor networking is an emerging technology that has a wide range of potential applications inc1uding monitoring, medical systems, real-time, robotic exploration and etc. Energy is a critical resource in battery-powered sensor networks. Medium access control has an important role in minimizing energy consumption while it is responsible for successful data transferring in the network. Periodic data collection is the most comprehensive way of data gathering mechanism in wireless sensor network in which nodes report their samples in specific time interval s . It is possible to h ave some nodes with different update interval s in the network and therefore, finding a solution to accommodate nodes with different sampling intervals while maintaining the energy efficiency is the primary concern of this thesis

    Slotted wiDom: schedulability analysis and its experimental validation

    Get PDF
    WiDom is a wireless prioritized medium access control protocol which offers a very large number of priority levels. Hence, it brings the potential to employ non-preemptive static-priority scheduling and schedulability analysis for a wireless channel assuming that the overhead of WiDom is modeled properly. One schedulability analysis for WiDom has already been proposed but recent research has created a new version of WiDom (we call it: Slotted WiDom) with lower overhead and for this version of WiDom no schedulability analysis exists. In this paper we propose a new schedulability analysis for slotted WiDom and extend it to work also for message streams with release jitter. We have performed experiments with an implementation of slotted WiDom on a real-world platform (MicaZ). We find that for each message stream, the maximum observed response time never exceeds the calculated response time and hence this corroborates our belief that our new scheduling theory is applicable in practice

    New schedulability analysis for WiDom

    Get PDF
    WiDom is a wireless prioritized medium access control (MAC) protocol which offers a very large number of priority levels. Hence, it brings the potential for employing non-preemptive static-priority scheduling and schedulability analysis for a wireless channel assuming that the overhead of WiDom is modeled properly. One schedulability analysis for WiDom has already been proposed but recent research has created a new version of WiDom with lower overhead (we call it: WiDom with a master node) and for this version of WiDom no schedulability analysis exists. Also, common to the previously proposed schedulability analyses for WiDom is that they cannot analyze message streams with release jitter. Therefore, in this paper we propose a new schedulability analysis for WiDom (with a master node). We also extend the WiDom analyses (with and without master node) to work also for message streams with release jitter

    Data gathering approach in dense sensor networks

    Get PDF
    Sensor/actuator networks promised to extend automated monitoring and control into industrial processes. Avionic system is one of the prominent technologies that can highly gain from dense sensor/actuator deployments. An aircraft with smart sensing skin would fulfill the vision of affordability and environmental friendliness properties by reducing the fuel consumption. Achieving these properties is possible by providing an approximate representation of the air flow across the body of the aircraft and suppressing the detected aerodynamic drags. To the best of our knowledge, getting an accurate representation of the physical entity is one of the most significant challenges that still exists with dense sensor/actuator network. This paper offers an efficient way to acquire sensor readings from very large sensor/actuator network that are located in a small area (dense network). It presents LIA algorithm, a Linear Interpolation Algorithm that provides two important contributions. First, it demonstrates the effectiveness of employing a transformation matrix to mimic the environmental behavior. Second, it renders a smart solution for updating the previously defined matrix through a procedure called learning phase. Simulation results reveal that the average relative error in LIA algorithm can be reduced by as much as 60% by exploiting transformation matrix

    Comparison of Cytotoxic and Antibacterial Effects of Elettaria cardamomum Extract and Essential Oil

    Get PDF
    Objectives This study aimed to investigate the cytotoxic and antibacterial properties of essential oils and hydroalcoholic extracts from Elettaria cardamomum fruit (E. cardamomum). Methods Aggregatibacter actinomycetemcomitans (A. actinomycetemcomitans) was used as the test subject for the agar diffusion test in this in-vitro investigation to determine the antibacterial effect of the extract and essential oil. The broth microdilution method was used to calculate their minimum bactericidal concentration (MBC) and minimum inhibitory concentration (MIC). The methyl thiazolyl tetrazolium (MTT) assay was used to assess their cytotoxicity against human gingival fibroblasts. Tukey's test (alpha=0.05) and ANOVA were used to evaluate the data. Results The E. cardamomum hydroalcoholic extracts and essential oil demonstrated strong antibacterial activity on A. actinomycetemcomitans. E. cardamomum essential oil (91.5±1.1 mm) and E. cardamomum extract (9.5±0.4 mm) had the highest and lowest growth inhibition zones, respectively. For E. cardamomum essential oil, the MIC and MBC were 1.45%, and for E. cardamomum extract, they were 11.5% (v/v). The essential oil exhibited appreciable cytotoxicity at low doses, while the extract did not. Conclusion Because of its antibacterial properties and low cytotoxicity at low concentrations, the hydroalcoholic extract of E. cardamomum, one of the compounds examined, may have applications as an organic mouthwash

    The study of Gotic-literary contents within two novels: "Sane-al-Zalam" and "Negahban

    Get PDF
    Introduction The genre of horror stories under the title of Gothic fiction, by combining scary themes and images, creates a style of story whose basic features are horror and fear. The content of this story style is made up of many scary themes that have their roots in the Middle Ages, the setting of the Gothic novel is often the half-dark castles and palaces of the Middle Ages. Most of the sources in the field of analysis and the study of the meanings and concepts of the words, in explaining the meaning of the word Gothic, mention it as an attribute attributed to the peoples from Northern Europe (Germanic peoples) known as Goths, their prominent feature that is mentioned in most of these sources. It is the attribute of being wild and uncivilized. Gothic is actually an artistic and literary style with unique that includes concepts such as fear, anxiety, darkness, pain and suffering, appeared in the centuries before the formation of classical and features romantic art and literature, and some even with titles such as Romanticism has mentioned it. Gothic style, after the Middle Ages and Renaissance, still has its followers in the modern era and has found a colorful emergence in other fields of modern art such as film, cinema, photography and fiction.In the modern era, the main characteristic of Gothic style is horror, darkness and anxiety. Dark colors, scary and mysterious scenes and images, all of which somehow try to show the ugly aspects of life, are prominent features of the Gothic style in these works (especially in literature).Since literature and literary works are always a suitable tool for expressing the opinions and views of writers, therefore, the use of the Gothic literary genre can, in addition to creating scary, attractive and modern adventures, tell the psychological and inner state of human beings and the facts behind the scenes. Many of the cries of human societies. In 1764, the first Gothic novel named "The Castle of Otranto" was written by the English writer Horace Walpole, and literary critics have considered this novel to be the first Gothic work in literature. 2- DiscussionIn contemporary Arabic and Persian literature, "Tamer Ebrahim" and "Peiman Ismaili", two young contemporary Egyptian and Iranian novelists, authored two novels, "Sanee Al-zalam" (The Maker of Darkness) and "Negahban" (The watchman) with the aim of creating modern works in the field of Gothic fiction. They have created characters and adventures that despite their fiction and unreality, express the real facts and adventures in the mind, soul, psyche and history of human societies."Saane Al-Zalam" is the storyteller of the dark life and sheer bad luck of an Egyptian journalist; A story full of mystery and fear. This story deals with some historical tragedies and heinous murders and crimes, while the main cause of these tragedies is an evil and vile creature called "Al-Shi'". Youssef Khalil, the hero of the novel "Sanee Al-Zalam", is a young journalist with unpleasant physical and mental characteristics who lost his parents in his childhood and his temperamental characteristics made him neither a friend nor a lover. After preparing a report on the murder of a ten-year-old boy by his godfathers, this character gets involved with very horrible and unusual events. During this novel, two real historical tragedies in the 15th and 16th centuries in Hungary have been processed and horrifying images of these facts have been presented. Therefore, "Sanee al-Zalam" means "creator of darkness", a title that refers to the perpetrators of the dark periods of history and human tragedy. Of course, behind the mask of these people, there is a demonic force called "Al-Shi" that appears in new faces in every era and time and covers up evil actions."Peyman Esmaili", in the novel "Negahban", by creating a gothic atmosphere, tells an interesting story of a young engineer (Siamak) who, like "Youssef Khalil", lost his parents in his childhood and is a lonely person. And this loneliness becomes his constant friend, because the accident has taken away from him, apart from his parents, the desire to have a child (as a result of the accident, his offspring has been cut off). This novel takes place in frightening atmospheres and the audience is always faced with violent nature and scary atmospheres. At the beginning of the novel, "Siamak" sees the face of the truck driver who collided with the arrow of "Kyumarth" in the form of an animal like a wolf. In fact, the wolf in this story plays an important role in connecting the story with scary themes. At the end of Siamak's life, this animal is released in the cold mountain, which is basically the Gothic hell of the story. 3- MethodologyThe present research, relying on the descriptive-analytical research method and based on the American school of comparative literature, to find out the hidden layers of the text and the comparative analysis of the literary Gothic components in the two novels "Saane Al-Zalam" and "Negahban", to investigate the elements of character, place and time is discussed in the two mentioned novels. The importance of the present research is in the comparative investigation of Gothic themes in these two novels and it can lead to the explanation and evaluation of the common effects of Gothic literature in two contemporary Persian and Arabic works, which is of considerable importance. 4- ConclusionThe results of the research indicate that the characters who have a main role and an effective presence in the two gothic novels "Sanee Al-Zalam" and "Negahban", like other gothic stories, are characters with unusual and negative characteristics. These characters have negative and sometimes conflicting psychological and physical characteristics that have formed the leaven of their horror and Gothicism. The character of "Idris" in the novel "Negahban" and the character of "Al-Shi" in "Sanee Al-Zalam" are the most gothic characters in these two novels. In the two novels "Sanee Al-Zalam" and "Negahban" there is an overlap between fictional literature and realism; because when we see the murders carried out by these people, we are observing the facts, and when we look at the nature of "Al-Shi" and "Idris" as two demonic beings in the novels, we are facing imaginary and fantasy creatures.The use of symbolic tools to express the events in the story "Sanee Al-Zalam" is a way to express the facts through symbolism. but the story of the guard expresses the desired goals and objectives with a realistic and simple point of view. Themes such as the consequences of the war, the unemployment of the border dwellers in the west of the country and their turning to smuggling, and the human fall and poverty of the people of southern cape are presented in this work in a realistic manner.In the story "Sanee Al-Zalam" we witness the staging of the story in frightening and terrifying places and spaces in the palaces of the kings. By writing a story based on European Gothic works, the author of this work seeks to express the truths of the terrifying history of human societies, which she has achieved by re-reading historical events in places such as the palace of European rulers. And "Elizabeth Bathory" happened in their palaces, they are a symbol of other terrible tragedies that happened throughout history.In the story "Negahban" as well as other authors of literary works, "Peiman Esmaili" seeks to express his mental origins and express his subconscious mind. The places that are the scene of the story of "Negahban" are the cold and snowy mountain, the strange and scary stone house in the middle of the mountain and the shanty that is the residence of "Siamak" in the scorching heat of the south. All these places somehow express the author's feeling of fear and loneliness, a feeling that he felt with all his heart during the imposed war in his childhood.The element of time is the third component examined in this research; in "Sanee Al-Zalam" and "Negahban" the fluid flow of time and the dynamics of this flow are considered important elements of creating stress and fear in the audience. In both stories, most of the scary events happen at night. because among the times of the day and night, the night has the greatest potential to create fear and anxiety, and showing the adventures and the presence of evil at this time has more attraction and traction to increase the fear in the story

    Response time analysis of slotted WiDOM in noisy wireless channels

    Get PDF
    International Conference on Emerging Technologies and Factory Automation (ETFA 2015), Industrial Communication Technologies and Systems, Luxembourg, Luxembourg.Timely delivery of critical traffic is a major challenge in industrial applications. The Wireless Dominance (WiDOM) medium access control protocol offers a very large number of priority levels to suit time sensitive application requirements. In particular, assuming that its overhead is properly modeled, WiDOM enables an accurate evaluation of the network response time in the wireless domain, through the power of the schedulability analysis, based on non-preemptive and staticpriority scheduling. Recent research proposed a new version of WiDOM (dubbed Slotted WiDOM), which offers a lower overhead as compared to the original version. In this paper, we propose a new schedulability analysis for Slotted WiDOM and extend it to handle message streams with release jitter. In order to provide a more accurate timing analysis, the effect of transmission faults must be taken into account. Therefore, in our novel analysis we consider the case where messages are transmitted in a realistic wireless channel, affected by noise and interference. Evaluation is performed on a real test-bed and the results from experiments provide a firm validation of our findings

    Energy efficiency in MAC 802.15.4 for wireless sensor networks

    Get PDF
    Recent technological advances in sensors, low power integrated circuits, and wireless communications have enabled the design of low-cost, lightweight, and intelligent physiological sensor nodes. The IEEE 802.15.4 is a new wireless personal area network designed for wireless monitoring and control applications. The fast progress of research on energy efficiency in wireless sensor networks, and the need to compare with the solutions adopted in the standards motivates the need for this work. In the analysis presented, the star network configuration of 802.15.4 standard at 868 MHz is considered for a Zigbee network. In this paper, we analyze the active duration of the superframe and entered the sleep mode status inside this period. It happens when sensors do not have any data to send. The nonpersistent CSMA uses the adaptive backoff exponent. This method helps the network to be reliable under traffic changes due to save the energy consumption. The introduction of sleep state has shown incredible reduction of the power consumption in all network load changes

    Adaptive data collection algorithm for wireless sensor networks

    Get PDF
    Periodical Data collection from unreachable remote terrain and then transmit information to a base station is one of the targeted application of sensor networks. The energy restriction of battery powered sensor nodes is a big challenge for this network as it is difficult or in some cases not feasible to change the power supply of motes. Therefore, in order to keep the networks operating for long time, efficient utilization of energy is considered with highest priority. In this paper we propose TA-PDC-MAC protocol - a traffic adaptive periodic data collection MAC which is designed in a TDMA fashion. This design is efficient in the ways that it assigns the time slots for nodes’ activity due to their sampling rates in a collision avoidance manner. This ensures minimal consumption of network energy and makes a longer network lifetime, as well as it provides small end-to-end delay and packet loss ratio. Simulation results show that our protocol demonstrates up to 35% better performance than that of most recent protocol that proposed for this kind of application, in respect of energy consumption. Comparative analysis and simulation show that TA-PDC-MAC considerably gives a good compromise between energy efficiency and latency and packet loss rate
    corecore