• Title/Summary/Keyword: Wireless surrounding

Search Result 102, Processing Time 0.024 seconds

Congestion Control based on Genetic Algorithm in Wireless Sensor Network (무선 센서 네트워크에서 유전자 알고리즘 기반의 혼잡 제어)

  • Park, Chong-Myung;Lee, Joa-Hyoung;Jung, In-Bum
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.413-424
    • /
    • 2009
  • Wireless sensor network is based on an event driven system. Sensor nodes collect the events in surrounding environment and the sensing data are relayed into a sink node. In particular, when events are detected, the data sensing periods are likely to be shorter to get the more correct information. However, this operation causes the traffic congestion on the sensor nodes located in a routing path. Since the traffic congestion generates the data queue overflows in sensor nodes, the important information about events could be missed. In addition, since the battery energy of sensor nodes exhausts quickly for treating the traffic congestion, the entire lifetime of wireless sensor networks would be abbreviated. In this paper, a new congestion control method is proposed on the basis of genetic algorithm. To apply genetic algorithm, the data traffic rate of each sensor node is utilized as a chromosome structure. The fitness function of genetic algorithm is designed from both the average and the standard deviation of the traffic rates of sensor nodes. Based on dominant gene sets, the proposed method selects the optimal data forwarding sensor nodes for relieving the traffic congestion. In experiments, when compared with other methods to handle the traffic congestion, the proposed method shows the efficient data transmissions due to much less queue overflows and supports the fair data transmission between all sensor nodes as possible. This result not only enhances the reliability of data transmission but also distributes the energy consumptions across the network. It contributes directly to the extension of total lifetime of wireless sensor networks.

Routing Algorithm to Select a Stable Path Using the Standard Deviation (표준편차를 이용하여 안정적인 경로를 선택하는 라우팅 알고리즘)

  • Shin, Hyun-Jun;Jeon, Min-Ho;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.758-760
    • /
    • 2012
  • The wireless sensor network is used to get information that location tracing or data of surrounding areas. Unnecessary retransmission request or many energy consumption because the transmission over the wireless links. In order to select the link of reliable and energy efficient to estimate the quality of radio link technique is required using RSSI, LQI, and so on. In this paper, each path between the sensor nodes, a small in the path within standard deviation of shall be determined the priority. Each path a high priority of the node values, respectively LQI is accumulated. Node can be selected the high LQI value path. Among them the less hop count to select the path is proposed. The proposed algorithm is removed the paths of shorten life using high the LQI value of the entire and high hop count even less variation. So its advantage that the sensor nodes can be selected more reliable path.

  • PDF

Improvement of Domestic Design Criteria of Tunnel Maintenance Monitoring and Latest Technology Trend (터널 유지관리 계측의 국내설계기준 개선 및 최신 기술동향)

  • Baek, Kyung Jong;Kwon, Young Eok
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.2
    • /
    • pp.9-16
    • /
    • 2014
  • Though the maintenance monitoring of structurally weak parts of the tunnel structure in public service must be judged in connection with the monitoring during the construction period for analysis of the behavior of the ground and surrounding structures following the tunnel excavation for the effective management, the monitoring during the construction period and the maintenance monitoring are implemented separately on the basis of the periods of construction and maintenance, so the connectivity and systematic management of the related data are mostly inadequate. The improvement direction is suggested in this thesis, by analyzing the problems of tunnel monitoring in the domestic design criteria. And, it is anticipated that from now on the use of hi-tech sensors and wireless communications technology will proceed vigorously in the maintenance, so considering these situations, the development and application of the maintenance monitoring system and the revision of the domestic design criteria and specification are needed in the future.

Cluster-based Continuous Object Prediction Algorithm for Energy Efficiency in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율성을 위한 클러스터 기반의 연속 객체 예측 기법)

  • Lee, Wan-Seop;Hong, Hyung-Seop;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8C
    • /
    • pp.489-496
    • /
    • 2011
  • Energy efficiency in wireless sensor networks is a principal issue to prolong applications to track the movement of the large-scale phenomena. It is a selective wakeup approach that is an effective way to save energy in the networks. However, most previous studies with the selective wakeup scheme are concentrated on individual objects such as intruders and tanks, and thus cannot be applied for tracking continuous objects such as wild fire and poison gas. This is because the continuous object is pretty flexible and volatile due to its sensitiveness to surrounding circumferences so that movable area cannot be estimated by the just spatiotemporal mechanism. Therefore, we propose a cluster-based algorithm for applying the efficient and more accurate technique to the continuous object tracking in enough dense sensor networks. Proposed algorithm wakes up the sensors in unit cluster where target objects may be diffused or shrunken. Moreover, our scheme is asynchronous because it does not need to calculate the next area at the same time.

A Study on Automatic Sensing Device for Water Leakage of Cooling Pipe at Blast Furnace by Use The Electronic System (전자제어 장치를 이용한 용광로 냉각관 누수 지동 감지장치 개발에 관한 연구)

  • Kang, Chang-Soo;Kang, Ki-Seong
    • 전자공학회논문지 IE
    • /
    • v.46 no.4
    • /
    • pp.25-30
    • /
    • 2009
  • The cooling water circulation pipes had been used to drop the temperature of refractory outside shell of blast furnace by cooling plate or stave type. They were attacked by surrounding CO gas and it was the cause that they were corroded and the water inflow in the refractory due to leakage of water. So, the life of refractory material was shorten and changed for the worse the conditions of blast furnace. The automatic sensing device for water leakage of cooling pipe was developed to check the position of trouble by use the micro-process system when cooling water leak and then CO gas will be inflowed into the cooling pipe at the leakage position. The inflowed CO gas will be detected in the micro-process system and delivered the detected position of cooling plate or stave to main control room through the wireless-radio relay station. This system can be possible to detect the position of cooling plate or stave the water leakage part immediately and then deliver the signal to main control room by use the micro-process system and wireless-radio relay station. This system will develop the working condition from manual system to unmanned auto alarm system.

MADF: Mobile-Assisted Data Forwarding for Wireless Data Networks

  • Xiaoxin;Gary, Shueng-Han;Biswanath;Bharat
    • Journal of Communications and Networks
    • /
    • v.6 no.3
    • /
    • pp.216-225
    • /
    • 2004
  • In a cellular network, if there are too many data users in a cell, data may suffer long delay, and system's quality-of-service (QoS) will degrade. Some traditional schemes such as dynamic channel-allocation scheme (DCA) will assign more channels to hot (or overloaded) cells through a central control system (CC) and the throughput increase will be upper bounded by the number of new channels assigned to the cell. In mobile-assisted data forwarding (MADF), we add an ad-hoc overlay to the fixed cellular infrastructure and special channels-called forwarding channels- are used to connect mobile units in a hot cell and its surrounding cold cells without going through the hot cell's base station. Thus, mobile units in a hot cell can forward data to other cold cells to achieve load balancing. Most of the forwarding-channel management work in MADF is done by mobile units themselves in order to relieve the load from the CC. The traffic increase in a certain cell will not be upper bounded by the number of forwarding channels. It can be more if the users in hot cell are significantly far away from one another and these users can use the same forwarding channels to forward data to different cold neighboring cells without interference. We find that, in a system using MADF, under a certain delay requirement, the throughput in a certain cell or for the whole net-work can be greatly improved.

Design and Analysis of High Gain Beamforming Patch ESPAR Antenna for Railroad Wireless Communication (철도 무선통신을 위한 단일 RF 체인을 사용하는 고이득 빔포밍 패치 ESPAR 안테나 설계 및 분석)

  • Choi, Jinkyu;Jang, Kukhan;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.8
    • /
    • pp.710-717
    • /
    • 2015
  • In this paper, we design an array antenna structure based on a patch ESPAR(Electronically Steerable Parasitic Array Radiator) antenna with three elements for reliable communication in high-speed railway wireless communication. The ESPAR antenna consists of the active element with a single RF-chain and the parasitic elements surrounding an active element. The ESPAR antenna is capable of beamforming by adjusting the reactance of the parasitic element. We propose a vertical array antenna structure based on the patch ESPAR antenna and simulate it according to the change of the number of antennas and the distance between antenna rows. The simulation results show that we can get the maximum beam gain and highest directivity when the distance between antenna rows is ${\lambda}$.

A Contents-Based Anomaly Detection Scheme in WSNs (콘텐츠 기반 무선 센서 네트워크 이상 탐지 기법)

  • Lee, Chang-Seuk;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.99-106
    • /
    • 2011
  • In many applications, wireless sensor networks could be thought as data-centric networks, and the sensor nodes are densely distributed over a large sensor field. The sensor nodes are normally vulnerable in terms of security since they are very often deployed in a hostile environment and open space. In this paper, we propose a scheme for contents-based anomaly detection in wireless sensor networks. In this scheme we use the characteristics of sensor networks where several nodes surrounding an event point can simultaneously detect the phenomenon occurring and the contents detected from these sensors are limited to inside a certain range. The proposed scheme consists of several phases; training, testing and refining phases. Anomaly candidates detected by the distance-based anomaly detection scheme in the testing phase are sent to the refining phase. They are then compared in the sink node with previously collected data set to improve detection performance in the refining phase. Our simulation results suggest the effectiveness of the proposed scheme in this paper evidenced by the improvements of the detection rate and the false positive rate.

Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks (무선 센서 네트워크에서 다중 공격 방어를 위한 보안 라우팅 기법)

  • Moon, Soo-Young;Cho, Tae-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.45-56
    • /
    • 2010
  • Sensor Networks are composed of many sensor nodes, which are capable of sensing, computing, and communicating with each other, and one or more sink node(s). Sensor networks collect information of various objects' identification and surrounding environment. Due to the limited resources of sensor nodes, use of wireless channel, and the lack of infrastructure, sensor networks are vulnerable to security threats. Most research of sensor networks have focused on how to detect and counter one type of attack. However, in real sensor networks, it is impractical to predict the attack to occur. Additionally, it is possible for multiple attacks to occur in sensor networks. In this paper, we propose the Secure Routing Mechanism to Defend Multiple Attacks in Sensor Networks. The proposed mechanism improves and combines existing security mechanisms, and achieves higher detection rates for single and multiple attacks.

An Efficient Multiple Tree-Based Routing Scheme in Faulty Wireless Sensor Networks (결함이 발생하는 센서 네트워크 환경에서 다중 트리 기반 라우팅 프로토콜)

  • Park, Jun-Ho;Seong, Dong-Ook;Yeo, Myung-Ho;Kim, Hak-Sin;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.75-79
    • /
    • 2010
  • Wireless sensor networks (WSN) are widely used in many applications. WSN acquires the data of surrounding environments with sensors attached to each node. It is important to design sensor networks that can communicate energy-efficiently as well as to get sensor readings with high accuracy. In this paper, we propose a novel routing scheme that assures high accuracy and significantly reduces data transmission costs in WSN with faults. First, we organize a number of network topologies randomly for routing sensor readings to the base station. Because every sensor node is connected each other with a single path, redundant transmissions are not incurred. It can reduce unnecessary transmissions and guarantee final sensor readings with high accuracy. To show the superiority of our scheme, we compare it with an existing multi-path routing scheme. In the result, our scheme has similar accuracy as the existing scheme and reduces unnecessary data transmissions by about 70% over the existing technique.