• Title/Summary/Keyword: wsn

Search Result 891, Processing Time 0.031 seconds

Delay-Constrained Energy-Efficient Cluster-based Multi-Hop Routing in Wireless Sensor Networks

  • Huynh, Trong-Thua;Dinh-Duc, Anh-Vu;Tran, Cong-Hung
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.580-588
    • /
    • 2016
  • Energy efficiency is the main objective in the design of a wireless sensor network (WSN). In many applications, sensing data must be transmitted from sources to a sink in a timely manner. This paper describes an investigation of the trade-off between two objectives in WSN design: minimizing energy consumption and minimizing end-to-end delay. We first propose a new distributed clustering approach to determining the best clusterhead for each cluster by considering both energy consumption and end-to-end delay requirements. Next, we propose a new energy-cost function and a new end-to-end delay function for use in an inter-cluster routing algorithm. We present a multi-hop routing algorithm for use in disseminating sensing data from clusterheads to a sink at the minimum energy cost subject to an end-to-end delay constraint. The results of a simulation are consistent with our theoretical analysis results and show that our proposed performs much better than similar protocols in terms of energy consumption and end-to-end delay.

Enhanced Hybrid Routing Protocol for Load Balancing in WSN Using Mobile Sink Node

  • Kaur, Rajwinder;Shergi, Gurleen Kaur
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.3
    • /
    • pp.268-277
    • /
    • 2016
  • Load balancing is a significant technique to prolong a network's lifetime in sensor network. This paper introduces a hybrid approach named as Load Distributing Hybrid Routing Protocol (LDHRP) composed with a border node routing protocol (BDRP) and greedy forwarding (GF) strategy which will make the routing effective, especially in mobility scenarios. In an existing solution, because of the high network complexity, the data delivery latency increases. To overcome this limitation, a new approach is proposed in which the source node transmits the data to its respective destination via border nodes or greedily until the complete data is transmitted. In this way, the whole load of a network is evenly distributed among the participating nodes. However, border node is mainly responsible in aggregating data from the source and further forwards it to mobile sink; so there will be fewer chances of energy expenditure in the network. In addition to this, number of hop counts while transmitting the data will be reduced as compared to the existing solutions HRLBP and ZRP. From the simulation results, we conclude that proposed approach outperforms well than existing solutions in terms including end-to-end delay, packet loss rate and so on and thus guarantees enhancement in lifetime.

WSN platform for health and environmental monitoring system for workers (해상 근로자 건강 및 환경 모니터링을 위한 WSN 플랫폼)

  • Gu, Ye-Jin;Lyu, Changjin;Lee, Su-Bin;Chung, Wan-Young
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.928-931
    • /
    • 2018
  • 고립된 해상 작업 환경에서의 작업자의 건강상태 관리와 혹시 모를 추락탐지는 작업자의 안전을 위해 매우 중요하다. 본 논문에서는 이러한 고립공간 작업자의 안전을 모니터링하기 위한 헬멧에 부착할 수 있는 IoT 시스템을 위한 알고리즘을 제안한다. 이는 장치가 작업 중에 긴급 상황인지 신속하게 판단할 수 있다. 스마트폰은 누구나 들고 다니기 때문에 사용자 환경은 스마트폰을 이용하여 적용되었다. 작업자들이 착용할 용도이기 때문에 PPG 센서는 불편하지 않도록 귀에 부착한다. PPG 센서를 단독으로 사용하여 스트레스 정도를 파악한다. 3축 가속도 센서는 헬멧에 부착되고 추락을 감지하는데 사용된다. 우리는 여러 센서와 블루투스 통신을 이용하여 발전된 센서 시스템을 만든다. 또한, 우리는 3축 가속도 샘플을 분석하고 정규화하는 알고리즘을 JAVA에서 구현하였다. 스마트 폰을 사용하는 이점은 신호 처리를 위해 별도의 마이크로프로세서(mcu)가 필요하지 않으며 내부 통신 시스템을 통해 제어 센터에 정보를 전송할 수 있다는 것이다.

Stability of Retroviral Vectors Against Ultracentrifugation Is Determined by the Viral Internal Core and Envelope Proteins Used for Pseudotyping

  • Kim, Soo-hyun;Lim, Kwang-il
    • Molecules and Cells
    • /
    • v.40 no.5
    • /
    • pp.339-345
    • /
    • 2017
  • Retroviral and lentiviral vectors are mostly pseudotyped and often purified and concentrated via ultracentrifugation. In this study, we quantified and compared the stabilities of retroviral [murine leukemia virus (MLV)-based] and lentiviral [human immunodeficiency virus (HIV)-1-based] vectors pseudotyped with relatively mechanically stable envelope proteins, vesicular stomatitis virus glycoproteins (VSVGs), and the influenza virus WSN strain envelope proteins against ultracentrifugation. Lentiviral genomic and functional particles were more stable than the corresponding retroviral particles against ultracentrifugation when pseudotyped with VSVGs. However, both retroviral and lentiviral particles were unstable when pseudotyped with the influenza virus WSN strain envelope proteins. Therefore, the stabilities of pseudotyped retroviral and lentiviral vectors against ultracentrifugation process are a function of not only the type of envelope proteins, but also the type of viral internal core (MLV or HIV-1 core). In addition, the fraction of functional viral particles among genomic viral particles greatly varied at times during packaging, depending on the type of envelope proteins used for pseudotyping and the viral internal core.

Filtered-Push Notification Framework for Messaging Support in Parking Information System (주차정보시스템에서 메시지 지원을 위한 선택통지 프레임 워크)

  • Mateo, Romeo Mark;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.33-43
    • /
    • 2012
  • Smart phones can be used in parking management to receive important notifications. An infrastructure based from such approach should consider message persistence which is currently supported through push notification systems. However, the broadcast method produces high overhead when sending notifications throughout the clients. This paper uses a filtering method to prevent unnecessary message overheads. The heuristic approach selects the mobile clients with corresponding preference values based on the notification tag values. The simulation result showed that the proposed filtering method was faster in re-establishing connections and had lower message overhead compared to conventional messaging frameworks.

Design of WSN-based Weather Field Server for Damage Prevention from Local Weather Condition Changes (국지성 기상변화로부터의 피해방지를 위한 WSN 기반의 기상용 필드서버 제작)

  • An, Seong-Mo;Kim, Jae-Gyeong;Yoo, Jae-Ho;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.151-152
    • /
    • 2010
  • In this paper, a weather field server is designed and developed for local area weather condition monitoring system. Weather field server consists of an integrated sensor board and wireless sensor node to enable quick response of changing weather conditions in the valley region. A server program is established to monitor and analyze real-time weather condition in order to detect and prevent weather damages occurring in the locality.

  • PDF

Asset Localization in Wireless Sensor Networks

  • Jo, Jung-Hee;Kim, Kwang-Soo;Kim, Sun-Joong
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.5
    • /
    • pp.465-471
    • /
    • 2007
  • Many hospitals have been considering new technology such as wireless sensor network(WSN). The technology can be used to track the location of medical devices needed for inspections or repairs, and it can also be used to detect of a theft of an asset. In an asset-tracking system using WSN, acquiring the location of moving sensor nodes inherently introduces uncertainty in location determination. In fact, the sensor nodes attached to an asset are prone to failure from lack of energy or from physical destruction. Therefore, even if the asset is located within the predetermined area, the asset-tracking application could "misunderstand" that an asset has escaped from the area. This paper classifies the causes of such unexpected situations into the following five cases: 1) an asset has actually escaped from a predetermined area; 2) a sensor node was broken; 3) the battery for the sensor node was totally discharged; 4) an asset went into a shadow area; 5) a sensor node was stolen. We implemented and installed our asset-tracking system in a hospital and continuously monitored the status of assets such as ventilators, syringe pumps, wheel chairs and IV poles. Based on this real experience, we suggest how to differentiate each case of location uncertainty and propose possible solutions to prevent them.

Pre-diagnosis Management in WSN based Portable Healthcare Monitoring System (무선센서네트워크 기반 휴대용 헬스케어 모니터링 시스템을 위한 휴대폰 자체 간이진단 관리)

  • Hii, Pei-Cheng;Lee, Seung-Chul;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.538-541
    • /
    • 2009
  • Increasing of number of people who suffered from long term chronic diseases which required frequent daily health monitoring and body check up in conjunction with the trendy uses of mobile phones and Personal Digital Assistants (PDAs) in various ubiquitous computing had make portable healthcare system a well known application today. A mobile phone based portable healthcare monitoring system with multiple vital signals monitoring ability at real time in WSN and CDMA network is developed. This system carries out real time monitoring and local data analysis process in the mobile phone. Any detection of abnormal health condition and diagnosis at earlier stage will reduce the risk of patient's life. As an extension to the existing model, a pre-diagnosis management system (PDMS) is designed to minimize the time consuming in pre-diagnosis process in the hospital or healthcare center. An alert is sent to the web server at the healthcare center when the patient detects his health is at critical state where the immediate diagnosis is needed. Preparation of diagnosis equipments and arrangement of doctor and nurses at the hospital side can be done earlier before the arrival of patient at the hospital with the help of PDMS. An efficient pre-diagnosis management increases the chances of diseases recovery rate as well.

  • PDF

A Study of Data Maintenance management of Wireless Sensor Network (무선센서 네트워크에서 데이터 유지관리에 관한 연구)

  • Xu, Chen-lin;Lee, Hyun Chang;Shin, Seong Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.217-220
    • /
    • 2014
  • Wireless sensor network(WSN) consists by a large number of low-cost micro-sensor nodes, collaborate to achieve the perception of information collection, processing and transmission tasks in deployment area. It can be widely used in national defense, intelligent transportation, medical care, environmental monitoring, precision agriculture, and industrial automation and many other areas. One of the key technologies of sensor networks is the data maintenance management technology. In this paper we analyze the data management technology of wireless sensor network and pointed their problems.

  • PDF

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.