• 제목/요약/키워드: Small Scale Sensor Networks

검색결과 20건 처리시간 0.026초

무선 센서 네트워크에서 삼각 클러스터링 라우팅 기법 (Clustering Triangular Routing Protocol in Wireless Sensor Network)

  • 누루하야티;이경오;최성희
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.913-916
    • /
    • 2010
  • 무선 센서 네트워크는 한정된 에너지 자원과 전원 공급 장치, 그리고 소형 배터리로 구성되어 있다. 센서 노드는 설치가 되면 사용자가 다시 접근할 수 없고 에너지 소스의 배포 및 교체가 가능하지 않다. 따라서, 네트워크의 수명 향상을 위해서는 에너지효율성이 네트워크 디자인의 핵심 요소가 된다. BCDCP 에서는 모든 센서는 CH (클러스터 헤드)로 데이터를 보내며 CH 는 BS(베이스 스테이션)로 이를 전송한다. BCDCP 는 소규모 네트워크에서는 잘 작동하지만 대규모 네트워크에서는 장거리 무선 통신을 위해 많은 에너지를 사용하기 때문에 적합하지 않다. 본 논문에서는 균형 잡힌 에너지 소비를 통해 네트워크 수명을 연장할 수 있는 삼각형 클러스터링 라우팅 프로토콜(TCRP)을 제안하였다. TCRP 는 삼각 모양으로 클러스터 헤드를 선택한다. 센서 필드는 에너지 레벨을 기준으로 지역을 나누게 되며 나뉘어져 있으며 모든 레벨에서 게이트 노드를 하나 선택하여 이 노드가 그 레벨 내에 있는 노드들의 데이터를 수집하고 리더 노드로 보낸다. 마지막으로 리더 노드가 BS 로 집계된 데이터를 보낸다. TCRP 는 몇 가지 실험을 통하여 BCDCP 보다 훌륭한 성능을 보여주었다.

광역 WSN 을 위한 클러스팅 트리 라우팅 프로토콜 (A Cluster Based Energy Efficient Tree Routing Protocol in Wireless Sensor Networks)

  • 누루하야티;최성희;이경오
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.576-579
    • /
    • 2011
  • 무선센서네트워크는 여러 분야에 사용되고 있으며 그 특성상 에너지를 효율적으로 사용할 수 있도록 설계되어야 한다. 무선 센서들은 한 번 설치되면 다시 교환할 수 없으며 제한된 배터리를 활용하여 운영된다. 따라서 네트워크 수명을 늘리기 위해서는 이러한 센서들의 효율적 활용이 필수적이다. BCDCP 에서는 CH(클러스터 헤드)가 BS(베이스스테이션)에 모든 데이터를 전송한다. BCDCP는 적은 규모의 네트워크에서는 잘 동작하지만 큰 규모에서는 무선 통신을 위한 에너지 소모가 많아 적절하지가 았다. TBRP 는 큰 규모의 네트워크에서는 잘 동작하지만 다중 홉 전송에 따는 에너지 고갈 현상이 빨리 발생한다. 본 논문에서는 균형화된 에너지 소모를 통해 네트워크 수명을 늘리기 위한 기법인 CETRP 를 제안하였다. CETRP 는 클러스터 헤드를 트리구조로 선정하여 에너지 효율을 극대화하였으며 다른 기법과 성능을 비교하였다.

대규모 무선 센서 망에서 종단 간 신뢰성 보장을 위한 기회적 다중경로 라우팅 방안 (Opportunistic Multipath Routing Scheme for Guaranteeing End-to-End Reliability in Large-Scale Wireless Sensor Networks)

  • 김천용;정관수;김상하
    • 한국통신학회논문지
    • /
    • 제40권10호
    • /
    • pp.2026-2034
    • /
    • 2015
  • 무선 센서 망은 제한된 통신범위를 가지는 수많은 센서 노드들로 구성된다. 따라서 직접 통신이 가능하지 않은 노드들 사이에는 다중 홉으로 통신하게 되며, 이는 패킷 전달의 신뢰성을 저하시킨다. 다중경로 라우팅과 기회 라우팅은 무선 센서 망에서 신뢰성을 보장하기 위한 대표적인 연구들이다. 기존 방안들은 종단 간 홉 수가 작은 경우 효과적으로 신뢰성을 향상시키지만, 홉 수가 커질수록 성능이 급격히 떨어진다. 따라서 기존 방안들은 종단 간 홉 수가 큰 대규모 무선 센서 망에는 적합하지 않다. 본 논문에서는 대규모 무선 센서 망에서 신뢰성 보장을 위한 기회적 다중경로 라우팅 방안을 제안한다. 서로 다른 특성 때문에 다중경로 라우팅과 기회 라우팅을 동시에 적용하는 것은 매우 어렵다. 제안방안은 구간 단위의 라우팅을 통해 두 방안을 동시에 적용함으로써 종단 간 신뢰성을 크게 향상시킨다. 또, 기회적 다중경로 라우팅을 통해 요구되는 신뢰성을 보장하기 위해 구간 신뢰성 개념을 제안한다. 각 구간에서의 신뢰성을 요구되는 종단 간 신뢰성보다 높게 설정함으로써 종단 간 신뢰성을 보장할 수 있다. 성능 평가 결과는 제안방안이 기존 방안에 비해 대규모 무선 센서 망에서의 신뢰성 보장에 더 적합함을 보인다.

사면방재를 위한 무선센서 네트워크 기술연구 (Landslide Detection using Wireless Sensor Networks)

  • 김형우;이범교
    • 한국방재학회:학술대회논문집
    • /
    • 한국방재학회 2008년도 정기총회 및 학술발표대회
    • /
    • pp.369-372
    • /
    • 2008
  • Recently, landslides have frequently occurred on natural slopes during periods of intense rainfall. With a rapidly increasing population on or near steep terrain in Korea, landslides have become one of the most significant natural hazards. Thus, it is necessary to protect people from landslides and to minimize the damage of houses, roads and other facilities. To accomplish this goal, many landslide prediction methods have been developed in the world. In this study, a simple landslide prediction system that enables people to escape the endangered area is introduced. The system is focused to debris flows which happen frequently during periods of intense rainfall. The system is based on the wireless sensor network (WSN) that is composed of sensor nodes, gateway, and server system. Sensor nodes comprising a sensing part and a communication part are developed to detect ground movement. Sensing part is designed to measure inclination angle and acceleration accurately, and communication part is deployed with Bluetooth (IEEE 802.15.1) module to transmit the data to the gateway. To verify the feasibility of this landslide prediction system, a series of experimental studies was performed at a small-scale earth slope equipped with an artificial rainfall dropping device. It is found that sensing nodes installed at slope can detect the ground motion when the slope starts to move. It is expected that the landslide prediction system by wireless senor network can provide early warnings when landslides such as debris flow occurs.

  • PDF

Structural health monitoring of a newly built high-piled wharf in a harbor with fiber Bragg grating sensor technology: design and deployment

  • Liu, Hong-biao;Zhang, Qiang;Zhang, Bao-hua
    • Smart Structures and Systems
    • /
    • 제20권2호
    • /
    • pp.163-173
    • /
    • 2017
  • Structural health monitoring (SHM) of civil infrastructure using fiber Bragg grating sensor networks (FBGSNs) has received significant public attention in recent years. However, there is currently little research on the health-monitoring technology of high-piled wharfs in coastal ports using the fiber Bragg grating (FBG) sensor technique. The benefits of FBG sensors are their small size, light weight, lack of conductivity, resistance corrosion, multiplexing ability and immunity to electromagnetic interference. Based on the properties of high-piled wharfs in coastal ports and servicing seawater environment and the benefits of FBG sensors, the SHM system for a high-piled wharf in the Tianjin Port of China is devised and deployed partly using the FBG sensor technique. In addition, the health-monitoring parameters are proposed. The system can monitor the structural mechanical properties and durability, which provides a state-of-the-art mean to monitor the health conditions of the wharf and display the monitored data with the BIM technique. In total, 289 FBG stain sensors, 87 FBG temperature sensors, 20 FBG obliquity sensors, 16 FBG pressure sensors, 8 FBG acceleration sensors and 4 anode ladders are installed in the components of the back platform and front platform. After the installation of some components in the wharf construction site, the good signal that each sensor measures demonstrates the suitability of the sensor setup methods, and it is proper for the full-scale, continuous, autonomous SHM deployment for the high-piled wharf in the costal port. The South 27# Wharf SHM system constitutes the largest deployment of FBG sensors for wharf structures in costal ports to date. This deployment demonstrates the strong potential of FBGSNs to monitor the health of large-scale coastal wharf structures. This study can provide a reference to the long-term health-monitoring system deployment for high-piled wharf structures in coastal ports.

컨볼루션 뉴럴 네트워크와 키포인트 매칭을 이용한 짧은 베이스라인 스테레오 카메라의 거리 센싱 능력 향상 (Improving Detection Range for Short Baseline Stereo Cameras Using Convolutional Neural Networks and Keypoint Matching)

  • 박병재
    • 센서학회지
    • /
    • 제33권2호
    • /
    • pp.98-104
    • /
    • 2024
  • This study proposes a method to overcome the limited detection range of short-baseline stereo cameras (SBSCs). The proposed method includes two steps: (1) predicting an unscaled initial depth using monocular depth estimation (MDE) and (2) adjusting the unscaled initial depth by a scale factor. The scale factor is computed by triangulating the sparse visual keypoints extracted from the left and right images of the SBSC. The proposed method allows the use of any pre-trained MDE model without the need for additional training or data collection, making it efficient even when considering the computational constraints of small platforms. Using an open dataset, the performance of the proposed method was demonstrated by comparing it with other conventional stereo-based depth estimation methods.

Modeling of Recycling Oxic and Anoxic Treatment System for Swine Wastewater Using Neural Networks

  • Park, Jung-Hye;Sohn, Jun-Il;Yang, Hyun-Sook;Chung, Young-Ryun;Lee, Minho;Koh, Sung-Cheol
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • 제5권5호
    • /
    • pp.355-361
    • /
    • 2000
  • A recycling reactor system operated under sequential anoxic and oxic conditions for the treatment of swine wastewater has been developed, in which piggery slurry is fermentatively and aerobically treated and then part of the effluent is recycled to the pigsty. This system significantly removes offensive smells (at both the pigsty and the treatment plant), BOD and others, and may be cost effective for small-scale farms. The most dominant heterotrophic were, in order, Alcaligenes faecalis, Brevundimonas diminuta and Streptococcus sp., while lactic acid bacteria were dominantly observed in the anoxic tank. We propose a novel monitoring system for a recycling piggery slurry treatment system through the use of neural networks. In this study, we tried to model the treatment process for each tank in the system (influent, fermentation, aeration, first sedimentation and fourth sedimentation tanks) based upon the population densities of the heterotrophic and lactic acid bacteria. Principal component analysis(PCA) was first applied to identify a relationship between input and output. The input would be microbial densities and the treatment parameters, such as population densities of heterotrophic and lactic acid bacteria, suspended solids(SS), COD, NH$_4$(sup)+-N, ortho-phosphorus (o-P), and total-phosphorus (T-P). then multi-layer neural networks were employed to model the treatment process for each tank. PCA filtration of the input data as microbial densities was found to facilitate the modeling procedure for the system monitoring even with a relatively lower number of imput. Neural network independently trained for each treatment tank and their subsequent combined data analysis allowed a successful prediction of the treatment system for at least two days.

  • PDF

ZigBee 응용을 위한 웨이블릿변환 기반 오디오 데이터 전송 (Audio Data Transmission Based on The Wavelet Transform for ZigBee Applications)

  • 진진흥;최은창;허재두;강석근
    • 대한임베디드공학회논문지
    • /
    • 제2권1호
    • /
    • pp.31-42
    • /
    • 2007
  • A transform coding scheme for the transmission of audio data in ZigBee based wireless personal area networks (WPAN) is presented in this paper. Here, wavelet transform is exploited to encode the features of audio data included mainly in the low frequency region. As a result, it is confirmed that the presented scheme recovers the original audio signals much accurately while it transmits the binary data compressed as 37.5% of the entire data generated without coding scheme. Especially, the mean-squared error between the recovered and original audio data approaches $10^{-4}$ when the signal-to-noise power ratio is sufficiently high. Hence, the presented coding scheme which exploits the wavelet transform is possibly applied for high-quality audio data transmission services in a small-scale sensor network based on ZigBee. Such a result is considered to be applicable as a basic material to update the technical specifications and develop the applications of ZigBee in WPANs.

  • PDF

단일홉 무선 애드혹 네트워크에서 단순 TDMA 시스템을 위한 DESYNC 알고리즘 개선 방안 (An Enhanced DESYNC Scheme for Simple TDMA Systems in Single-Hop Wireless Ad-Hoc Networks)

  • 현상현;이제율;양동민
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제3권9호
    • /
    • pp.293-300
    • /
    • 2014
  • TDMA(Time Division Multiple Access)는 무선 네트워크에서 한정된 주파수 대역을 일정한 크기의 시간 단위인 슬롯으로 분할하고 사용자가 할당된 슬롯을 이용하여 통신할 수 있는 채널 접속 기술이다. TDMA에 사용되는 기술에 따라 동기와 비동기 방식으로 나눌 수 있다. TDMA의 동기화 과정은 복잡하고, 추가 장비가 필요할 수 있기 때문에 소규모 네트워크에 적합하지 않다. 반면, 비동기 방식의 DESYNC에서는 전역 클록(global clock)이나 기반 시설 도움 없이 동기화를 이룰 수 있다. 하지만 DESYNC는 동기화 완료하는 데 제법 시간이 걸리고, 소요되는 최대 지연 시간이 얼마인지 보장하지 못한다. 그래서 본 논문에서는 소규모 네트워크에 적합한 경량 동기화 기법인 C-DESYNC를 제안한다. C-DESYNC는 참가 하는 노드의 주기 시작 정보를 가지고 있는 GP (Global Packet) 신호와 노드들의 firing 개수를 이용하여 노드의 개수를 파악하고, 이 정보를 이용하여 동기화를 이룬다. 제시하는 알고리즘은 기존의 동기화 방식의 TDMA 기법에 비해 간단하여 비용 측면에서도 효율적이며, 동기화 완료시까지 걸리는 최대 지연시간을 보장한다. 시뮬레이션 결과를 통해서 C-DESYNC는 참가 노드 개수에 관계없이 오직 3 주기 내에 동기화 완료를 보장하는 것을 보여준다.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.