Filter by subject:
- Wireless sensor networks [1166]
- Electrical and electronic engineering [1159]
- Communications [1159]
- Telecommunication [1159]
- Radio links and equipment [1159]
- Information and communication theory [579]
- General topics, engineering mathematics and materials science [489]
- Engineering mathematics and mathematical techniques [399]
- Communication system theory [373]
- Computer and control engineering [304]
- [258]
- http://iet.metastore.ingenta.com/content/subject/b6150m,http://iet.metastore.ingenta.com/content/subject/b6150p,http://iet.metastore.ingenta.com/content/subject/b7200,http://iet.metastore.ingenta.com/content/subject/b0240,http://iet.metastore.ingenta.com/content/subject/b7230,http://iet.metastore.ingenta.com/content/subject/b0260,http://iet.metastore.ingenta.com/content/subject/b6210,http://iet.metastore.ingenta.com/content/subject/b6140,http://iet.metastore.ingenta.com/content/subject/c5000,http://iet.metastore.ingenta.com/content/subject/b0240z,http://iet.metastore.ingenta.com/content/subject/c6000,http://iet.metastore.ingenta.com/content/subject/c6100,http://iet.metastore.ingenta.com/content/subject/b0100,http://iet.metastore.ingenta.com/content/subject/c7000,http://iet.metastore.ingenta.com/content/subject/b0170,http://iet.metastore.ingenta.com/content/subject/b0170n,http://iet.metastore.ingenta.com/content/subject/b6250f,http://iet.metastore.ingenta.com/content/subject/b5000,http://iet.metastore.ingenta.com/content/subject/b5200,http://iet.metastore.ingenta.com/content/subject/b7500,http://iet.metastore.ingenta.com/content/subject/a,http://iet.metastore.ingenta.com/content/subject/b6120,http://iet.metastore.ingenta.com/content/subject/c1000,http://iet.metastore.ingenta.com/content/subject/b0290,http://iet.metastore.ingenta.com/content/subject/b7550,http://iet.metastore.ingenta.com/content/subject/c5600,http://iet.metastore.ingenta.com/content/subject/a8000,http://iet.metastore.ingenta.com/content/subject/c1100,http://iet.metastore.ingenta.com/content/subject/b6210l,http://iet.metastore.ingenta.com/content/subject/b0290f,http://iet.metastore.ingenta.com/content/subject/c6130,http://iet.metastore.ingenta.com/content/subject/c7400,http://iet.metastore.ingenta.com/content/subject/b5270,http://iet.metastore.ingenta.com/content/subject/c5620,http://iet.metastore.ingenta.com/content/subject/b8000,http://iet.metastore.ingenta.com/content/subject/c3000,http://iet.metastore.ingenta.com/content/subject/c5200,http://iet.metastore.ingenta.com/content/subject/a8700,http://iet.metastore.ingenta.com/content/subject/c3300,http://iet.metastore.ingenta.com/content/subject/a8770,http://iet.metastore.ingenta.com/content/subject/a0000,http://iet.metastore.ingenta.com/content/subject/b7510,http://iet.metastore.ingenta.com/content/subject/c5260,http://iet.metastore.ingenta.com/content/subject/c6130s,http://iet.metastore.ingenta.com/content/subject/c7300,http://iet.metastore.ingenta.com/content/subject/b7300,http://iet.metastore.ingenta.com/content/subject/b5270b,http://iet.metastore.ingenta.com/content/subject/c7410,http://iet.metastore.ingenta.com/content/subject/b6120d,http://iet.metastore.ingenta.com/content/subject/c7330,http://iet.metastore.ingenta.com/content/subject/b6140b,http://iet.metastore.ingenta.com/content/subject/b0250,http://iet.metastore.ingenta.com/content/subject/e,http://iet.metastore.ingenta.com/content/subject/b1000,http://iet.metastore.ingenta.com/content/subject/b6120b,http://iet.metastore.ingenta.com/content/subject/c6170,http://iet.metastore.ingenta.com/content/subject/b5230,http://iet.metastore.ingenta.com/content/subject/b7320,http://iet.metastore.ingenta.com/content/subject/c3370,http://iet.metastore.ingenta.com/content/subject/c6170k,http://iet.metastore.ingenta.com/content/subject/c1140,http://iet.metastore.ingenta.com/content/subject/c1180,http://iet.metastore.ingenta.com/content/subject/b1200,http://iet.metastore.ingenta.com/content/subject/b7210,http://iet.metastore.ingenta.com/content/subject/c3370h,http://iet.metastore.ingenta.com/content/subject/b6135,http://iet.metastore.ingenta.com/content/subject/c5640,http://iet.metastore.ingenta.com/content/subject/b2000,http://iet.metastore.ingenta.com/content/subject/b6210c,http://iet.metastore.ingenta.com/content/subject/b6300,http://iet.metastore.ingenta.com/content/subject/c1140z,http://iet.metastore.ingenta.com/content/subject/b8400,http://iet.metastore.ingenta.com/content/subject/a8770e,http://iet.metastore.ingenta.com/content/subject/c7410f,http://iet.metastore.ingenta.com/content/subject/a0200,http://iet.metastore.ingenta.com/content/subject/a8600,http://iet.metastore.ingenta.com/content/subject/b6330,http://iet.metastore.ingenta.com/content/subject/c6190,http://iet.metastore.ingenta.com/content/subject/c4000,http://iet.metastore.ingenta.com/content/subject/e1000,http://iet.metastore.ingenta.com/content/subject/e3000,http://iet.metastore.ingenta.com/content/subject/b1265,http://iet.metastore.ingenta.com/content/subject/b6150e,http://iet.metastore.ingenta.com/content/subject/a0600,http://iet.metastore.ingenta.com/content/subject/b6140m,http://iet.metastore.ingenta.com/content/subject/c1300,http://iet.metastore.ingenta.com/content/subject/c5260b,http://iet.metastore.ingenta.com/content/subject/b0240e,http://iet.metastore.ingenta.com/content/subject/a0670
- b6150m,b6150p,b7200,b0240,b7230,b0260,b6210,b6140,c5000,b0240z,c6000,c6100,b0100,c7000,b0170,b0170n,b6250f,b5000,b5200,b7500,a,b6120,c1000,b0290,b7550,c5600,a8000,c1100,b6210l,b0290f,c6130,c7400,b5270,c5620,b8000,c3000,c5200,a8700,c3300,a8770,a0000,b7510,c5260,c6130s,c7300,b7300,b5270b,c7410,b6120d,c7330,b6140b,b0250,e,b1000,b6120b,c6170,b5230,b7320,c3370,c6170k,c1140,c1180,b1200,b7210,c3370h,b6135,c5640,b2000,b6210c,b6300,c1140z,b8400,a8770e,c7410f,a0200,a8600,b6330,c6190,c4000,e1000,e3000,b1265,b6150e,a0600,b6140m,c1300,c5260b,b0240e,a0670
- [251],[232],[195],[182],[180],[171],[146],[144],[140],[138],[133],[133],[132],[132],[123],[117],[113],[111],[110],[104],[103],[96],[93],[88],[83],[81],[78],[78],[77],[74],[74],[71],[67],[63],[61],[60],[57],[55],[55],[53],[52],[52],[49],[49],[48],[47],[46],[46],[44],[43],[41],[40],[40],[38],[37],[37],[36],[36],[35],[35],[34],[34],[32],[32],[32],[30],[30],[29],[28],[28],[27],[26],[25],[25],[24],[24],[24],[24],[23],[23],[23],[22],[22],[21],[21],[21],[21],[20],[19]
- /search/morefacet;jsessionid=5bpqnwhkb2dwj.x-iet-live-01
- /content/searchconcept;jsessionid=5bpqnwhkb2dwj.x-iet-live-01?option1=pub_concept&sortField=prism_publicationDate&pageSize=20&sortDescending=true&value1=b6250k&facetOptions=2&facetNames=pub_concept_facet&operator2=AND&option2=pub_concept_facet&value2=
- See more See less
Filter by content type:
Filter by publication date:
- 2012 [133]
- 2011 [109]
- 2010 [93]
- 2015 [89]
- 2019 [86]
- 2020 [74]
- 2018 [64]
- 2017 [59]
- 2014 [52]
- 2009 [51]
- 2016 [46]
- 2013 [39]
- 2005 [4]
- 2008 [3]
- See more See less
Filter by author:
- Fernando J. Velez [7]
- H.F. Rashvand [7]
- Fadi Al-Turjman [6]
- Fardin Derogarian [6]
- Li Cui [5]
- Satish Chand [5]
- Y. Liu [5]
- Yang Yang [5]
- Amiya Kumar Rath [4]
- Andrew H. Kemp [4]
- B. Zhang [4]
- Chong Shen [4]
- Gehao Sheng [4]
- Hitesh Mohapatra [4]
- Jingyu Zhang [4]
- Kai Liu [4]
- Liangyin Chen [4]
- Lijun Chen [4]
- Lingen Luo [4]
- Norberto Barroca [4]
- Pabitra Mohan Khilar [4]
- Qian Luo [4]
- Richa Sharma [4]
- Rui Wang [4]
- Umang Singh [4]
- Vasudha Vashisht [4]
- Weidong Yi [4]
- X. Wang [4]
- Xiuchen Jiang [4]
- Xuming Fang [4]
- Yanliang Jin [4]
- Yousef S. Kavian [4]
- A. Abedi [3]
- A. Rydberg [3]
- Amir S. Elsafrawey [3]
- B. O'Flynn [3]
- Bijendra Kumar [3]
- Bin Hu [3]
- Chen Zhao [3]
- Chenglin Zhao [3]
- Christos Tachtatzis [3]
- Dong Yang [3]
- Emad S. Hassan [3]
- F. Yu [3]
- Feng Yan [3]
- Feng Zhou [3]
- H. Chen [3]
- Hock Guan Goh [3]
- I. Andonovic [3]
- Ian A. Glover [3]
- J. Zheng [3]
- Jianpo Li [3]
- Jinho Choi [3]
- K. Raoof [3]
- Kae Hsiang Kwong [3]
- Kai Wang [3]
- Kaikai Chi [3]
- L. Cui [3]
- L. Zhang [3]
- Lei Nan [3]
- Lei Zhang [3]
- Li Li [3]
- Lianfeng Shen [3]
- Limin Sun [3]
- M. Ben Zid [3]
- M.H. Kahaei [3]
- Manju [3]
- Moawad I. Dessouky [3]
- Mohamed S. Abdalzaher [3]
- Mohammad S. Obaidat [3]
- N. Xiong [3]
- P. van Engen [3]
- P.D. Mitchell [3]
- Qiang Gao [3]
- Qiang Xu [3]
- R. Kumar [3]
- R.-S. Chang [3]
- Rencheng Jin [3]
- Reza Javidan [3]
- Rizwan Patan [3]
- Robert C. Atkinson [3]
- Shi Cheng [3]
- Sudip Misra [3]
- V.O.K. Li [3]
- Vítor Grade Tavares [3]
- Wei Lei [3]
- Wei Zhao [3]
- Xiangyang Liu [3]
- Xianzhong Tian [3]
- Xinping Guan [3]
- Y. Li [3]
- Y. Zhang [3]
- Y.S. Kavian [3]
- Yajuan Qin [3]
- Yi Wang [3]
- Yong Feng [3]
- Yongrui Chen [3]
- Yuefeng Ji [3]
- Zhang Yu-quan [3]
- Zhixin Sun [3]
- See more See less
Filter by access type:
The existence of link correlation has been empirically validated, and different exemplary works exploit the link correlation in the designing of various network protocols. In this work, the authors investigated the impact of this link correlation in contention mechanism of medium access control (MAC). They illustrated negative link correlation could deteriorate the contention mechanism designed to handle hidden terminal problems and, consequently, increase the packet collision rate between the neighbours. They also showed that negative link correlation could increase the chance of an exposed terminal problem. Therefore, ignoring negative link correlation could lead to overestimate overall network throughput and underestimate packet delay. Next, instead of designing a new contention mechanism exploiting the link correlation, they proposed a new routing tree which mitigates the negative effect of negative link correlation without altering the underlying MAC layer. They evaluated this routing tree on Indriya testbed with TelosB nodes and compared it to the minimum spanning tree based on link quality only. The results show improvement in end-to-end throughput and packet reception ratio at each node.
This study proposes three-node cooperative computing schemes for wireless sensor networks (WSNs), including parallel offload cooperative computing (POCC) and serial offload cooperative computing (SOCC). The cooperation system includes a task node with execution tasks and two peer help nodes. Specifically, the authors fully mobilise the computing and communication resources in the network by means of cooperative computing to minimise the energy consumption of processing tasks in the WSN while satisfying the delay constraints. The authors characterise these problems as optimal problems and find the optimal solutions using corresponding iterative algorithms, respectively. The simulation results show the superior performance of the proposed schemes in terms of energy consumption and node fairness. For different cases the superiority of POCC and SOCC is verified separately, and the SOCC is more suitable for the case where task node is located at the edge of WSN. Furthermore, the authors introduce a trade-off scheme between POCC and SOCC, which can always achieve the optimal scheme in different cases.
In the military battlefield, maintaining high survivability of energy constraint wireless sensor network (WSN) when some nodes are destroyed by the foe troops is one of the prominent issues for the researchers. This study proposes the fuzzy and neuro-fuzzy based relay selection schemes for cooperative WSN which reduce the bit error rate (BER) while improving the network lifetime. Meanwhile, the proposed model maintains the uninterrupted communication between military nodes in a warfare situation. The proposed proposed strategies are compared with the maximum residual energy-based relay selection (MRERS), minimum energy consumption-based relay selection (MECRS), and random relay selection (RRS) strategies. The performance of the proposed and existing strategies is evaluated on the basis of BER, network lifetime, number of dead nodes, and average energy of nodes in the network. The simulation results demonstrate that proposed schemes has 13.19–19.28% improvement in BER than the existing strategies. Moreover, 76.00–90.88% network lifetime improves when compared with the MECRS and RRS strategies. However, 6–7.76% is less than MRERS strategy. Furthermore, the results show that network survivability and average network energy is also better when the number of dead nodes in the network increases.
A communication void is one of the most serious issues in any routing techniques. This issue occurs when a node does not have any forwarder node to forward the data packets towards the sink node or surface station. The presence of a void node affects the overall performance of routing techniques in terms of end-to-end delay, data loss, energy consumption, and so on. The primary objective of this work is to avoid the void region in underwater sensor networks (UWSNs). For the same purpose, this work introduces the void-hole avoidance routing algorithm for UWSNs. This work avoids horizontal transmission, which further reduces the end-to-end delay. The residual energy, depth, holding time, and distance from the sending node to the forwarding node and forwarding node to the surface station are used as a matrix to select the best forwarder node. The simulation has been done on MATLAB to analyse the performance of the proposed algorithm. The proposed routing algorithm attained better performance using the metrics, namely packet delivery delay, number of dead nodes, and energy tax with the values of 0.9147, 48, and 72.14 by varying the transmission range, and 0.9184, 38, and 71.12 by varying the network size, respectively.
The exponential rise in the demands of the wireless communication system has alarmed industries to achieve more efficient and quality-of-service (QoS) centric wireless communication networks. The decentralised and infrastructure-less nature of wireless sensor networks (WSNs) enable it to be one of the most sought and used wireless network globally. Its cost-efficiency and functional robustness towards low-power lossy networks make it suitable for internet-of-things (IoT) applications. In recent years, IoT technologies have been used in diverse applications, including Smart City Planning and Management (SCPM). Although, mobile-WSN has played a decisive role in IoT enabled SCPM, its routing optimality and power transmission have always remained challenging. Noticeably, major existing researches address mainly on routing optimisation and very few efforts are made towards dynamic power management (DPM) under non-linear network conditions. With this motive, in this study, a highly robust and efficient QoS – centric reinforcement learning-based DPM model has been developed for mobile-WSN to be used in SCPM. Unlike classical reinforcement learning methods, the authors’ proposed advanced reinforcement learning-based DPM model exploits both known and unknown network parameters and state-activity values, including bit-error probability, channel state information, holding time, buffer cost etc. to perform dynamic switching decision. The key objective of the proposed model is to ensure optimal QoS oriented DPM and adaptive switching control to yield reliable transmission with the maximum possible resource utilisation. To achieve it, they proposed model has been developed as a controlled-Markov decision problem by applying hidden Markov model it obtains known and unknown parameters, which are subsequently learnt using an enhanced reinforcement learning to yield maximum resource utilisation while maintaining low buffer cost, holding cost and bit-error probability to retain the QoS provision.
In this technical note, the problem of observer-based controller design is considered for sensor networked systems subject to distributed hybrid-triggered transmission scheme and input quantisation. A novel observer model based on coupled transmission signals from multi-channel is first proposed to estimate unavailable state variables and exploited in the feedback protocol. In order to provide a trade-off between saving network resources and improving system performance, a distributed hybrid-triggered transmission scheme with communication delays is adopted to update the observer input signals. For the sake of further reducing the occupancy of network resources, the control input signal is quantised by a logarithmic quantiser. Then, by making use of the Lyapunov stability theory, the sufficient conditions guaranteeing the system asymptotically stable are presented. Moreover, the explicit expressions of observer and controller parameters are achieved by solving a set of linear matrix inequalities. Finally, two simulation examples are provided to illustrate the rationality of the proposed control method.
The accuracy of cooperative localisation can be severely degraded in non-line-of-sight (NLOS) environments. To mitigate the NLOS errors, the cooperative localisation problem based on time of arrival (TOA) under the mixed line-of-sight (LOS)/NLOS conditions is addressed. By studying the topological relationship between nodes, a TOA NLOS mitigation cooperative localisation algorithm based on the topological unit is proposed. This algorithm is implemented under the classical multidimensional scaling framework. The adjacent topological unit of NLOS measurements are successfully identified by using the LOS matrix, and the NLOS measurements are re-estimated using topological units. The least-square method is used to transform the relative coordinates into absolute coordinates depending on the location of the anchor nodes. Compared to the existing methods, by employing the topological unit, this algorithm only requires the number of LOS anchor nodes to be 2 in the two-dimensional plane, and the better localisation performance can be achieved. Simulation results show that the proposed method works well for both the sparse and dense NLOS environments.
The quick detection and localisation of partial discharge (PD) in an air-insulated substation (AIS) based on ultrahigh-frequency (UHF) sensor arrays are efficient for power equipment monitoring. The adopted UHF PD time difference-of-arrival (DOA) methods mainly use the time difference of electromagnetic wave signals. Thus, the system requires both a high-sampling rate and time synchronisation accuracy, leading to a high cost and large size. In this study, the feasibility and accuracy of PD DOA in an AIS were investigated using an UHF wireless sensor array and the received signal strength indicator. First, the power pattern of the designed UHF wireless sensor array was obtained via an offline experiment. Then, a statistical approach to the PD DOA method based on the maximum likelihood estimator was employed to obtain the preliminary DOA result. Finally, interpolation and clustering algorithms were used to improve the accuracy of the DOA. A laboratory test was conducted. The average error of the PD DOA was <6°, and the cost-effectiveness and portability were clearly improved.
In past few years, wireless sensor network (WSN) is considered as an essential and imperative way for efficient data communication in ubiquitous computing environment along with the fulfilment of objectives such as (i) lifetime enhancement and (ii) energy conservation. Till date, the research findings demonstrate that clustering of WSNs is an effective and pertinent approach. Moreover, designing of energy-aware routing schemes for clustered WSNs is a basic necessity due to resource-restricted nature of these sensor nodes. This study has a twofold contribution. First, the research dimensions of WSNs are explained by incorporating recent work carried out as per findings in real scenarios. Secondly, this study presents a comprehensive survey of existing clustering schemes for WSNs based on metaheuristic techniques. This study is beneficial for researchers of this domain as it surveys the literature over the period 2000–2020 on energy efficiency in clustered WSNs.
Wireless sensor network (WSN) is a developed wireless network consisting of some connected sensor nodes. The WSN is employed in many fields such as military, industrial, and environmental monitoring applications. These nodes are equipped with sensors for sensing the environmental variables such as temperature, humidity, wind speed, and so on. In most applications, WSN is positioned in remote places and harsh environments, where they are most probably exposed to faults. Hence, faulty sensor identification is one of the most fundamental tasks to be considered in WSN. This study suggests a hybrid methodology based on mutual information change (MIC) and wavelet transform (WT) for faulty sensor identification. The MIC method is suggested to study correlation among sensors, while the WT technique is proposed for self-sensor detection. WT is suitable for analysing non-stationary signals into approximation and detail coefficients. The suggested algorithm performance is investigated by applying a real case study at an arbitrary location close to Cairo, Egypt. The results of each method are compared using the true positive rate (TPR), false negative rate, and accuracy measures. Obtained results have shown that combining MIC and WT techniques can achieve a higher TPR and accuracy reach 100% in most fault types.
This paper reports the results of experimental studies of six different wireless sensor nodes and networks under a radiation environment with a dose rate of 20 K Rad (Si)/h. The wireless nodes evaluated are ZigBee, WirelessHART, ISA 100.11a, LoRa, and 433/915 MHz point-to-point devices made from commercial off-the-shelf (COTS) components. The experiments were carried out using a 60Co gamma source, while the devices are at on-power operating states, and their operating statuses have been continuously monitored to determine the first instance of failure and the rate of gradual degradation in terms of communication channel performance and quality of the wireless signals. Observations indicate that the different devices and networks exhibit varying levels of radiation tolerance. For example, some can only survive for less than one hour, but others are operating satisfactorily for several hours. Furthermore, before a device suffers a fatal hardware failure, the performance degradation progresses slowly. It is believed that this is the first time that such results are reported in the open literature. Their significance is that the results can provide some practical guidance to select the most suitable wireless devices for the design and construction of remote monitoring systems for high-level radiation environments.
This study explores how wireless ZigBee technology may be applied to automation of electric loads in residential and commercial spaces, allowing to participate in demand response initiatives. The authors discuss development of a custom smart plug with sensing, wireless communication, and electric load actuation capabilities along with several innovative upgrades. There are many commercially available smart plugs that contain multiple sensors and relays. However, very few provide the ability to effectively estimate the proximity between modules or the ability to perform robust system-wide optimisation. The authors propose two innovative smart plug eco-system improvements. One is the use of a received signal strength indicator (RSSI) multi-lateration-based method to estimate the relative proximities of modules. The RSSI values for almost all transmission paths within the ZigBee network are acquired via the authors' forced network reconfiguration algorithm, addressing the limitations of RSSI observation within a star structure. A second innovation is the development of a parallelised neural network training method for application to load automation. The authors use a k-means clustering algorithm to divide training data into subsets such that training may be parallelised.
Owing to their short communication range, wireless nodes in wireless sensor networks (WSNs) can exchange information with devices in their vicinity only. Thus, in sparse networks, the full connectivity of the network is rarely achieved. This renders a centralised approach towards localisation in WSNs useless. Moreover, the exploitation of a centralised algorithm for localisation compromises the scalability in dense networks. Thus, a decentralised, location-aware network with partial connectivity and hybrid (range and direction) measurements obtained between known sensors (reference sensors) and sensors at unknown locations (target sensors) is under focus. The decentralised location estimation is obtained using a linear least squares (LLS) approach and performance enhancements are achieved by introducing a weighing strategy to produce weighted least squares (WLS) estimates. This distributed estimation is made possible by designing a map stitching technique that forms the global map of the network from individual local maps of the wireless nodes without compromising the distributed nature of the network. In the analytical section of the study, theoretical mean squares error expression is derived for LLS estimation, and a Cramer–Rao lower bound is derived to bind the performance of the WLS solution. The algorithm's performance validation is conducted both theoretically and via simulations.
Health telemonitoring systems are constrained by the computational and data transmission load resulting from the large volumes of various measured signals, e.g. in the fall detection application. Nevertheless, the trend of movement and the implementation of computer intelligence in intelligent devices ensure an intelligent and convenient method for continuous real-time telemonitoring of health conditions. In this paper, fall detection is presented while leveraging edge computing integrated on a multi-level architecture combines the Wireless Sensors Network and the Internet of Things. Particularly, we present a complete study and implementation scenarios while investigating the performances of machine learning algorithms to distinguish between different fall patterns and activities of daily living using a set of significant extracted features from measured acceleration and angular velocity signals. For low computational requirements and to improve the classification performances, the Linear Discriminant Analysis is used to reduce the dimensionality of extracted features. The experimental results assess the performances of the proposed approach in fall detection that show the highest accuracy of 99.92% provided using the KNN classifier and accuracy of 97.5% for fall pattern recognition using the SVM classifier. Also, the online classification on the Fog device reached an accuracy of 94.42% using the SVM classifier.
IEEE 802.15.4 has been widely accepted as the de facto standard for wireless sensor networks (WSNs). However, as in their current solutions for medium access control (MAC) sub-layer protocols, channel efficiency has a margin for improvement, in this study, the authors evaluate the IEEE 802.15.4 MAC sub-layer performance by proposing to use the request-/clear-to-send (RTS/CTS) combined with frame concatenation and block acknowledgement (BACK) mechanism to optimise the channel use. The proposed solutions are studied in a distributed scenario with single-destination and single-rate frame aggregation. The throughput and delay performance is mathematically derived under channel environments without/with transmission errors for both the chirp spread spectrum and direct sequence spread spectrum physical layers for the 2.4 GHz Industrial, Scientific and Medical band. Simulation results successfully verify the authors’ proposed analytical model. For more than seven TX (aggregated frames) all the MAC sub-layer protocols employing RTS/CTS with frame concatenation (including sensor BACK MAC) allow for optimising channel use in WSNs, corresponding to 18–74% improvement in the maximum average throughput and minimum average delay, together with 3.3–14.1% decrease in energy consumption.
Optimising the coding bit-rates and activity rates of sensor nodes is essential for the functionality and survival of wireless sensor networks as these rates not only affect the amount of information collected by the network, but also affect its power consumption. This study proposes a framework for joint coding bit-rates and activity rates optimisation (CARO) of sensor nodes in wireless visual sensor networks under limited energy constraints. The framework uses the concept of accumulative visual information (AVI) as a measure of the amount of visual information collected from a sensor node. The authors propose two optimisation algorithms for the following two cases: (I) networks with predetermined operation time, where algorithm CARO I maximises the AVI of the network over its predetermined operation time. (II) Best effort networks, where algorithm CARO II maximises the network operation time under constraints on the collected visual information. Simulations show that optimising the rates using CARO maximises the AVI of the network and extends its operation time compared to the straightforward solution when all nodes have equal activity rates. This is because the authors' framework takes into consideration that different nodes in different locations may operate under different conditions and collect information of different significance.
In this study, the authors study binary decision fusion over a shared Rayleigh fading channel with multiple antennas at the decision fusion centre (DFC) in wireless sensor networks. Three fusion rules are derived for the DFC in the case of distributed M-ary hypothesis testing, where M is the number of hypothesis to be classified. Namely, the optimum maximum a posteriori (MAP) rule, the augmented quadratic discriminant analysis (A-QDA) rule and MAP observation bound. A comparative simulation study is carried out between the proposed fusion rules in-terms of detection performance and receiver operating characteristic (ROC) curves, where several parameters are taken into account such as the number of antennas, number of local detectors, number of hypothesis and signal-to-noise ratio. Simulation results show that the optimum (MAP) rule has better detection performance than A-QDA rule. In addition, increasing the number of antennas will improve the detection performance up to a saturation level, while increasing the number of the hypothesis will deteriorate the detection performance.
Most nodes of Mine Internet of Things (Mine IoT) are powered by batteries, and wireless charging using mobile chargers (MCs) is an effective way to make nodes work sustainably. A novel hybrid charging method combining the controlled and opportunistic MCs (C&O charging) is proposed in this study. Workers (such as the repairmen and gas inspectors) carrying portable chargers are proposed to be opportunistic MCs to provide an incidental charging service for the surrounding rechargeable Mine IoT nodes while doing its own work to reduce the payload of controlled MCs. The hybrid charging model based on the incidental charging ability of the opportunistic MC is constructed and the scheduling strategy of the controlled MC and the queueing management scheme of the charging request are also proposed. The simulation results indicate that the power demands of the majority of the nodes in the maintenance areas can be met or partially met by opportunistic MCs and the charging time of C&O charging is greatly decreased compared to that of only using controlled MCs.
The idea of aggregate signcryption was first proposed by Selvi. The aggregation process reduces the communication overhead and hence, it is efficient in low-bandwidth communication networks such as wireless sensor networks and vehicular ad-hoc network VANET. The goal of this study is to propose a secure provably identity based aggregate signcryption scheme ID-ASC without pairings over the elliptic curve cryptography. The proposed scheme is provable secure against confidentiality and unforgeability under random oracle model. Moreover, the proposed ID-ASC reduced the computational complexity when compared to other schemes in literature.
Recently, the wireless sensor networks have rapidly emerged into agriculture and greenhouse because of owing many advantages than the traditional methods. However, some subjects such as cost and power are being brought up as a controversial issue. This study presents a developed wireless sensor network based on a proposed algorithm to improve tomato crop in a greenhouse. The developed sensor nodes, which own low-power consumption and also low-cost, monitor parameters like temperature, humidity, CO, and light intensity. The users define the minimum and maximum setpoints for the sensors to make an appropriate condition in the greenhouse. Also, the developed system was equipped with irrigation management that works based on time and date that maintain optimum water in the soil. The obtained results reveal that the amount of the tomato crops increases 30% than traditional methods after benefiting the developed system as well as the greenhouse experiences a decrease in consuming methane gas, water, and electricity as 30, 24 and 10% separately, in comparison to the traditional methods.