The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose the Distributed Hybrid Filter (DHF) to overcome the performance degradation in Sigma Point Filters caused by bad linearization. A quantifiable criterion to judge the quality of linearization will be given. If the linearization quality is unsatisfactory, a sensor will use some other local processing method which does not rely on linearization. The DHF can accommodate multiple...
We present a novel channel model for a two-hop decentralized wireless relay network (DWRN), where the relays operate in a completely distributive fashion. The model is based on an analogous approach to the conventional description methods for wideband directional multipath channels. Specifically, the notion of information azimuth-delay spectrum (IADS) is devised. This definition, parallel to the widely-used...
The paper proposes a near-optimal, distributed implementation of the particle filter for large scale dynamical systems with sparse measurements, as in wireless sensor networks (WSN) and power distribution systems. Compared to the centralized approach, the distributed implementation of the particle filter is computationally efficient and provides considerable transmission bandwidth savings due to a...
In this paper we propose a technique to determine the decision thresholds in multi-bit distributed detection. Detection thresholds are required to quantize the acquired information from the environment to send them to a fusion center. In multi-bit detection, decision making is complicated and in most cases, methods based on simulation or Person by Person Optimizations are applied to find the thresholds...
We consider the problem of data harvesting in wireless sensor networks. A designated collector node seeks to compute a function of the sensor measurements. For a directed graph G = (V ,??) on the sensor nodes, we wish to determine the optimal encoders on each edge which achieve zero-error block computation of the function at the collector node. Our goal is to characterize the rate region in R|??|...
In this paper we propose centralized feedback control laws for mobile sensor networks so that sensor trajectories cover a given domain as uniformly as possible. The design of the feedback law is based on a measure for uniformity of the trajectories given as a distance between a certain delta-like distribution on the trajectories and a desired probability distribution. The design of control is of Lyapunov-type...
A methodology is developed to deploy a mobile sensor network for the purpose of detecting and capturing mobile targets in the plane. The mobile sensor network consists of a set of heterogeneous robotic sensors modeled as hybrid systems with individual processing capabilities. The targets are modeled by a Markov motion process that is commonly used in target tracking applications. Since the sensors...
Recent advances in systems of networked sensors have set the stage for smart environments which will have wide-ranging applications from intelligent wildlife monitoring to social applications such as health and elderly care service provisioning. Perhaps the most natural problem in sensor systems is the ??efficient?? propagation of a sensed local event. In order to address this problem, the notion...
In the context of sensor and ad hoc networks, wireless networking systems with mobile sensors have been studied enthusiastically for the applications to habitat and environment monitoring, and information communications between vehicles and portable devices. Since mobile objects move randomly and communicate each other wirelessly only on close ranges, it is possible to happen frequent disconnection...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Sensor nodes have highly constrained resource like limited battery power, memory, processing capabilities, etc. These limitations make infeasible to apply traditional key management techniques such as public key cryptography in the WSNs. For the existing key pre-distribution...
The most core technology demanded by the ubiquitous era is infrastructure. Intellectual store management and future store are receiving the spotlight in recent distribution industry. Intellectualization of stores is applied using techniques such as RFID and USN. Studies are focusing on efficient store management through improvement of work processes and development of services that provide convenience...
We present a solid study on the performance of a homological sensor network in partial sensing coverage, which means the network has at least one sensing coverage hole and we demonstrate that when sacrificing a little coverage the system lifetime can be prolonged significantly. In particular, we showed that when there is one sensing coverage hole (with a coverage rate of 97%) the system lifetime can...
Intrusion detection in a Wireless Sensor Network (WSN) is of significant importance in many applications to detect malicious or unexpected intruder(s). The intruder can be an enemy in a battlefield, or a unusual environmental change in a chemical industry etc. With uniform distribution, the detection probability is the same for any point in a WSN. However, some applications may require different degrees...
In WSN-based surveillance systems power conservation is an important issue but one must also ensure that the application's objectives are met. In this paper, we jointly address the problem of coverage, disambigation and adaptive scheduling of sensor node's activity to extend the network lifetime while fulfilling a critical surveillance application needs. We first present a distributed algorithm that...
Distance measurement between nodes in wireless sensor networks is a prerequisite for a variety of applications and algorithms. However, special hardware allowing such measurements is expensive, especially if dealing with hundreds or thousands of nodes. Fekete et al. presented an approach on distance estimation based on only the neighborhood information available to all nodes in the network. We improve...
Many basic key distribution schemes specifically tuned to wireless sensor networks have been proposed in the literature. Recently, several researchers have proposed schemes in which they have used group-based deployment models and assumed predeployment knowledge of the expected locations of nodes. They have shown that these schemes achieve better performance than the basic schemes, in terms of connectivity,...
In this paper, we study the selection of active sensors in wireless sensor networks (WSN) subject to a limited energy consumption and a given estimation error. A cost function based on spatial correlation is derived for active sensor selection. Accordingly, a new adaptive algorithm is proposed in which the number of active sensors is adaptively determined and the best topology of active set is selected...
Wireless sensor networks have attracted much attention recently with ubiquitous or ad hoc applications. Wireless sensor nodes may be deployed on some fields and organize themselves in a large scale ad hoc network. A path diversity is an effective technique to get highly reliable communications in the sensor networks. In this paper, the capacity and cutoff rate of binary tree network composed of BSC...
The localization problem consists in estimating the position of the nodes within the network. This is a crucial issue for location-dependant applications. This paper presents an implementation of a localization scheme based only on the received signal strength (SS) in a Zigbee-based sensor network. This is done by taking advantage of the inherent radio communication capability present in each node...
In this paper, we introduce a new type of coverage for wireless sensor networks, called Directed Coverage (D-coverage). Basically, D-coverage is the coverage provided by a sensor network monitoring an area between two boundaries, through which the intruder attempts to penetrates the area. We also study how to measure the quality of D-coverage. Our first evaluation approach is a projection-based simple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.