首页 > 最新文献

Wirel. Sens. Netw.最新文献

英文 中文
Performance Analysis of Downlink MIMO WCDMA Systems Using Antenna Selection in Transmitter and MRC Plus LDD in Receiver over Correlated Nakagami-Fading Channels 相关中上衰落信道下使用发射机天线选择和接收机MRC + LDD的MIMO WCDMA系统性能分析
Pub Date : 2010-07-08 DOI: 10.4236/wsn.2010.27067
S. Ghavami, Mahmood Mohassel Feghhi, B. Abolhassani
In this paper bit error rate (BER) performance is analyzed for multiple input-multiple output (MIMO) communications systems using antenna selection in the transmitter, maximal ratio combining (MRC) and linear de-correlating detector (LDD) in the receiver in wide band code division multiple access (WCDMA) downlink channels with correlated Nakagami fading. The MRC maximizes signal to noise ratio of the received signal, then the LDD cancels out multiple access interference (MAI). Theoretical results are validated using computer simulations. Moreover, a pilot based estimation method is proposed to jointly estimate the channel gains and the rows of the LDD operator. Simulation results show that using this proposed method, diversity order is maintained in the receiver. Furthermore, our analysis shows the spectral efficiency degradation due to the pilot based strategy is negligible.
本文分析了在具有相关中川衰落的宽带码分多址(WCDMA)下行信道中,采用发射机天线选择、最大比组合(MRC)和接收机线性去相关检测器(LDD)的多输入多输出(MIMO)通信系统的误码率(BER)性能。MRC最大化接收信号的信噪比,然后LDD消除多址干扰(MAI)。通过计算机仿真验证了理论结果。在此基础上,提出了一种基于导频估计的信道增益和LDD算子行数联合估计方法。仿真结果表明,采用该方法可以保持接收机内的分集顺序。此外,我们的分析表明,由于基于导频的策略频谱效率的下降是可以忽略不计的。
{"title":"Performance Analysis of Downlink MIMO WCDMA Systems Using Antenna Selection in Transmitter and MRC Plus LDD in Receiver over Correlated Nakagami-Fading Channels","authors":"S. Ghavami, Mahmood Mohassel Feghhi, B. Abolhassani","doi":"10.4236/wsn.2010.27067","DOIUrl":"https://doi.org/10.4236/wsn.2010.27067","url":null,"abstract":"In this paper bit error rate (BER) performance is analyzed for multiple input-multiple output (MIMO) communications systems using antenna selection in the transmitter, maximal ratio combining (MRC) and linear de-correlating detector (LDD) in the receiver in wide band code division multiple access (WCDMA) downlink channels with correlated Nakagami fading. The MRC maximizes signal to noise ratio of the received signal, then the LDD cancels out multiple access interference (MAI). Theoretical results are validated using computer simulations. Moreover, a pilot based estimation method is proposed to jointly estimate the channel gains and the rows of the LDD operator. Simulation results show that using this proposed method, diversity order is maintained in the receiver. Furthermore, our analysis shows the spectral efficiency degradation due to the pilot based strategy is negligible.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127309208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information-Driven Collaborative Processing for Diffusive Source Estimation in Wireless Sensor Networks 无线传感器网络中扩散源估计的信息驱动协同处理
Pub Date : 2010-07-08 DOI: 10.4236/wsn.2010.27068
Hossein Khonsari, M. Kahaei
This paper discusses an accurate distributed algorithm for diffusive source localization while maintaining the low energy consumption of sensor nodes in wireless sensor networks. In this algorithm, the sensor selection scheme based on the information utility measure is used. To update the estimation in each selected node, a neighborhood radius equal to the communication range of the sensor nodes is defined and all sensors located in the neighborhood circle, whose radius is equal to the neighborhood radius and the selected node is its centre, collaborate their information. To decrease the energy consumption, the neighborhood radius is reduced gradually based on the error covariance value of the estimation. In addition, this paper includes a new method for the initial point calculation which is important in the recursive methods used for distributed algorithms in wireless sensor networks. Numerical examples are used to study the performance of the algorithms. Simulation results show the accuracy of the new algorithm becomes better while its energy consumption is low enough.
本文讨论了一种精确的分布式算法,在保证无线传感器网络中传感器节点低能耗的前提下,实现扩散源定位。该算法采用了基于信息效用度量的传感器选择方案。为了更新每个所选节点的估计,定义一个等于传感器节点通信范围的邻域半径,并以所选节点为其中心的半径等于邻域半径的邻域圆内的所有传感器相互协作。为了降低能量消耗,基于估计的误差协方差值逐步减小邻域半径。此外,本文还提出了一种新的初始点计算方法,该方法在用于无线传感器网络分布式算法的递归方法中具有重要意义。通过数值算例对算法的性能进行了研究。仿真结果表明,该算法在保证较低的能量消耗的同时,具有较好的精度。
{"title":"Information-Driven Collaborative Processing for Diffusive Source Estimation in Wireless Sensor Networks","authors":"Hossein Khonsari, M. Kahaei","doi":"10.4236/wsn.2010.27068","DOIUrl":"https://doi.org/10.4236/wsn.2010.27068","url":null,"abstract":"This paper discusses an accurate distributed algorithm for diffusive source localization while maintaining the low energy consumption of sensor nodes in wireless sensor networks. In this algorithm, the sensor selection scheme based on the information utility measure is used. To update the estimation in each selected node, a neighborhood radius equal to the communication range of the sensor nodes is defined and all sensors located in the neighborhood circle, whose radius is equal to the neighborhood radius and the selected node is its centre, collaborate their information. To decrease the energy consumption, the neighborhood radius is reduced gradually based on the error covariance value of the estimation. In addition, this paper includes a new method for the initial point calculation which is important in the recursive methods used for distributed algorithms in wireless sensor networks. Numerical examples are used to study the performance of the algorithms. Simulation results show the accuracy of the new algorithm becomes better while its energy consumption is low enough.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121058573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries 炼油厂控制系统的多层安全策略研究
Pub Date : 2010-07-08 DOI: 10.4236/wsn.2010.27064
M. K. Mahmood, F. Al-Naima
The energy industry and in particular the Oil Refineries are extremely important elements in Iraq’s infrastructure. A terrorist attack on one oil refinery will have a catastrophic impact on oil production and the whole economy. It can also cause serious damage to the environment and even losses of human lives. The security of information systems and industrial control systems such as Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control System (DCS) used in the oil industry is a major part of infrastructure protection strategy. This paper describes an attempt to use several security procedures to design a secure, robust system for the SCADA and DCS systems currently in use in the North Oil Refinery in the city of Baiji located in northern Iraq.
能源工业,特别是炼油厂是伊拉克基础设施中极其重要的组成部分。对一家炼油厂的恐怖袭击将对石油生产和整个经济产生灾难性的影响。它还会对环境造成严重破坏,甚至造成生命损失。石油工业中使用的监控与数据采集(SCADA)系统和分布式控制系统(DCS)等信息系统和工业控制系统的安全是基础设施保护战略的重要组成部分。本文介绍了为伊拉克北部Baiji市北部炼油厂目前使用的SCADA和DCS系统设计一个安全、健壮的系统的尝试。
{"title":"Developing a Multi-Layer Strategy for Securing Control Systems of Oil Refineries","authors":"M. K. Mahmood, F. Al-Naima","doi":"10.4236/wsn.2010.27064","DOIUrl":"https://doi.org/10.4236/wsn.2010.27064","url":null,"abstract":"The energy industry and in particular the Oil Refineries are extremely important elements in Iraq’s infrastructure. A terrorist attack on one oil refinery will have a catastrophic impact on oil production and the whole economy. It can also cause serious damage to the environment and even losses of human lives. The security of information systems and industrial control systems such as Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control System (DCS) used in the oil industry is a major part of infrastructure protection strategy. This paper describes an attempt to use several security procedures to design a secure, robust system for the SCADA and DCS systems currently in use in the North Oil Refinery in the city of Baiji located in northern Iraq.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126824712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm 基于EM算法的无线传感器网络无源损耗推断
Pub Date : 2010-07-08 DOI: 10.4236/wsn.201027063
Yu Yang, Zhulin An, Yongjun Xu, Xiaowei Li, Canfeng Chen
Wireless Sensor Networks (WSNs) are mainly deployed for data acquisition, thus, the network performance can be passively measured by exploiting whether application data from various sensor nodes reach the sink. In this paper, therefore, we take into account the unique data aggregation communication paradigm of WSNs and model the problem of link loss rates inference as a Maximum-Likelihood Estimation problem. And we propose an inference algorithm based on the standard Expectation-Maximization (EM) techniques. Our algorithm is applicable not only to periodic data collection scenarios but to event detection scenarios. Finally, we validate the algorithm through simulations and it exhibits good performance and scalability.
无线传感器网络(WSNs)主要用于数据采集,因此可以通过利用来自各个传感器节点的应用数据是否到达接收器来被动地衡量网络性能。因此,在本文中,我们考虑到无线传感器网络独特的数据聚合通信模式,并将链路损失率推理问题建模为最大似然估计问题。提出了一种基于标准期望最大化(EM)技术的推理算法。该算法不仅适用于周期性数据采集场景,也适用于事件检测场景。最后,通过仿真对算法进行了验证,结果表明该算法具有良好的性能和可扩展性。
{"title":"Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm","authors":"Yu Yang, Zhulin An, Yongjun Xu, Xiaowei Li, Canfeng Chen","doi":"10.4236/wsn.201027063","DOIUrl":"https://doi.org/10.4236/wsn.201027063","url":null,"abstract":"Wireless Sensor Networks (WSNs) are mainly deployed for data acquisition, thus, the network performance can be passively measured by exploiting whether application data from various sensor nodes reach the sink. In this paper, therefore, we take into account the unique data aggregation communication paradigm of WSNs and model the problem of link loss rates inference as a Maximum-Likelihood Estimation problem. And we propose an inference algorithm based on the standard Expectation-Maximization (EM) techniques. Our algorithm is applicable not only to periodic data collection scenarios but to event detection scenarios. Finally, we validate the algorithm through simulations and it exhibits good performance and scalability.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks 基于争用的无线传感器网络无信标实时路由协议
Pub Date : 2010-07-08 DOI: 10.4236/wsn.201027065
Chao-Ying Huang, Guoli Wang
This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.
针对无线传感器网络,提出了一种新的低能耗实时路由协议CBRR。通过集成争用和邻居表机制,满足端到端的实时需求,并对每一跳的速度或延迟进行约束。更准确地说,CBRR通过依赖无线广播而不是信标的争用机制来维护邻居表。综合仿真结果表明,CBRR算法不仅在静态网络中具有较高的性能,而且在动态网络中也能很好地工作。
{"title":"Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks","authors":"Chao-Ying Huang, Guoli Wang","doi":"10.4236/wsn.201027065","DOIUrl":"https://doi.org/10.4236/wsn.201027065","url":null,"abstract":"This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for wireless sensor networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention mechanism being dependent on wireless broadcast instead of beacons. Comprehensive simulations show that CBRR can not only achieve higher performance in static networks, but also work well for dynamic networks.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Modelling and Analysis of TCP Performance in Wireless Multihop Networks 无线多跳网络中TCP性能建模与分析
Pub Date : 2010-07-08 DOI: 10.4236/wsn.201027061
Hannan Xiao, Ying Zhang, J. Malcolm, B. Christianson, K. Chua
Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this environment. By examining the case of running one TCP session over a string topology, a system model for analyzing TCP performance in multihop wireless networks is proposed, which considers packet buffering, contention of nodes for access to the wireless channel, and spatial reuse of the wireless channel. Markov chain modelling is applied to analyze this system model. Analytical results show that when the number of hops that the TCP session crosses is ?xed, the TCP throughput is independent of the TCP congestion window size. When the number of hops increases from one, the TCP throughput decreases ?rst, and then stabilizes when the number of hops becomes large. The analysis is validated by comparing the numerical and simulation results.
研究人员已经使用了大量的模拟和实验研究来了解TCP在无线多跳网络中的性能。相比之下,本文的目的是从理论上分析TCP在这种环境下的性能。通过研究在字符串拓扑上运行一个TCP会话的情况,提出了一个用于分析多跳无线网络中TCP性能的系统模型,该模型考虑了数据包缓冲、访问无线信道的节点争用以及无线信道的空间重用。采用马尔可夫链模型对系统模型进行了分析。分析结果表明,当TCP会话跨越的跳数被限制时,TCP吞吐量与TCP拥塞窗口大小无关。当跳数从1开始增加时,TCP吞吐量首先下降,跳数增加后趋于稳定。通过数值与仿真结果的对比,验证了分析的正确性。
{"title":"Modelling and Analysis of TCP Performance in Wireless Multihop Networks","authors":"Hannan Xiao, Ying Zhang, J. Malcolm, B. Christianson, K. Chua","doi":"10.4236/wsn.201027061","DOIUrl":"https://doi.org/10.4236/wsn.201027061","url":null,"abstract":"Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this environment. By examining the case of running one TCP session over a string topology, a system model for analyzing TCP performance in multihop wireless networks is proposed, which considers packet buffering, contention of nodes for access to the wireless channel, and spatial reuse of the wireless channel. Markov chain modelling is applied to analyze this system model. Analytical results show that when the number of hops that the TCP session crosses is ?xed, the TCP throughput is independent of the TCP congestion window size. When the number of hops increases from one, the TCP throughput decreases ?rst, and then stabilizes when the number of hops becomes large. The analysis is validated by comparing the numerical and simulation results.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129661251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Classification and Review of Security Schemes in Mobile Computing 移动计算安全方案的分类与综述
Pub Date : 2010-06-24 DOI: 10.4236/wsn.2010.26054
Sathish A. P. Kumar
In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.
本文对移动计算系统中的安全方案进行了分类和综述。我们根据移动计算系统——移动自组织网络(MANET)和移动代理模型中使用的基础设施类型对这些方案进行了分类。移动自组织网络无处不在,没有任何集中的权威。这些独特的特性,再加上不断增加的安全威胁,需要在部署到商业和军事应用之前,解决方案来保护自组织网络。本文综述了当前移动自组织网络的安全威胁、现有的解决方案、它们的局限性和有待研究的问题。我们还解释了入侵检测和响应技术作为保护基于MANET的移动计算系统及其方法的替代方法。对现有的入侵检测方法和入侵响应方法进行了综述。本文还介绍了现有的MANET入侵检测和响应方法的局限性,以及在提供MANET安全性方面的开放性研究问题。针对基于Mobile Agent的移动计算系统,给出了基于Mobile Agent模型的各种类型的安全攻击的分类,并给出了各种方案针对这些类型的攻击提出的安全解决方案,以及为基于Mobile Agent的移动计算系统提供安全方面的开放性研究问题。这样的分类有助加深对流动计算系统内建议的保安方案的了解,有助日后发展和加强保安方案,并有助在实施流动计算系统时选择适当的方案。
{"title":"Classification and Review of Security Schemes in Mobile Computing","authors":"Sathish A. P. Kumar","doi":"10.4236/wsn.2010.26054","DOIUrl":"https://doi.org/10.4236/wsn.2010.26054","url":null,"abstract":"In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Energy Conservation Challenges in Wireless Sensor Networks: A Comprehensive Study 无线传感器网络中的节能挑战:综合研究
Pub Date : 2010-06-24 DOI: 10.4236/wsn.2010.26060
S. Tarannum
A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Research in WSNs has become an extensive explorative area during the last few years, especially due to the challenges offered, energy constraints of the sensors being one of them. In this paper, a thorough comprehensive study of the energy conservation challenges in wireless sensor networks is carried out. The need for effective utilization of limited power resources is also emphasized, which becomes pre-eminent to the Wireless Sensor Networks.
无线传感器网络(WSN)由大量随机部署的传感器节点组成。这些传感器节点组织成一个协作网络,并执行传感、计算和通信三个基本功能。近年来,无线传感器网络的研究已成为一个广泛的探索领域,特别是由于传感器的能量限制等挑战。本文对无线传感器网络中的节能挑战进行了全面深入的研究。有效利用有限的电力资源的必要性也被强调,这成为无线传感器网络的首要任务。
{"title":"Energy Conservation Challenges in Wireless Sensor Networks: A Comprehensive Study","authors":"S. Tarannum","doi":"10.4236/wsn.2010.26060","DOIUrl":"https://doi.org/10.4236/wsn.2010.26060","url":null,"abstract":"A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Research in WSNs has become an extensive explorative area during the last few years, especially due to the challenges offered, energy constraints of the sensors being one of them. In this paper, a thorough comprehensive study of the energy conservation challenges in wireless sensor networks is carried out. The need for effective utilization of limited power resources is also emphasized, which becomes pre-eminent to the Wireless Sensor Networks.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128726234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter 用指数采样滤波器重构无线UWB脉冲
Pub Date : 2010-06-24 DOI: 10.4236/wsn.2010.26057
J. Olkkonen, H. Olkkonen
Measurement and reconstruction of wireless pulses is an important scheme in wireless ultra wide band (UWB) technology. In contrary to the band-limited analog signals, which can be recovered from evenly spaced samples, the reconstruction of the UWB pulses is a more demanding task. In this work we describe an exponential sampling filter (ESF) for measurement and reconstruction of UWB pulses. The ESF is constructed from parallel filters, which has exponentially descending impulse response. A pole cancellation filter was used to extract the amplitudes and time locations of the UWB pulses from sequentially measured samples of the ESF output. We show that the amplitudes and time locations of p sequential UWB pulses can be recovered from the measurement of at least 2p samples from the ESF output. For perfect reconstruction the number of parallel filters in ESP should be 2p. We study the robustness of the method against noise and discuss the applications of the method.
无线脉冲的测量与重构是无线超宽带(UWB)技术中的一个重要方案。与可以从均匀间隔的样本中恢复的带限模拟信号相反,UWB脉冲的重建是一项要求更高的任务。在这项工作中,我们描述了一个指数采样滤波器(ESF)用于测量和重建UWB脉冲。ESF由并联滤波器构成,其脉冲响应呈指数递减。采用极点抵消滤波器从连续测量的ESF输出样本中提取超宽带脉冲的幅度和时间位置。我们证明了p个连续UWB脉冲的幅度和时间位置可以从ESF输出的至少2p个样本的测量中恢复出来。为了实现完美的重构,ESP中平行滤波器的个数应该是2p。研究了该方法对噪声的鲁棒性,并讨论了该方法的应用。
{"title":"Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter","authors":"J. Olkkonen, H. Olkkonen","doi":"10.4236/wsn.2010.26057","DOIUrl":"https://doi.org/10.4236/wsn.2010.26057","url":null,"abstract":"Measurement and reconstruction of wireless pulses is an important scheme in wireless ultra wide band (UWB) technology. In contrary to the band-limited analog signals, which can be recovered from evenly spaced samples, the reconstruction of the UWB pulses is a more demanding task. In this work we describe an exponential sampling filter (ESF) for measurement and reconstruction of UWB pulses. The ESF is constructed from parallel filters, which has exponentially descending impulse response. A pole cancellation filter was used to extract the amplitudes and time locations of the UWB pulses from sequentially measured samples of the ESF output. We show that the amplitudes and time locations of p sequential UWB pulses can be recovered from the measurement of at least 2p samples from the ESF output. For perfect reconstruction the number of parallel filters in ESP should be 2p. We study the robustness of the method against noise and discuss the applications of the method.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Practical Considerations for Wireless Sensor Network Algorithms 无线传感器网络算法的实际考虑
Pub Date : 2010-06-24 DOI: 10.4236/wsn.2010.26055
G. Halkes, K. Langendoen
Many researchers from different backgrounds have found interesting research challenges that arise from the physical constraints and envisaged applications in Wireless Sensor Networks (WSNs). The WSN community that has formed over the years is divided into two sub-communities: the systems sub-community and the theory sub-community. However, there seems to be no connection between the two. Algorithms developed from a theoretic perspective are rarely implemented on real hardwares. In this paper we identify the most important reasons why these algorithms are disregarded by the systems sub-community, and provide pointers to remedy the lack of connection.
许多来自不同背景的研究人员发现了无线传感器网络(WSNs)中物理限制和设想应用所带来的有趣的研究挑战。多年来形成的WSN社区分为两个子社区:系统子社区和理论子社区。然而,这两者之间似乎没有联系。从理论角度开发的算法很少在实际硬件上实现。在本文中,我们确定了这些算法被系统子社区忽视的最重要原因,并提供了纠正缺乏连接的指导。
{"title":"Practical Considerations for Wireless Sensor Network Algorithms","authors":"G. Halkes, K. Langendoen","doi":"10.4236/wsn.2010.26055","DOIUrl":"https://doi.org/10.4236/wsn.2010.26055","url":null,"abstract":"Many researchers from different backgrounds have found interesting research challenges that arise from the physical constraints and envisaged applications in Wireless Sensor Networks (WSNs). The WSN community that has formed over the years is divided into two sub-communities: the systems sub-community and the theory sub-community. However, there seems to be no connection between the two. Algorithms developed from a theoretic perspective are rarely implemented on real hardwares. In this paper we identify the most important reasons why these algorithms are disregarded by the systems sub-community, and provide pointers to remedy the lack of connection.","PeriodicalId":251051,"journal":{"name":"Wirel. Sens. Netw.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Wirel. Sens. Netw.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1