Professional Documents
Culture Documents
Introduction
Wireless Sensor Networks have recently emerged as a premier research topic.
They have great long term economic potential, ability to transform lives, and pose
many system - building challenges. Wireless sensor networks also pose a number
of new conceptual and optimization problems, such as deployment, location and
tracking, are fundamental issues, in that many applications rely on them for needed
information. Coverage basically, answers the questions about quality of service
(surveillance) that can be provided by a particular sensor network. The integration
of several types of sensors such as seismic, optical, acoustic etc. in one network
platform and the study of the overall coverage of the system also presents many
interesting challenges. With the refinement of energy harvesting techniques that
can gather useful energy from blasts of radio energy, vibrations and the like, self-
powered circuitry is a real possibility, with networks of millions of nodes,
deployed through injections, paintbrushes and aircraft. Also, the introduction of an
additional type of sensor node allowing the network to self-organize by embedding
adaptive and smart algorithms. While on the other hand, the use of adaptive power
control in IP networks that utilizes reactive routing protocols and sleep - mode
operation, more powerful mobile agents, QoS (Quality of Service) to guarantee
delivery, robustness, security mechanisms, and fault- tolerance. Wireless sensors
have become an excellent tool for military applications involving intrusion
detection, perimeter monitoring, and information gathering and smart logistics
support in an unknown deployed area. Other applications include sensor-based
personal health monitor,
location detection with sensor networks and movement detection.
II. Characteristics of Wireless Sensor Networks
The nodes in WSN have only limited energy and the nodes can harvest
the energy from the environment.
Communication failures
When the nodes moves away from communication range of the
neighbor then the communication failure will happen.
Heterogeneity of nodes
Nodes in WSN can have different properties like communication
range, energy required for reception and transmission and so on.
Scalability to large scale of deployment
Large number of nodes can be deployed using various topology.
Ability to withstand harsh environmental conditions
Sensor can be active under harsh environmental conditions like in
thermal power plant.
Ease of use
WSN can be used for any application and they are easy to use.
A. Design Issues:
Fault–tolerant Communication: Due to the deployment of sensor nodes in an
uncontrolled or harsh environment, it is not uncommon for the sensor nodes to
become faulty and unreliable
Low latency: The events which the framework deals with are urgent which
should be recognized
immediately by the operator. Therefore, the framework has to detect and notify the
events quickly as soon as possible.
Scalability: A system, whose performance improves after adding hardware,
proportionally to the capacity added, is said to be a scalable system. The number of
sensor nodes deployed in the sensing area may be in the order of hundreds or
thousands, or more.
Transmission Media: In a multi-hop sensor network, communicating nodes are
linked by a wireless medium. The traditional problems associated with a wireless
channel (e.g., fading, high error rate) may also affect the operation of the sensor
network.
Coverage Problems: One fundamental problem in wireless sensor networks is
the coverage problem, which reflects the quality of service that can be provided by
a particular sensor network. The coverage problem is defined from several points
of view due to a variety of sensor networks and a wide - range of their applications.
B. Topology Issues
Geographic Routing: Geographic routing is a routing principle that relies on
geographic position information. It is mainly proposed for wireless networks and
based on the idea that the source sends a message to the geographic location of the
destination instead of using the network address.
Sensor Holes: A routing hole consists of a region in the sensor network, where
either node are not available or the available nodes cannot participate in the actual
routing of the data due to various possible reasons. The task of identifying holes is
especially challenging since typical wireless sensor networks consist of
lightweight, Low - capability nodes that are unaware of their geographic location.
D. Management at a Distance
Sensor nodes will be deployed at our door field such as a subway station. It is
difficult for managers or operators to manage the network directly. Thus the
framework should provide an indirect remote control/ management system.
V. Fuzzy logic
A. Fuzzy logic
It is a form of many-valued logic in which the truth values of variables may be any
real number between 0 and 1. It is employed to handle the concept of partial truth,
where the truth value may range between completely true and completely false. By
contrast, in Boolean logic, the truth values of variables may only be the integer
values 0 or 1.
B. Lingustic Variables
While variables in mathematics usually take numerical values, in fuzzy logic
applications non-numeric values are often used to facilitate the expression of rules
and facts.
A linguistic variable such as age may accept values such as young and its antonym
old. Because natural languages do not always contain enough value terms to
express a fuzzy value scale, it is common practice to modify linguistic values with
adjectives or adverbs. For example, we can use the hedges rather and somewhat to
construct the additional values rather old or somewhat young.
C. Fuzzification
Fuzzification is the process of changing a real scalar value into a fuzzy value.
This is achieved with the different types of fuzzifiers (membership functions).
The simplest membership functions are formed using straight lines. The simplest is
the triangular membership function, and it has the function name trimf.
The trapezoidal membership function, trapmf, has a flat top and really is just a
truncated triangle curve. These straight line membership functions have the
advantage of simplicity.
Two membership functions are built on the Gaussian distribution curve: a simple
Gaussian curve and a two-sided composite of two different Gaussian curves. The
two functions are gaussmf and gauss2mf. The generalized bell membership has
the function name gbellmf.
Because of their smoothness and concise notation, Gaussian and bell membership
functions are popular methods for specifying fuzzy sets. Both of these curves have
the advantage of being smooth and nonzero at all points.
Although the Gaussian membership functions and bell membership functions
achieve smoothness, they are unable to specify asymmetric membership functions,
which are important in certain applications.
the sigmoidal membership function is defined, which is either open left or right.
Asymmetric and closed (i.e. not open to the left or right) membership functions can
be synthesized using two sigmoidal functions, so in addition to the basic sigmf,
you also have the difference between two sigmoidal functions, dsigmf, and the
product of two sigmoidal functions psigmf.
Polynomial based curves account for several of the membership functions in the
toolbox. Three related membership functions are the Z, S, and Pi curves, all
named because of their shape. The function zmf is the asymmetrical polynomial
curve open to the left, smf is the mirror-image function that opens to the right, and
pimf is zero on both extremes with a rise in the middle.
D. Defuzzification
Weighted Average Method
This method is valid for fuzzy sets with symmetrical output membership functions
and produces results very close to the COA method. This method is less
computationally intensive. Each membership function is weighted by its
maximum membership value. The defuzzified value is defined as :
∑ 𝒎(𝒙). 𝒙
𝑪𝑭 =
∑ 𝒎(𝒙)
Here ∑ denotes the algebraic summation and x is the element with maximum
membership function.
APPLICATION OF WIRELESS SENSOR NETWORKS
WSN are collections of compact-size ,relatively inexpensive computational nodes that measure local
environments conditions or other parameters and forward such information to a central point for
appropriate processing .WSNs nodes(WSN) can sense the environment ,can communicate with neighbor
nodes ,and can ,in many cases ,perform basic computations on the data being collected .WSNs support
a wide range of useful applications. It has so many real time applications like Area monitoring,
Environmental sensing, Air pollution monitoring ,Forest fires detection, Greenhouse monitoring,
Landslide detection, Machine health monitoring, etc.
HOME CONTROL
Home control applications provide control, conservation, convenience, and safety, as follows
MEDICAL APPLICATIONS
A number of hospitals and medical centers are exploring applications of WSN technology to
a range of medical applications, including pre-hospital and in-hospital emergency care,
disaster response, and stroke patient rehabilitation. WSNs have the potential to affect the
delivery and study of resuscitative care by allowing vital signs to be collected and integrated
automatically into the patient care record and used for real-time triage, correlation with
hospital records, and long-term observation. WSNs permit home monitoring for chronic and
elderly patients, facilitating long-term care and trend analysis; this is in turn can sometimes
reduce the length of the hospital stays. WSNs also permit collection of long-term medical
information that populates database of clinical data; this enables longitudinal studies across
populations and allows physicians to study the effects of medical intervention programs.
MILTARY SURVEILLANCE:
WSNs can replace single high-cost sensor assets with large arrays distributed sensors for
both security and surveillance application. The WSN node are smaller and more capable of
than sensor assets presently in the inventory; the added feature of robust, situation.
Distributed sensing has the additional advantages of being able to provide redundant and
hence highly reliable information on threats as well as the ability to localize threats by both
coherent and incoherent processing among the distributed sensor nodes WSNs can be used
in traditional sensor network applications for large area and perimeter monitoring and will
ultimately enable every platoon, squad, and soldier to deploy WSNs to accomplish a
number of mission and self-production.