Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 25
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
ACS ES T Water ; 4(4): 1564-1578, 2024 Apr 12.
Artigo em Inglês | MEDLINE | ID: mdl-38633371

RESUMO

This study provides a comprehensive investigation of the impact of disinfection byproducts (DBPs) on human health, with a particular focus on DBPs present in chlorinated drinking water, concentrating on three primary DBP categories (aliphatic, alicyclic, and aromatic). Additionally, it explores pivotal factors influencing DBP formation, encompassing disinfectant types, water source characteristics, and environmental conditions, such as the presence of natural materials in water. The main objective is to discern the most hazardous DBPs, considering criteria such as regulation standards, potential health impacts, and chemical diversity. It provides a catalog of 63 key DBPs alongside their corresponding parameters. From this set, 28 compounds are meticulously chosen for in-depth analysis based on the above criteria. The findings strive to guide the advancement of water treatment technologies and intelligent sensory systems for the efficient water quality surveillance. This, in turn, enables reliable DBP detection within water distribution networks. By enriching the understanding of DBP-associated health hazards and offering valuable insights, this research is aimed to contribute to influencing policy-making in regulations and treatment strategies, thereby protecting public health and improving safety related to chlorinated drinking water quality.

2.
Sensors (Basel) ; 23(22)2023 Nov 07.
Artigo em Inglês | MEDLINE | ID: mdl-38005419

RESUMO

The proliferation of Internet of Things (IoT) applications is rapidly expanding, generating increased interest in the incorporation of blockchain technology within the IoT ecosystem. IoT applications enhance the efficiency of our daily lives, and when blockchain is integrated into the IoT ecosystem (commonly referred to as a blockchain-IoT system), it introduces crucial elements, like security, transparency, trust, and privacy, into IoT applications. Notably, potential domains where blockchain can empower IoT applications include smart logistics, smart health, and smart cities. However, a significant obstacle hindering the widespread adoption of blockchain-IoT systems in mainstream applications is the absence of a dedicated governance framework. In the absence of proper regulations and due to the inherently cryptic nature of blockchain technology, it can be exploited for nefarious purposes, such as ransomware, money laundering, fraud, and more. Furthermore, both blockchain and the IoT are relatively new technologies, and the absence of well-defined governance structures can erode confidence in their use. Consequently, to fully harness the potential of integrating blockchain-IoT systems and ensure responsible utilization, governance plays a pivotal role. The implementation of appropriate regulations and standardization is imperative to leverage the innovative features of blockchain-IoT systems and prevent misuse for malicious activities. This research focuses on elucidating the significance of blockchain within governance mechanisms, explores governance tailored to blockchain, and proposes a robust governance framework for the blockchain-enabled IoT ecosystem. Additionally, the practical application of our governance framework is showcased through a case study in the realm of smart logistics. We anticipate that our proposed governance framework will not only facilitate but also promote the integration of blockchain and the IoT in various application domains, fostering a more secure and trustworthy IoT landscape.

3.
PLoS One ; 18(4): e0284554, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37058516

RESUMO

Detection of fatigue helps prevent injuries and optimize the performance of horses. Previous studies tried to determine fatigue using physiological parameters. However, measuring the physiological parameters, e.g., plasma lactate, is invasive and can be affected by different factors. In addition, the measurement cannot be done automatically and requires a veterinarian for sample collection. This study investigated the possibility of detecting fatigue non-invasively using a minimum number of body-mounted inertial sensors. Using the inertial sensors, sixty sport horses were measured during walk and trot before and after high and low-intensity exercises. Then, biomechanical features were extracted from the output signals. A number of features were assigned as important fatigue indicators using neighborhood component analysis. Based on the fatigue indicators, machine learning models were developed for classifying strides to non-fatigue and fatigue. As an outcome, this study confirmed that biomechanical features can indicate fatigue in horses, such as stance duration, swing duration, and limb range of motion. The fatigue classification model resulted in high accuracy during both walk and trot. In conclusion, fatigue can be detected during exercise by using the output of body-mounted inertial sensors.


Assuntos
Marcha , Caminhada , Cavalos , Animais , Marcha/fisiologia , Caminhada/fisiologia , Extremidades , Aprendizado de Máquina , Fenômenos Biomecânicos
4.
Sensors (Basel) ; 21(5)2021 Mar 05.
Artigo em Inglês | MEDLINE | ID: mdl-33808037

RESUMO

Processing IoT applications directly in the cloud may not be the most efficient solution for each IoT scenario, especially for time-sensitive applications. A promising alternative is to use fog and edge computing, which address the issue of managing the large data bandwidth needed by end devices. These paradigms impose to process the large amounts of generated data close to the data sources rather than in the cloud. One of the considerations of cloud-based IoT environments is resource management, which typically revolves around resource allocation, workload balance, resource provisioning, task scheduling, and QoS to achieve performance improvements. In this paper, we review resource management techniques that can be applied for cloud, fog, and edge computing. The goal of this review is to provide an evaluation framework of metrics for resource management algorithms aiming at the cloud/fog and edge environments. To this end, we first address research challenges on resource management techniques in that domain. Consequently, we classify current research contributions to support in conducting an evaluation framework. One of the main contributions is an overview and analysis of research papers addressing resource management techniques. Concluding, this review highlights opportunities of using resource management techniques within the cloud/fog/edge paradigm. This practice is still at early development and barriers need to be overcome.

5.
Sensors (Basel) ; 21(5)2021 Mar 06.
Artigo em Inglês | MEDLINE | ID: mdl-33800712

RESUMO

Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.

6.
Sensors (Basel) ; 21(3)2021 Jan 26.
Artigo em Inglês | MEDLINE | ID: mdl-33530288

RESUMO

Speed is an essential parameter in biomechanical analysis and general locomotion research. It is possible to estimate the speed using global positioning systems (GPS) or inertial measurement units (IMUs). However, GPS requires a consistent signal connection to satellites, and errors accumulate during IMU signals integration. In an attempt to overcome these issues, we have investigated the possibility of estimating the horse speed by developing machine learning (ML) models using the signals from seven body-mounted IMUs. Since motion patterns extracted from IMU signals are different between breeds and gaits, we trained the models based on data from 40 Icelandic and Franches-Montagnes horses during walk, trot, tölt, pace, and canter. In addition, we studied the estimation accuracy between IMU locations on the body (sacrum, withers, head, and limbs). The models were evaluated per gait and were compared between ML algorithms and IMU location. The model yielded the highest estimation accuracy of speed (RMSE = 0.25 m/s) within equine and most of human speed estimation literature. In conclusion, highly accurate horse speed estimation models, independent of IMU(s) location on-body and gait, were developed using ML.


Assuntos
Marcha , Caminhada , Animais , Fenômenos Biomecânicos , Cavalos , Aprendizado de Máquina , Tronco
7.
Sensors (Basel) ; 20(22)2020 Nov 21.
Artigo em Inglês | MEDLINE | ID: mdl-33233426

RESUMO

The sooner disruptive emergent behaviors are detected, the sooner preventive measures can be taken to ensure the resilience of business processes execution. Therefore, organizations need to prepare for emergent behaviors by embedding corrective control mechanisms, which help coordinate organization-wide behavior (and goals) with the behavior of local autonomous entities. Ongoing technological advances, brought by the Industry 4.0 and cyber-physical systems of systems paradigms, can support integration within complex enterprises, such as supply chains. In this paper, we propose a reference enterprise architecture for the detection and monitoring of emergent behaviors in enterprises. We focus on addressing the need for an adequate reaction to disruptions. Based on a systematic review of the literature on the topic of current architectural designs for understanding emergent behaviors, we distill architectural requirements. Our architecture is a hybrid as it combines distributed autonomous business logic (expressed in terms of simple business rules) and some central control mechanisms. We exemplify the instantiation and use of this architecture by means of a proof-of-concept implementation, using a multimodal logistics case study. The obtained results provide a basis for achieving supply chain resilience "by design", i.e., through the design of coordination mechanisms that are well equipped to absorb and compensate for the effects of emergent disruptive behaviors.

8.
Sensors (Basel) ; 18(7)2018 Jul 18.
Artigo em Inglês | MEDLINE | ID: mdl-30021980

RESUMO

Compressive sensing originates in the field of signal processing and has recently become a topic of energy-efficient data gathering in wireless sensor networks. In this paper, we propose an energy efficient distributed compressive sensing solution for sensor networks. The proposed solution utilizes sparsity distribution of signals to group sensor nodes into several coalitions and then implements localized compressive sensing inside coalitions. This solution improves data-gathering performance in terms of both data accuracy and energy consumption. The approach curbs both data-transmission costs and number of measurements. Coalition-based data gathering cuts transmission costs, and the number of measurements is reduced by scheduling sensor nodes and adjusting their sampling frequency. Our simulation showed that our approach enhances network performance by minimizing energy cost and improving data accuracy.

9.
Sensors (Basel) ; 18(5)2018 May 08.
Artigo em Inglês | MEDLINE | ID: mdl-29738501

RESUMO

Between 1960 and 1990, 95% of the black rhino population in the world was killed. In South Africa, a rhino was killed every 8 h for its horn throughout 2016. Wild animals, rhinos and elephants, in particular, are facing an ever increasing poaching crisis. In this paper, we review poaching detection technologies that aim to save endangered species from extinction. We present requirements for effective poacher detection and identify research challenges through the survey. We describe poaching detection technologies in four domains: perimeter based, ground based, aerial based, and animal tagging based technologies. Moreover, we discuss the different types of sensor technologies that are used in intruder detection systems such as: radar, magnetic, acoustic, optic, infrared and thermal, radio frequency, motion, seismic, chemical, and animal sentinels. The ultimate long-term solution for the poaching crisis is to remove the drivers of demand by educating people in demanding countries and raising awareness of the poaching crisis. Until prevention of poaching takes effect, there will be a continuous urgent need for new (combined) approaches that take up the research challenges and provide better protection against poaching in wildlife areas.


Assuntos
Conservação dos Recursos Naturais/métodos , Espécies em Perigo de Extinção , Animais , Animais Selvagens , Conservação dos Recursos Naturais/legislação & jurisprudência , Diplomacia , Sistemas de Informação Geográfica , Humanos , Inquéritos e Questionários , Tecnologia sem Fio
10.
Sensors (Basel) ; 18(3)2018 Mar 13.
Artigo em Inglês | MEDLINE | ID: mdl-29534022

RESUMO

In this paper, we describe and validate the EquiMoves system, which aims to support equine veterinarians in assessing lameness and gait performance in horses. The system works by capturing horse motion from up to eight synchronized wireless inertial measurement units. It can be used in various equine gait modes, and analyzes both upper-body and limb movements. The validation against an optical motion capture system is based on a Bland-Altman analysis that illustrates the agreement between the two systems. The sagittal kinematic results (protraction, retraction, and sagittal range of motion) show limits of agreement of ± 2.3 degrees and an absolute bias of 0.3 degrees in the worst case. The coronal kinematic results (adduction, abduction, and coronal range of motion) show limits of agreement of - 8.8 and 8.1 degrees, and an absolute bias of 0.4 degrees in the worst case. The worse coronal kinematic results are most likely caused by the optical system setup (depth perception difficulty and suboptimal marker placement). The upper-body symmetry results show no significant bias in the agreement between the two systems; in most cases, the agreement is within ±5 mm. On a trial-level basis, the limits of agreement for withers and sacrum are within ±2 mm, meaning that the system can properly quantify motion asymmetry. Overall, the bias for all symmetry-related results is less than 1 mm, which is important for reproducibility and further comparison to other systems.


Assuntos
Tecnologia sem Fio , Animais , Fenômenos Biomecânicos , Marcha , Cavalos , Coxeadura Animal , Movimento , Amplitude de Movimento Articular , Reprodutibilidade dos Testes
11.
Sensors (Basel) ; 17(12)2017 Nov 29.
Artigo em Inglês | MEDLINE | ID: mdl-29186037

RESUMO

Energy consumption is a critical performance and user experience metric when developing mobile sensing applications, especially with the significantly growing number of sensing applications in recent years. As proposed a decade ago when mobile applications were still not popular and most mobile operating systems were single-tasking, conventional sensing paradigms such as opportunistic sensing and participatory sensing do not explore the relationship among concurrent applications for energy-intensive tasks. In this paper, inspired by social relationships among living creatures in nature, we propose a symbiotic sensing paradigm that can conserve energy, while maintaining equivalent performance to existing paradigms. The key idea is that sensing applications should cooperatively perform common tasks to avoid acquiring the same resources multiple times. By doing so, this sensing paradigm executes sensing tasks with very little extra resource consumption and, consequently, extends battery life. To evaluate and compare the symbiotic sensing paradigm with the existing ones, we develop mathematical models in terms of the completion probability and estimated energy consumption. The quantitative evaluation results using various parameters obtained from real datasets indicate that symbiotic sensing performs better than opportunistic sensing and participatory sensing in large-scale sensing applications, such as road condition monitoring, air pollution monitoring, and city noise monitoring.

12.
Sensors (Basel) ; 16(12)2016 Nov 29.
Artigo em Inglês | MEDLINE | ID: mdl-27916822

RESUMO

With the advent of nano-technology, medical sensors and devices are becoming highly miniaturized. Consequently, the number of sensors and medical devices being implanted to accurately monitor and diagnose a disease is increasing. By measuring the symptoms and controlling a medical device as close as possible to the source, these implantable devices are able to save lives. A wireless link between medical sensors and implantable medical devices is essential in the case of closed-loop medical devices, in which symptoms of the diseases are monitored by sensors that are not placed in close proximity of the therapeutic device. Medium Access Control (MAC) is crucial to make it possible for several medical devices to communicate using a shared wireless medium in such a way that minimum delay, maximum throughput, and increased network life-time are guaranteed. To guarantee this Quality of Service (QoS), the MAC protocols control the main sources of limited resource wastage, namely the idle-listening, packet collisions, over-hearing, and packet loss. Traditional MAC protocols designed for body sensor networks are not directly applicable to Implantable Body Sensor Networks (IBSN) because of the dynamic nature of the radio channel within the human body and the strict QoS requirements of IBSN applications. Although numerous MAC protocols are available in the literature, the majority of them are designed for Body Sensor Network (BSN) and Wireless Sensor Network (WSN). To the best of our knowledge, there is so far no research paper that explores the impact of these MAC protocols specifically for IBSN. MAC protocols designed for implantable devices are still in their infancy and one of their most challenging objectives is to be ultra-low-power. One of the technological solutions to achieve this objective so is to integrate the concept of Wake-up radio (WuR) into the MAC design. In this survey, we present a taxonomy of MAC protocols based on their use of WuR technology and identify their bottlenecks to be used in IBSN applications. Furthermore, we present a number of open research challenges and requirements for designing an energy-efficient and reliable wireless communication protocol for IBSN.


Assuntos
Técnicas Biossensoriais/métodos , Tecnologia sem Fio , Algoritmos , Redes de Comunicação de Computadores
13.
Sensors (Basel) ; 16(10)2016 Sep 27.
Artigo em Inglês | MEDLINE | ID: mdl-27690026

RESUMO

A wireless sensor network that consists of nodes with a sound sensor can be used to obtain context awareness in home environments. However, the limited processing power of wireless nodes offers a challenge when extracting features from the signal, and subsequently, classifying the source. Although multiple papers can be found on different methods of sound classification, none of these are aimed at limited hardware or take the efficiency of the algorithms into account. In this paper, we compare and evaluate several classification methods on a real sensor platform using different feature types and classifiers, in order to find an approach that results in a good classifier that can run on limited hardware. To be as realistic as possible, we trained our classifiers using sound waves from many different sources. We conclude that despite the fact that the classifiers are often of low quality due to the highly restricted hardware resources, sufficient performance can be achieved when (1) the window length for our classifiers is increased, and (2) if we apply a two-step approach that uses a refined classification after a global classification has been performed.

14.
Sensors (Basel) ; 16(10)2016 Oct 01.
Artigo em Inglês | MEDLINE | ID: mdl-27706071

RESUMO

In this work, we introduce QUEST (QUantile Estimation after Supervised Training), an adaptive classification algorithm for Wireless Sensor Networks (WSNs) that eliminates the necessity for online supervised learning. Online processing is important for many sensor network applications. Transmitting raw sensor data puts high demands on the battery, reducing network life time. By merely transmitting partial results or classifications based on the sampled data, the amount of traffic on the network can be significantly reduced. Such classifications can be made by learning based algorithms using sampled data. An important issue, however, is the training phase of these learning based algorithms. Training a deployed sensor network requires a lot of communication and an impractical amount of human involvement. QUEST is a hybrid algorithm that combines supervised learning in a controlled environment with unsupervised learning on the location of deployment. Using the SITEX02 dataset, we demonstrate that the presented solution works with a performance penalty of less than 10% in 90% of the tests. Under some circumstances, it even outperforms a network of classifiers completely trained with supervised learning. As a result, the need for on-site supervised learning and communication for training is completely eliminated by our solution.

15.
Sensors (Basel) ; 16(9)2016 Sep 14.
Artigo em Inglês | MEDLINE | ID: mdl-27649176

RESUMO

Localization is essential in wireless sensor networks. To our knowledge, no prior work has utilized low-cost devices for collaborative localization based on only ambient sound, without the support of local infrastructure. The reason may be the fact that most low-cost devices are indeterministic and suffer from uncertain input latencies. This uncertainty makes accurate localization challenging. Therefore, we present a collaborative localization algorithm (Cooperative Localization on Android with ambient Sound Sources (CLASS)) that simultaneously localizes the position of indeterministic devices and ambient sound sources without local infrastructure. The CLASS algorithm deals with the uncertainty by splitting the devices into subsets so that outliers can be removed from the time difference of arrival values and localization results. Since Android is indeterministic, we select Android devices to evaluate our approach. The algorithm is evaluated with an outdoor experiment and achieves a mean Root Mean Square Error (RMSE) of 2.18 m with a standard deviation of 0.22 m. Estimated directions towards the sound sources have a mean RMSE of 17.5 ° and a standard deviation of 2.3 °. These results show that it is feasible to simultaneously achieve a relative positioning of both devices and sound sources with sufficient accuracy, even when using non-deterministic devices and platforms, such as Android.

16.
Sensors (Basel) ; 16(4): 426, 2016 Mar 24.
Artigo em Inglês | MEDLINE | ID: mdl-27023543

RESUMO

The position of on-body motion sensors plays an important role in human activity recognition. Most often, mobile phone sensors at the trouser pocket or an equivalent position are used for this purpose. However, this position is not suitable for recognizing activities that involve hand gestures, such as smoking, eating, drinking coffee and giving a talk. To recognize such activities, wrist-worn motion sensors are used. However, these two positions are mainly used in isolation. To use richer context information, we evaluate three motion sensors (accelerometer, gyroscope and linear acceleration sensor) at both wrist and pocket positions. Using three classifiers, we show that the combination of these two positions outperforms the wrist position alone, mainly at smaller segmentation windows. Another problem is that less-repetitive activities, such as smoking, eating, giving a talk and drinking coffee, cannot be recognized easily at smaller segmentation windows unlike repetitive activities, like walking, jogging and biking. For this purpose, we evaluate the effect of seven window sizes (2-30 s) on thirteen activities and show how increasing window size affects these various activities in different ways. We also propose various optimizations to further improve the recognition of these activities. For reproducibility, we make our dataset publicly available.


Assuntos
Atividades Cotidianas , Movimento/fisiologia , Reconhecimento Automatizado de Padrão/métodos , Smartphone , Acelerometria/métodos , Humanos , Fumar/efeitos adversos , Caminhada/fisiologia , Punho/fisiologia
17.
Sensors (Basel) ; 15(4): 7462-98, 2015 Mar 26.
Artigo em Inglês | MEDLINE | ID: mdl-25822142

RESUMO

Wireless sensor networks are suitable to gain context awareness for indoor environments. As sound waves form a rich source of context information, equipping the nodes with microphones can be of great benefit. The algorithms to extract features from sound waves are often highly computationally intensive. This can be problematic as wireless nodes are usually restricted in resources. In order to be able to make a proper decision about which features to use, we survey how sound is used in the literature for global sound classification, age and gender classification, emotion recognition, person verification and identification and indoor and outdoor environmental sound classification. The results of the surveyed algorithms are compared with respect to accuracy and computational load. The accuracies are taken from the surveyed papers; the computational loads are determined by benchmarking the algorithms on an actual sensor node. We conclude that for indoor context awareness, the low-cost algorithms for feature extraction perform equally well as the more computationally-intensive variants. As the feature extraction still requires a large amount of processing time, we present four possible strategies to deal with this problem.

18.
Sensors (Basel) ; 15(1): 2059-85, 2015 Jan 19.
Artigo em Inglês | MEDLINE | ID: mdl-25608213

RESUMO

Physical activity recognition using embedded sensors has enabled many context-aware applications in different areas, such as healthcare. Initially, one or more dedicated wearable sensors were used for such applications. However, recently, many researchers started using mobile phones for this purpose, since these ubiquitous devices are equipped with various sensors, ranging from accelerometers to magnetic field sensors. In most of the current studies, sensor data collected for activity recognition are analyzed offline using machine learning tools. However, there is now a trend towards implementing activity recognition systems on these devices in an online manner, since modern mobile phones have become more powerful in terms of available resources, such as CPU, memory and battery. The research on offline activity recognition has been reviewed in several earlier studies in detail. However, work done on online activity recognition is still in its infancy and is yet to be reviewed. In this paper, we review the studies done so far that implement activity recognition systems on mobile phones and use only their on-board sensors. We discuss various aspects of these studies. Moreover, we discuss their limitations and present various recommendations for future research.


Assuntos
Telefone Celular , Monitorização Ambulatorial/instrumentação , Acelerometria , Humanos , Atividade Motora , Sistemas On-Line , Qualidade da Assistência à Saúde
19.
Sensors (Basel) ; 14(6): 10146-76, 2014 Jun 10.
Artigo em Inglês | MEDLINE | ID: mdl-24919015

RESUMO

For physical activity recognition, smartphone sensors, such as an accelerometer and a gyroscope, are being utilized in many research studies. So far, particularly, the accelerometer has been extensively studied. In a few recent studies, a combination of a gyroscope, a magnetometer (in a supporting role) and an accelerometer (in a lead role) has been used with the aim to improve the recognition performance. How and when are various motion sensors, which are available on a smartphone, best used for better recognition performance, either individually or in combination? This is yet to be explored. In order to investigate this question, in this paper, we explore how these various motion sensors behave in different situations in the activity recognition process. For this purpose, we designed a data collection experiment where ten participants performed seven different activities carrying smart phones at different positions. Based on the analysis of this data set, we show that these sensors, except the magnetometer, are each capable of taking the lead roles individually, depending on the type of activity being recognized, the body position, the used data features and the classification method employed (personalized or generalized). We also show that their combination only improves the overall recognition performance when their individual performances are not very high, so that there is room for performance improvement. We have made our data set and our data collection application publicly available, thereby making our experiments reproducible.


Assuntos
Atividades Cotidianas/classificação , Telefone Celular , Monitorização Fisiológica/métodos , Movimento/fisiologia , Reconhecimento Automatizado de Padrão/métodos , Acelerometria/instrumentação , Acelerometria/métodos , Adulto , Algoritmos , Humanos , Masculino , Modelos Estatísticos , Monitorização Fisiológica/instrumentação , Caminhada/classificação
20.
Sensors (Basel) ; 14(5): 8633-68, 2014 May 16.
Artigo em Inglês | MEDLINE | ID: mdl-24841245

RESUMO

One of the first standards in the wireless sensor networks domain,WirelessHART (HART (Highway Addressable Remote Transducer)), was introduced to address industrial process automation and control requirements. This standard can be used as a reference point to evaluate other wireless protocols in the domain of industrial monitoring and control. This makes it worthwhile to set up a reliable WirelessHART simulator in order to achieve that reference point in a relatively easy manner. Moreover, it offers an alternative to expensive testbeds for testing and evaluating the performance of WirelessHART. This paper explains our implementation of WirelessHART in the NS-2 network simulator. According to our knowledge, this is the first implementation that supports the WirelessHART network manager, as well as the whole stack (all OSI (Open Systems Interconnection model) layers) of the WirelessHART standard. It also explains our effort to validate the correctness of our implementation, namely through the validation of the implementation of the WirelessHART stack protocol and of the network manager. We use sniffed traffic from a real WirelessHART testbed installed in the Idrolab plant for these validations. This confirms the validity of our simulator. Empirical analysis shows that the simulated results are nearly comparable to the results obtained from real networks. We also demonstrate the versatility and usability of our implementation by providing some further evaluation results in diverse scenarios. For example, we evaluate the performance of the WirelessHART network by applying incremental interference in a multi-hop network.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...