共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
随着机动车保有量的高速增长,停车混乱问题日益严重,各大中城市对停车实时监控及管理有迫切的建设需求。为了构建基于无线传感器网络的大规模、低成本、低功耗的停车管理系统,本文基于磁场干扰车辆检测原理,提出了一种停车检测算法,实际应用表明该算法车辆检测精度高,达到了设计要求。 相似文献
3.
A biologically inspired visual system capable of motion detection and pursuit motion is implemented using a Discrete Leaky Integrate-and-Fire (DLIF) neuron model. The system consists of a visual world, a virtual retina, the neural network circuitry (DLIF) to process the information, and a set of virtual eye muscles that serve to move the input area (visual field) of the retina within the visual world. Temporal aspects of the DLIF model are heavily exploited including: spike propagation latency, relative spike timing, and leaky potential integration. A novel technique for motion detection is employed utilizing coincidence detection aspects of the DLIF and relative spike timing. The system as a whole encodes information using relative spike timing of individual action potentials as well as rate coded spike trains. Experimental results are presented in which the motion of objects is detected and tracked in real and animated video. Pursuit motion is successful using linear and also sinusoidal paths which include object velocity changes. The visual system exhibits dynamic overshoot correction heavily exploiting neural network characteristics. System performance is within the bounds of real-time applications. 相似文献
4.
A framework for use of wireless sensor networks in forest fire detection and monitoring 总被引:1,自引:0,他引:1
Forest fires are one of the main causes of environmental degradation nowadays. Current surveillance systems for forest fires lack in supporting real-time monitoring of every point of a region at all times and early detection of fire threats. Solutions using wireless sensor networks, on the other hand, can gather sensory data values, such as temperature and humidity, from all points of a field continuously, day and night, and, provide fresh and accurate data to the fire-fighting center quickly. However, sensor networks face serious obstacles like limited energy resources and high vulnerability to harsh environmental conditions, that have to be considered carefully. In this paper, we propose a comprehensive framework for the use of wireless sensor networks for forest fire detection and monitoring. Our framework includes proposals for the wireless sensor network architecture, sensor deployment scheme, and clustering and communication protocols. The aim of the framework is to detect a fire threat as early as possible and yet consider the energy consumption of the sensor nodes and the environmental conditions that may affect the required activity level of the network. We implemented a simulator to validate and evaluate our proposed framework. Through extensive simulation experiments, we show that our framework can provide fast reaction to forest fires while also consuming energy efficiently. 相似文献
5.
提出了一种基于视频传感器网络的模型,其核心思想是通过视频节点和非视频节点相互协作建立模型,对目标进行探测、跟踪和定位。在探测和跟踪阶段,通过非视频节点对目标进行探测。目标在移动过程中,由非视频节点实时地跟踪目标大致的移动方向和位置;在定位阶段,由视频节点完成对目标准确定位。仿真结果表明,在节点随机部署的情况下,该模型可以有效地实现对目标区域的全覆盖,通过非视频节点和视频节点的相互协作,发挥了非视频节点对目标探测和跟踪的优势,以及视频节点对目标准确定位特性。 相似文献
6.
Ahmed M. KhedrAuthor Vitae Walid OsamyAuthor Vitae 《Journal of Parallel and Distributed Computing》2011,71(10):1318-1326
Target tracking is an important sensing application of wireless sensor networks. In these networks, energy, computing power, and communication bandwidth are scarce. We have considered a random heterogeneous wireless sensor network, which has several powerful nodes for data aggregation/relay and large number of energy-constrained sensor nodes that are deployed randomly to cover a given target area. In this paper, a cooperative approach to detect and monitor the path of a moving object using a minimum subset of nodes while maintaining coverage and network connectivity is proposed. It is tested extensively in a simulation environment and compared with other existing methods. The results of our experiments clearly indicate the benefits of our new approach in terms of energy consumption. 相似文献
7.
8.
研究无线传感器网络在位置信息不确定时,同时定位无线传感器网络节点并跟踪移动目标。利用RSSI测量节点对之间的距离,多维定标技术根据距离矩阵完成传感器网络的初始定位。估计与更新阶段提出了压缩EKF滤波确定传感器节点位置和目标位置。仿真结果显示:算法在较低的网络覆盖率下有较高的定位和跟踪准确度,在初始定位误差为5m时,节点和跟踪误差均小于3m,特别是在长距离的跟踪任务中有很好的精度和实时性。 相似文献
9.
10.
Heshan Kumarage Ibrahim Khalil Zahir Tari Albert Zomaya 《Journal of Parallel and Distributed Computing》2013
Modern infrastructure increasingly depends on large computerized systems for their reliable operation. Supervisory Control and Data Acquisition (SCADA) systems are being deployed to monitor and control large scale distributed infrastructures (e.g. power plants, water distribution systems). A recent trend is to incorporate Wireless Sensor Networks (WSNs) to sense and gather data. However, due to the broadcast nature of the network and inherent limitations in the sensor nodes themselves, they are vulnerable to different types of security attacks. Given the critical aspects of the underlying infrastructure it is an extremely important research challenge to provide effective methods to detect malicious activities on these networks. This paper proposes a robust and scalable mechanism that aims to detect malicious anomalies accurately and efficiently using distributed in-network processing in a hierarchical framework. Unsupervised data partitioning is performed distributively adapting fuzzy c-means clustering in an incremental model. Non-parametric and non-probabilistic anomaly detection is performed through fuzzy membership evaluations and thresholds on observed inter-cluster distances. Robust thresholds are determined adaptively using second order statistical knowledge at each evaluation stage. Extensive experiments were performed and the results demonstrate that the proposed framework achieves high detection accuracy compared to existing data clustering approaches with more than 96% less communication overheads opposed to a centralized approach. 相似文献
11.
12.
Energy-efficient real-time object tracking in multi-level sensor networks by mining and predicting movement patterns 总被引:1,自引:0,他引:1
Vincent S. Tseng Author Vitae Eric Hsueh-Chan Lu Author Vitae 《Journal of Systems and Software》2009,82(4):697-706
A number of studies have been written on sensor networks in the past few years due to their wide range of potential applications. Object tracking is an important topic in sensor networks; and the limited power of sensor nodes presents numerous challenges to researchers. Previous studies of energy conservation in sensor networks have considered object movement behavior to be random. However, in some applications, the movement behavior of an object is often based on certain underlying events instead of randomness completely. Moreover, few studies have considered the real-time issue in addition to the energy saving problem for object tracking in sensor networks. In this paper, we propose a novel strategy named multi-level object tracking strategy (MLOT) for energy-efficient and real-time tracking of the moving objects in sensor networks by mining the movement log. In MLOT, we first conduct hierarchical clustering to form a hierarchical model of the sensor nodes. Second, the movement logs of the moving objects are analyzed by a data mining algorithm to obtain the movement patterns, which are then used to predict the next position of a moving object. We use the multi-level structure to represent the hierarchical relations among sensor nodes so as to achieve the goal of keeping track of moving objects in a real-time manner. Through experimental evaluation of various simulated conditions, the proposed method is shown to deliver excellent performance in terms of both energy efficiency and timeliness. 相似文献
13.
Mauro Conti Roberto Di Pietro Luigi V. Mancini Alessandro Mei 《Information Fusion》2009,10(4):342-353
In-network data aggregation is favorable for wireless sensor networks (WSNs): It allows in-network data processing while reducing the network traffic and hence saving the sensors energy. However, due to the distributed and unattended nature of WSNs, several attacks aiming at compromising the authenticity of the collected data could be perpetrated. For example, an adversary could capture a node to create clones of the captured one. These clones disseminated through the network could provide malicious data to the aggregating node, thus poisoning/disrupting the aggregation process. In this paper we address the problem of detecting cloned nodes; a requirement to be fulfilled to provide authenticity of the data fusion process.First, we analyze the desirable properties a distributed clone detection protocol should meet. Specifically: It should avoid having a single point of failure; the load should be totally distributed across the nodes in the network; the position of the clones in the network should not influence the detection probability. We then show that current solutions do not meet the exposed requirements. Next, we propose the Information Fusion Based Clone Detection Protocol (ICD). ICD is a probabilistic, completely distributed protocol that efficiently detects clones. ICD combines two cryptographic mechanisms: The pseudo-random key pre-distribution, usually employed to secure node pairwise communications, with a sparing use of asymmetric crypto primitives. We show that ICD matches all the requirements above mentioned and compare its performance with current solutions in the literature; experimental results show that ICD has better performance than existing solutions for all the cost parameters considered: Number of messages sent, per sensor storage requirement, and signature verification. These savings allow to increase the network operating lifetime. Finally, note that ICD protocol could be used as an independent layer by any data aggregation mechanism. 相似文献
14.
Target tracking, especially visual target tracking, in complex situations is challenging, which is always performed in single-view system. Because of the conflict between resolution and tracking range, however, single-view tracking is not robust and accurate. This paper presents a distributed multi-view tracking system using collaborative signal processing (CSP) in distributed wireless sensor networks (DWSNs). In the proposed tracking system, target detection and classification algorithms are based on single-node processing and target tracking is performed in sink node, whereas target localization algorithm is carried out by CSP between multisensor. For conquering the disadvantages of client/server based centralized data fusion, a progressive distributed data fusion are proposed. Finally, an indoor target tracking experiment is illustrated, and then tracking performance, execution time and energy consumption of progressive distributed data fusion are compared with client/server based centralized data fusion. Experimental results demonstrate that the CSP based distributed multi-view tracking system in DWSNs can accomplish multi-target extraction, classification, localization, tracking and association quickly and accurately with little congestion, energy consumption and execution time. 相似文献
15.
《International Journal of Parallel, Emergent and Distributed Systems》2013,28(3):266-288
Wireless sensor networks often suffer from disrupted connectivity caused by its numerous aspects such as limited battery power of a node and unattended operation vulnerable to hostile tampering. The disruption of connectivity, often referred to as network cut, leads to ill-informed routing decisions, data loss and waste of energy. A number of protocols have been proposed to efficiently detect network cuts; they focus solely on a cut that disconnects nodes from the base station. However, a cut detection scheme is truly useful when a cut is defined with respect to multiple destinations (i.e. target nodes), rather than a single base station. Thus, we extend the existing notion of cut detection, and propose an algorithm that enables sensor nodes to autonomously monitor the connectivity to multiple target nodes. We introduce a novel reactive cut detection solution, the point-to-point cut detection, where given any pair of source and destination, a source is able to locally determine whether the destination is reachable or not. Furthermore, we propose a lightweight proactive cut detection algorithm specifically designed for a network scenario with a small set of target destinations. We prove the effectiveness of the proposed algorithms through extensive simulations; specifically, in our network configurations, proposed cut detection algorithms achieve more than an order of magnitude improvement in energy consumption, when coupled with an underlying routing protocol. 相似文献
16.
Object tracking has been widely applied to video surveillance, robot localization and human-computer interaction. In this paper, an edge-based tracking algorithm is proposed. We extract the feature points by efficiently utilizing the image edges in the object region. Then the parameter vector of the object's motion model is estimated based on minimizing the sum-of-squared differences between the reference feature points in the reference frame and the observed feature points in the tracking sequence frame. The experiments show that the edge-based tracking algorithm proposed by us can track object efficiently under uniform and varying illumination conditions. 相似文献
17.
Leijun Huang Author Vitae Author Vitae Robert Simon Author Vitae 《Journal of Systems and Software》2010,83(1):108-120
This paper presents McTorrent, a reliable bulk data dissemination protocol for sensor networks. The protocol is designed to take advantage of multiple radio channels to reduce packet collisions and improve the latency of large object dissemination. We evaluated the performance of McTorrent via detailed simulations and experiments based upon an implementation on the TinyOS platform. Our results show that in comparison to Deluge, the de facto network reprogramming protocol for TinyOS, McTorrent significantly reduces the number of packet transmissions and the amount of time required to propagate a large data object through a sensor network. 相似文献
18.
The MAC protocol for wireless sensor network plays a very important role in the control of energy consumption. It is a very important issue to effectively utilize power under the condition of limited energy. The most energy-wasting part of the MAC protocol for wireless sensor network is at the idling condition. Therefore it is crucial for power saving to be able to turn off the signal transducer of the wireless network when the equipment is idling. Pattern-MAC (PMAC) allows sensors that did not transfer for a long period of time to quickly enter a dormant state, so that the problem of sensor overhearing can be greatly improved, and the whole network structure can fully respond to the actual transfer rate without too much energy consumption, but this type of design requires precise time synchronization mechanism. Achieving time synchronization is a very energy consuming and very expensive mechanism in the sensor network structure, achieving the goal is coupled with excess energy consumption and reduction of the lifespan of the sensor. Additionally, the exchange action with the neighboring pattern after each cycle, not only generates additional energy consumption for data transfer, but is also accompanied by factors such as competition, collision and pattern exchange failure. We propose an asynchronous MAC protocol (AMAC) in this paper and expect to improve the problem of energy wasting and time synchronization due to sleeping schedule exchange under the PMAC basic protocol. 相似文献
19.
Robust object tracking with background-weighted local kernels 总被引:7,自引:0,他引:7
Jaideep Jeyakar R. Venkatesh Babu K.R. Ramakrishnan 《Computer Vision and Image Understanding》2008,112(3):296-309
Object tracking is critical to visual surveillance, activity analysis and event/gesture recognition. The major issues to be addressed in visual tracking are illumination changes, occlusion, appearance and scale variations. In this paper, we propose a weighted fragment based approach that tackles partial occlusion. The weights are derived from the difference between the fragment and background colors. Further, a fast and yet stable model updation method is described. We also demonstrate how edge information can be merged into the mean shift framework without having to use a joint histogram. This is used for tracking objects of varying sizes. Ideas presented here are computationally simple enough to be executed in real-time and can be directly extended to a multiple object tracking system. 相似文献
20.
For maximizing the energy efficiency in a wireless network, we propose two forwarding schemes termed single-link and multi-link energy-efficient forwarding that tradeoff delivery ratios against energy costs. Multi-link forwarding improves the network performance substantially by addressing multiple receivers at once during the packet forwarding process. If the first forwarding node does not receive a packet correctly, other nodes may act as backup nodes and perform the forwarding instead. By means of mathematical analyses, we derive how the energy efficiency of a forwarding path can be computed and how a forwarding tree is established. Routing cycles are explicitly taken into account and prevented by means of sequence numbers. Simulations and real-world experiments provide a comparison to other reference strategies, showing a superior performance of our forwarding scheme in terms of energy efficiency. 相似文献