TITLE

Experiment of Wireless Sensor Network to Monitor Field Data

AUTHOR(S)
Moo Wan Kim; Kwang Sik Kim
PUB. DATE
July 2009
SOURCE
Journal of Systemics, Cybernetics & Informatics;2009, Vol. 7 Issue 4, p57
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Recently the mobile wireless network has been drastically enhanced and one of the most efficient ways to realize the ubiquitous network will be to develop the converged network by integrating the mobile wireless network with other IP fixed network like NGN (Next Generation Network). So in this paper the term of the wireless ubiquitous network is used to describe this approach. In this paper, first, the wireless ubiquitous network architecture is described based on IMS which has been standardized by 3GPP (3rdGeneration Partnership Program). Next, the field data collection system to match the satellite data using location information is proposed based on the concept of the wireless ubiquitous network architecture. The purpose of the proposed system is to provide more accurate analyzing method with the researchers in the remote sensing area.
ACCESSION #
59856081

 

Related Articles

  • A Survey of Transport Layer Protocols for Wireless Sensor Networks. Zafar, Saima // International Journal of Computer Applications;Nov2011, Vol. 33, p44 

    The reliability of data transfer is vital for commercial and enterprise applications of Wireless Sensor Networks (WSN). Likewise, mission-oriented and critical military applications of these networks demand dependable and timely data transport. This reliability is required for in-bound data,...

  • A Range-based Detection Method of Replication Attacks in Wireless Sensor Networks. Huang Jian; Xiong Yan; Li Ming-xi; Miao Fu you // International Proceedings of Computer Science & Information Tech;2012, Vol. 27, p120 

    Node replication attack is a common attack mode in wireless sensor networks. Attackers capture certain sensor nodes, replicate them and deploy several replicas back into the network for further malicious activities. A number of protocols have been proposed so far to tackle node replication...

  • PoPCoRN: A Power-Aware Periodic Surveillance Scheme in Convex Region using Wireless Mobile Sensor Networks. Prajapati, A. K. // International Journal of Electronics, Communications & Computer ;2009, Vol. 1 Issue 4, p244 

    In this paper, the periodic surveillance scheme has been proposed for any convex region using mobile wireless sensor nodes. A sensor network typically consists of fixed number of sensor nodes which report the measurements of sensed data such as temperature, pressure, humidity, etc., of its...

  • EasiND: Effective Neighbor Discovery Algorithms for Asynchronous and Asymmetric-Duty-Cycle Multi-channel Mobile WSNs. Huang, Tingpei; Chen, Haiming; Zhang, Yuqing; Cui, Li // Wireless Personal Communications;Oct2015, Vol. 84 Issue 4, p3031 

    Neighbor discovery is a fundamental building block for wireless sensor networks (WSNs), because it is the first step to establish communication links between sensor nodes. Traditional neighbor discovery problems mainly focus on static wireless networks, or networks where all nodes operate on the...

  • Using Correspondent Information for Route Optimization Scheme on Proxy Mobile IPv6.  // Journal of Networks;Aug2010, Vol. 5 Issue 8, p984 

    No abstract available.

  • ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks. Abidoye, Ademola P.; Azeez, Nureni A.; Adesina, Ademola O.; Agbele, Kehinde K. // Wireless Sensor Network;Sep2011, Vol. 3 Issue 9, p307 

    One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes' energy consumption during...

  • Priority-Based CCA Periods for Efficient and Reliable Communications in Wireless Sensor Networks. Khanafer, Mounib; Guennoun, Mouhcine; Mouftah, Hussein T. // Wireless Sensor Network;Feb2012, Vol. 4 Issue 2, p45 

    The IEEE 802.15.4 standard utilizes the CSMA-CA mechanism to control nodes' access to the shared wireless communication medium. CSMA-CA implements the Binary Exponential Backoff (BEB) algorithm by which a node refrains from sending any packet before the expiry of its backoff period. After that,...

  • Design, Analysis and Implementation of Energy-efficient Broadcast MAC Protocols for Wireless Sensor Networks. Young-myoung Kang; Sangsoon Lim; Joon Yoo; Chong-kwon Kim // KSII Transactions on Internet & Information Systems;Jun2011, Vol. 5 Issue 6, p1113 

    The Multiuser Eigenmode Transmission (MET) has generated significant interests in literature due to its optimal performance in linear precoding systems. The MET can simultaneously transmit several spatial multiplexing eigenmodes to multiple users which significantly enhance the system...

  • Efficient Data Reporting Protocol for Wireless Sensor Networks. Chauhan, Siddhartha; Awasthi, Lalit Kumar // International Journal of Advanced Networking & Applications;Mar/Apr2012, Vol. 3 Issue 5, p1302 

    Wireless sensor networks (WSNs) are used for collection of data from the area of interest. WSNs deployment, application requirement and nature of phenomena have an effect on the generation of data. The data generated can be redundant and injection of redundant data into the network reduces the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics