TITLE

Weighing Technology for High-Speed Moving Vehicle Based on Wireless Sensor Networks

AUTHOR(S)
Liao Cong; Huang Hongwu; Wu Xinye
PUB. DATE
October 2014
SOURCE
Journal of Networks;Oct2014, Vol. 9 Issue 10, p2821
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This paper focuses on the weakening or eliminating low frequency dynamic load of vehicle dynamic weighing, improve the efficiency and accuracy of dynamic weighing system, weighing the purpose of. Wireless sensor network is deployed in the monitoring region of sensor nodes, the nodes achieve interconnectivity through wireless communication protocol, the network system structure. Usually, information without knowing the corresponding node position, often meaningless, positioning plays a very important role in many applications of wireless sensor network. Based on dynamic load model, load WSN-WIM system design, signal processing, in-depth research of sensor fault diagnosis. Methods to investigate the dynamic load processing based on WSN. The cooperation of each sensor nodes through the use of sine fitting algorithm based on three parameter sine wave curve fitting of the dynamic load, a set of linear equations, using efficient algorithm and information processing method of improving weighting precision. Study on sensor fault load based on grey prediction theory. In the WSN-WIM system, sensor calibration is a key problem, which put forward the optimization scheme of weighing sensor fault diagnosis method and grey prediction model based on the grey prediction theory, improving the weighing accuracy and system stability of WSN-WIM system.
ACCESSION #
98723081

 

Related Articles

  • A Range-based Detection Method of Replication Attacks in Wireless Sensor Networks. Huang Jian; Xiong Yan; Li Ming-xi; Miao Fu you // International Proceedings of Computer Science & Information Tech;2012, Vol. 27, p120 

    Node replication attack is a common attack mode in wireless sensor networks. Attackers capture certain sensor nodes, replicate them and deploy several replicas back into the network for further malicious activities. A number of protocols have been proposed so far to tackle node replication...

  • A Survey of Transport Layer Protocols for Wireless Sensor Networks. Zafar, Saima // International Journal of Computer Applications;Nov2011, Vol. 33, p44 

    The reliability of data transfer is vital for commercial and enterprise applications of Wireless Sensor Networks (WSN). Likewise, mission-oriented and critical military applications of these networks demand dependable and timely data transport. This reliability is required for in-bound data,...

  • Improving the Energy Efficiency of LEACH Protocol for Wireless Sensor Network. Bhagwat, Rashmi; Baru, V. B. // Advances in Computational Sciences & Technology;2012, Vol. 5 Issue 2, p995 

    The energy efficiency of a wireless sensor network (WSN) is one of the most critical requirements in WSNs. Due to limited energy resources, network lifetime is one of the critical issues as well. The passive (switched off) extra nodes are ready to become active (be switched on) when any active...

  • Experiment of Wireless Sensor Network to Monitor Field Data. Moo Wan Kim; Kwang Sik Kim // Journal of Systemics, Cybernetics & Informatics;2009, Vol. 7 Issue 4, p57 

    Recently the mobile wireless network has been drastically enhanced and one of the most efficient ways to realize the ubiquitous network will be to develop the converged network by integrating the mobile wireless network with other IP fixed network like NGN (Next Generation Network). So in this...

  • IN-DEPTH BREAKDOWN OF A 6LoWPAN STACK FOR SENSOR NETWORKS. Lembo, Sergio; Kuusisto, Jari; Manner, Jukka // International Journal of Computer Networks & Communications;Nov2010, Vol. 2 Issue 6, p204 

    There exist several open source 6LoWPAN stacks for researchers to experiment with. However, they often lack sufficient and in-depth description of the internal operation, which makes extending the stacks difficult for many of us. This paper is an extended version of our previous work documenting...

  • Embedded Sensor System for Early Pathology Detection in Building Construction. Torres, Santiago J. Barro; Casc√≥n, Carlos J. Escudero // International Journal of Computer Science Issues (IJCSI);Jul2010, Vol. 7 Issue 4, p26 

    Structure pathology detection is an important security task in building construction, which is performed by an operator by looking manually for damages on the materials. This activity could be dangerous if the structure is hidden or difficult to reach. On the other hand, embedded devices and...

  • A Dynamic Duty Cycle MAC Algorithm for Wireless Body Area Networks. Jinhyuk Kim; Inseong Song; Eunmee Jang; Sangbang Choi // International Journal of Bio-Science & Bio-Technology;Jun2012, Vol. 4 Issue 2, p83 

    A wireless body area network (WBAN) allows the integration of low power, invasive or noninvasive miniaturized sensors around a human body. In this paper, a dynamic duty cycle algorithm is designed to handle energy efficiency, by varying the sleep period according to the amount of traffic that...

  • A SCOPE FOR MANET ROUTING AND SECURITY THREATS. Lathies Bhasker, T. // Economy of Industry;Dec2013, Vol. 4 Issue 4, p840 

    The mobile Ad-hoc networks (MANET) are wireless networks which utilize mobile nodes for communicating among them and in the external transmission range. The vulnerable nature of the network causes various security threats which upset its growth. In this survey, initially the existing security...

  • Cloned Agent based data computed in Homogeneous sensor networks. Karthikeyan, S.; Jayashri, S. // International Journal of Computer Science & Information Security;Sep2012, Vol. 10 Issue 9, p136 

    The innovation in the world of Wireless communication led to progressive use of tiny and multifunctional sensor nodes. These nodes, being small in size can sense the environment, compute data and communicate to a large range. The energy constraint is one of the major limitations in sensor nodes,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics