[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (4,876)

Search Parameters:
Keywords = Wireless Sensor Networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
12 pages, 5721 KiB  
Article
Realizing Multi-Parameter Measurement Using PT-Symmetric LC Sensors
by Bin-Bin Zhou, Dan Chen, Chi Zhang and Lei Dong
Sensors 2024, 24(20), 6570; https://doi.org/10.3390/s24206570 (registering DOI) - 12 Oct 2024
Abstract
With the rapid development in sensor network technology, the complexity and diversity of application scenarios have put forward more and more new requirements for inductor–capacitor (LC) sensors, for instance, multi-parameter simultaneous monitoring. Here, the parity–time (PT) symmetry concept in quantum mechanics [...] Read more.
With the rapid development in sensor network technology, the complexity and diversity of application scenarios have put forward more and more new requirements for inductor–capacitor (LC) sensors, for instance, multi-parameter simultaneous monitoring. Here, the parity–time (PT) symmetry concept in quantum mechanics is applied to LC passive wireless sensing. Two or even three parameters can be monitored simultaneously by observing the frequency response of the reflection coefficient at the end of the readout circuit. In particular, for three-parameter detection, a novel detection method is studied to extract the three resonant frequencies of the system through the phase–frequency characteristics of the reflection coefficient, which has never appeared in the previous literature on PT symmetry. The changes in three resonant frequencies are in response to changes in the three parameters in the environment. We show theoretically and demonstrate experimentally that the PT-symmetric LC sensor can realize multi-parameter measurement using a series LCR circuit as the sensor and a symmetric adjustable LCR circuit as the readout circuit. Our work paves the way for applying PT symmetry in multi-parameter detection. Full article
(This article belongs to the Section Electronic Sensors)
Show Figures

Figure 1

Figure 1
<p>The PT-symmetric <span class="html-italic">LC</span> passive wireless multi-parameter sensing system. (<b>a</b>) The simplified circuit model of the PT-symmetric <span class="html-italic">LC</span> sensing system. (<b>b</b>) The equivalent circuit diagram of the PT-symmetrical <span class="html-italic">LC</span> sensing system for single-port measurement. (<b>c</b>) The real parts and (<b>d</b>) imaginary parts of the eigenfrequencies <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>ω</mi> </mrow> <mrow> <mn>1,2</mn> </mrow> </msub> </mrow> </semantics></math> as a function of the varying capacitance and resistance, assuming <span class="html-italic">L</span> = 5 μH and <span class="html-italic">k</span> = 0.1.</p>
Full article ">Figure 1 Cont.
<p>The PT-symmetric <span class="html-italic">LC</span> passive wireless multi-parameter sensing system. (<b>a</b>) The simplified circuit model of the PT-symmetric <span class="html-italic">LC</span> sensing system. (<b>b</b>) The equivalent circuit diagram of the PT-symmetrical <span class="html-italic">LC</span> sensing system for single-port measurement. (<b>c</b>) The real parts and (<b>d</b>) imaginary parts of the eigenfrequencies <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>ω</mi> </mrow> <mrow> <mn>1,2</mn> </mrow> </msub> </mrow> </semantics></math> as a function of the varying capacitance and resistance, assuming <span class="html-italic">L</span> = 5 μH and <span class="html-italic">k</span> = 0.1.</p>
Full article ">Figure 2
<p>The frequency responses as a function of the sensitive capacitance and resistance. (<b>a</b>) The simulated reflection spectrum under different capacitances, with resistance <span class="html-italic">R</span><sub>s</sub> = 10 Ω. (<b>b</b>) The theoretical (blue and orange lines) and simulated (blue and orange symbols) frequency responses as a function of varying the capacitance <span class="html-italic">C</span><sub>s</sub>, with the simulated results extracted from (<b>a</b>). (<b>c</b>) The theoretical (blue and orange lines) and simulated (blue and orange symbols) frequency responses as a function of varying the resistance <span class="html-italic">R</span><sub>s</sub>, with <span class="html-italic">C</span><sub>s</sub> = 10 pF. The theoretical (surfaces) and simulated (yellow symbols) (<b>d</b>) frequencies <span class="html-italic">f</span><sub>1</sub> and (<b>e</b>) frequencies <span class="html-italic">f</span><sub>2</sub> responses as a function of varying the capacitance <span class="html-italic">C</span><sub>s</sub> and resistance <span class="html-italic">R</span><sub>s</sub>.</p>
Full article ">Figure 3
<p>Simulated frequency responses as a function of varying the parameters. (<b>a</b>) Reflection spectrums under different capacitances. (<b>b</b>) Reflection spectrums under different resistances. (<b>c</b>) Reflection spectrums under different coupling coefficients. (<b>d</b>) Reflection spectrums as a function of varying the capacitance <span class="html-italic">C</span><sub>s</sub>, resistance <span class="html-italic">R</span><sub>s</sub>, and coupling coefficient <span class="html-italic">k</span>.</p>
Full article ">Figure 4
<p>The experimental setup of the PT-symmetric <span class="html-italic">LC</span> wireless sensor. (<b>a</b>) Experimental instruments; (<b>b</b>) experimental circuits.</p>
Full article ">Figure 5
<p>Measured variation in the sensitive parameters with the environment. (<b>a</b>) The variation in the capacitance <span class="html-italic">C</span>2 value with humidity. (<b>b</b>) The variation in the resistance <span class="html-italic">R</span>2 value with illuminance. (<b>c</b>) The variation in the coupling coefficient <span class="html-italic">k</span> with the coupling distance <span class="html-italic">d</span>.</p>
Full article ">Figure 6
<p>Measured frequency responses as a function of the sensitive parameters. (<b>a</b>) Reflection spectrums with different relative humidities. (<b>b</b>) Reflection spectrums with different illuminances. (<b>c</b>) Reflection spectrums with different coupling distance. (<b>d</b>) Reflection spectrums as a function of varying the relative humidity, illuminance, and coupling distance.</p>
Full article ">
22 pages, 4831 KiB  
Article
Kinodynamic Model-Based UAV Trajectory Optimization for Wireless Communication Support of Internet of Vehicles in Smart Cities
by Mohsen Eskandari, Andrey V. Savkin and Mohammad Deghat
Drones 2024, 8(10), 574; https://doi.org/10.3390/drones8100574 - 11 Oct 2024
Viewed by 310
Abstract
Unmanned aerial vehicles (UAVs) are utilized for wireless communication support of Internet of Intelligent Vehicles (IoVs). Intelligent vehicles (IVs) need vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) wireless communication for real-time perception knowledge exchange and dynamic environment modeling for safe autonomous driving and mission accomplishment. [...] Read more.
Unmanned aerial vehicles (UAVs) are utilized for wireless communication support of Internet of Intelligent Vehicles (IoVs). Intelligent vehicles (IVs) need vehicle-to-vehicle (V2V) and vehicle-to-everything (V2X) wireless communication for real-time perception knowledge exchange and dynamic environment modeling for safe autonomous driving and mission accomplishment. UAVs autonomously navigate through dense urban areas to provide aerial line-of-sight (LoS) communication links for IoVs. Real-time UAV trajectory design is required for minimum energy consumption and maximum channel performance. However, this is multidisciplinary research including (1) dynamic-aware kinematic (kinodynamic) planning by considering UAVs’ motion and nonholonomic constraints; (2) channel modeling and channel performance improvement in future wireless networks (i.e., beyond 5G and 6G) that are limited to beamforming to LoS links with the aid of reconfigurable intelligent surfaces (RISs); and (3) real-time obstacle-free crash avoidance 3D trajectory optimization in dense urban areas by modeling obstacles and LoS paths in convex programming. Modeling and solving this multilateral problem in real-time are computationally prohibitive unless extensive computational and overhead processing costs are imposed. To pave the path for computationally efficient yet feasible real-time trajectory optimization, this paper presents UAV kinodynamic modeling. Then, it proposes a convex trajectory optimization problem with the developed linear kinodynamic models. The optimality and smoothness of the trajectory optimization problem are improved by utilizing model predictive control and quadratic state feedback control. Simulation results are provided to validate the methodology. Full article
Show Figures

Figure 1

Figure 1
<p>Quadrotor motion principle and kinematic-dynamic modeling: (<b>a</b>) quadrotor motion in the Earth reference frame (<math display="inline"><semantics> <mrow> <mi>O</mi> </mrow> </semantics></math>) and its rigid body reference frame (<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>O</mi> </mrow> <mrow> <mi>B</mi> </mrow> </msub> </mrow> </semantics></math>); (<b>b</b>) rotating propellers 1 to 4 create forces <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>F</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> to <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>F</mi> </mrow> <mrow> <mn>4</mn> </mrow> </msub> </mrow> </semantics></math>, and the resultant force of propellers with various speeds results in quadrotor motion in various directions.</p>
Full article ">Figure 2
<p>The UAV (as RISeUAV or UAV-BS) navigates to provide aerial wireless communication support for IoVs in future 6G networks.</p>
Full article ">Figure 3
<p>A naive illustration of the imposed limitations by motion constraints for converging to the global optimum trajectory by solving <math display="inline"><semantics> <mrow> <mi mathvariant="script">P</mi> <mn>1</mn> </mrow> </semantics></math> for each sample time.</p>
Full article ">Figure 4
<p>Illustration of the smoothing algorithm and concepts of the elasticity and smoothness of rubber bands.</p>
Full article ">Figure 5
<p>Simulation results of the proposed trajectory optimization method in the first scenario: (<b>a</b>) 3D occupancy map of the simulated dense urban area; (<b>b</b>) 2D view of the map, including BSs (shown by black triangles) and routes of four ground intelligent vehicles (with colored squares as the waypoints corresponding to discretized sample times) (<b>c</b>) 3D view of the generated trajectory for the proposed method (shown by the green line with red dots indicating the waypoints); (<b>d</b>) 2D view of the trajectories.</p>
Full article ">Figure 6
<p>Simulation results for the second scenario, in which the UAV maximum altitude is limited to be less than the average height of a tall building.</p>
Full article ">Figure 7
<p>Simulation results illustrate the performance of the smoothing technique.</p>
Full article ">Figure 8
<p>Simulation results of the RRT method in 153.546 s: (<b>a</b>) 3D view; (<b>b</b>) 2D view.</p>
Full article ">
22 pages, 6331 KiB  
Article
Use of Wireless Sensor Networks for Area-Based Speed Control and Traffic Monitoring
by Mariusz Rychlicki, Zbigniew Kasprzyk, Małgorzata Pełka and Adam Rosiński
Appl. Sci. 2024, 14(20), 9243; https://doi.org/10.3390/app14209243 - 11 Oct 2024
Viewed by 267
Abstract
This paper reviews the potential of low-power wireless networks to improve road safety. The authors characterized this type of network and its application in road transport. They also presented the available technologies, highlighting one that was considered the most promising for transport applications. [...] Read more.
This paper reviews the potential of low-power wireless networks to improve road safety. The authors characterized this type of network and its application in road transport. They also presented the available technologies, highlighting one that was considered the most promising for transport applications. The study includes an innovative and proprietary concept of area-based vehicle speed monitoring using this technology and describes its potential for enhancing road safety. Assumptions and a model for the deployment of network equipment within the planned implementation area were developed. Using radio coverage planning software, the authors conducted a series of simulations to assess the radio coverage of the proposed solution. The results were used to evaluate the feasibility of deployment and to select system operating parameters. It was also noted that the proposed solution could be applied to traffic monitoring. The main objective of this paper is to present a new solution for improving road safety and to assess its feasibility for practical implementation. To achieve this, the authors conducted and presented the results of a series of simulations using radio coverage planning software. The key contribution of this research is the authors′ proposal to implement simultaneous vehicle speed control across the entire monitored area, rather than limiting it to specific, designated points. The simulation results, primarily related to the deployment and selection of operating parameters for wireless sensor network devices, as well as the type and height of antenna placement, suggest that the practical implementation of the proposed solution is feasible. This approach has the potential to significantly improve road safety and alter drivers′ perceptions of speed control. Additionally, the positive outcomes of the research could serve as a foundation for changing the selection of speed control sites, focusing on areas with the highest road safety risk at any given time. Full article
(This article belongs to the Special Issue Research and Estimation of Traffic Flow Characteristics)
Show Figures

Figure 1

Figure 1
<p>Typical LoRaWAN architecture. (Source: authors’ image based on [<a href="#B51-applsci-14-09243" class="html-bibr">51</a>,<a href="#B52-applsci-14-09243" class="html-bibr">52</a>,<a href="#B53-applsci-14-09243" class="html-bibr">53</a>]).</p>
Full article ">Figure 2
<p>Architecture of the proposed solution. (Source: authors’ own image based on [<a href="#B51-applsci-14-09243" class="html-bibr">51</a>,<a href="#B52-applsci-14-09243" class="html-bibr">52</a>,<a href="#B53-applsci-14-09243" class="html-bibr">53</a>]).</p>
Full article ">Figure 3
<p>Road system in the Stare Babice commune (source: authors’ own image based on [<a href="#B61-applsci-14-09243" class="html-bibr">61</a>]).</p>
Full article ">Figure 4
<p>Topographic map of the Stare Babice commune. (Source: authors’ own image based on [<a href="#B71-applsci-14-09243" class="html-bibr">71</a>]).</p>
Full article ">Figure 5
<p>“Area” sub-path attenuation method. (Source: authors’ own image based on [<a href="#B72-applsci-14-09243" class="html-bibr">72</a>]).</p>
Full article ">Figure 6
<p>CompleTech ComAnt CAS+ antenna radiation characteristics [<a href="#B73-applsci-14-09243" class="html-bibr">73</a>].</p>
Full article ">Figure 7
<p>Impact of h<sub>GW</sub> transmitter station location height (10, 15, 20, and 25 m) on radio coverage.</p>
Full article ">Figure 8
<p>Impact of h<sub>EN</sub> receiving antenna height-wise positioning (2, 4, 6, and 8 m).</p>
Full article ">Figure 9
<p>Locations of transmitting stations (GWs) and distribution of area boundaries and roads.</p>
Full article ">Figure 10
<p>Radio coverage areas and values for six transmitting stations (GWs) within the preset area.</p>
Full article ">Figure 11
<p>Areas of radio coverage by individual GW transmitting stations.</p>
Full article ">Figure 12
<p>Area radio coverage with a signal exceeding the preset value.</p>
Full article ">
19 pages, 4342 KiB  
Review
A Survey on Data-Driven Approaches for Reliability, Robustness, and Energy Efficiency in Wireless Body Area Networks
by Pulak Majumdar, Satyaki Roy, Sudipta Sikdar, Preetam Ghosh and Nirnay Ghosh
Sensors 2024, 24(20), 6531; https://doi.org/10.3390/s24206531 - 10 Oct 2024
Viewed by 289
Abstract
Wireless Body Area Networks (WBANs) are pivotal in health care and wearable technologies, enabling seamless communication between miniature sensors and devices on or within the human body. These biosensors capture critical physiological parameters, ranging from body temperature and blood oxygen levels to real-time [...] Read more.
Wireless Body Area Networks (WBANs) are pivotal in health care and wearable technologies, enabling seamless communication between miniature sensors and devices on or within the human body. These biosensors capture critical physiological parameters, ranging from body temperature and blood oxygen levels to real-time electrocardiogram readings. However, WBANs face significant challenges during and after deployment, including energy conservation, security, reliability, and failure vulnerability. Sensor nodes, which are often battery-operated, expend considerable energy during sensing and transmission due to inherent spatiotemporal patterns in biomedical data streams. This paper provides a comprehensive survey of data-driven approaches that address these challenges, focusing on device placement and routing, sampling rate calibration, and the application of machine learning (ML) and statistical learning techniques to enhance network performance. Additionally, we validate three existing models (statistical, ML, and coding-based models) using two real datasets, namely the MIMIC clinical database and biomarkers collected from six subjects with a prototype biosensing device developed by our team. Our findings offer insights into strategies for optimizing energy efficiency while ensuring security and reliability in WBANs. We conclude by outlining future directions to leverage approaches to meet the evolving demands of healthcare applications. Full article
(This article belongs to the Special Issue Wearable Sensors for Physical Activity Monitoring and Motion Control)
Show Figures

Figure 1

Figure 1
<p>Spatiotemporal data correlation in wireless body area networks (WBANs). (<b>a</b>) Effect of redundancy on security, reliability, robustness, and energy efficiency. (<b>b</b>) System model showing the communication among sensors, coordinator nodes, and access points.</p>
Full article ">Figure 2
<p>Summary of methodologies surveyed based on different optimization goals and approaches.</p>
Full article ">Figure 3
<p>Energy efficiency and strategic node placement in WBANs. (<b>a</b>) Communication of an implant WBAN with the wireless access point. (<b>b</b>) Energy-efficient protocols for biosensor networks. (This figure was redrawn from [<a href="#B35-sensors-24-06531" class="html-bibr">35</a>]).</p>
Full article ">Figure 4
<p>Prototype device for the collection of physiological data (namely, blood oxygen levels and pulse rates). (<b>a</b>) Block diagram and IC MAX30100 placement. (<b>b</b>,<b>c</b>) Circuit connection between the XIAO ESP32-S3 development board and the sensors.</p>
Full article ">Figure 5
<p>Components of the prototype. (<b>a</b>) Overview. (<b>b</b>,<b>c</b>) Gateway device connection with cloud and power supply to MCU.</p>
Full article ">Figure 6
<p>WBAN deployment and the predictive accuracy of the isolation forest-based redundancy mitigation approach [<a href="#B48-sensors-24-06531" class="html-bibr">48</a>] (MIMIC dataset).</p>
Full article ">Figure 7
<p>Predictive accuracy of the statistical redundancy mitigation approach [<a href="#B49-sensors-24-06531" class="html-bibr">49</a>] (collected data).</p>
Full article ">Figure 8
<p>Predictive accuracy of the statistical redundancy mitigation approach [<a href="#B49-sensors-24-06531" class="html-bibr">49</a>].</p>
Full article ">Figure 9
<p>Redundancy minimization through compression achieved using GROWN [<a href="#B53-sensors-24-06531" class="html-bibr">53</a>].</p>
Full article ">Figure 10
<p>Reduction in the number of transmitted bits achieved using GROWN [<a href="#B53-sensors-24-06531" class="html-bibr">53</a>].</p>
Full article ">
15 pages, 7389 KiB  
Article
A Modular Smart Ocean Observatory for Development of Sensors, Underwater Communication and Surveillance of Environmental Parameters
by Øivind Bergh, Jean-Baptiste Danre, Kjetil Stensland, Keila Lima, Ngoc-Thanh Nguyen, Rogardt Heldal, Lars-Michael Kristensen, Tosin Daniel Oyetoyan, Inger Graves, Camilla Sætre, Astrid Marie Skålvik, Beatrice Tomasi, Bård Henriksen, Marie Bueie Holstad, Paul van Walree, Edmary Altamiranda, Erik Bjerke, Thor Storm Husøy, Ingvar Henne, Henning Wehde and Jan Erik Stiansenadd Show full author list remove Hide full author list
Sensors 2024, 24(20), 6530; https://doi.org/10.3390/s24206530 - 10 Oct 2024
Viewed by 315
Abstract
The rapid growth of marine industries has emphasized the focus on environmental impacts for all industries, as well as the influence of key environmental parameters on, for instance, offshore wind or aquaculture performance, animal welfare and structural integrity of different constructions. Development of [...] Read more.
The rapid growth of marine industries has emphasized the focus on environmental impacts for all industries, as well as the influence of key environmental parameters on, for instance, offshore wind or aquaculture performance, animal welfare and structural integrity of different constructions. Development of automatized sensors together with efficient communication and information systems will enhance surveillance and monitoring of environmental processes and impact. We have developed a modular Smart Ocean observatory, in this case connected to a large-scale marine aquaculture research facility. The first sensor rigs have been operational since May 2022, transmitting environmental data in near real-time. Key components are Acoustic Doppler Current Profilers (ADCPs) for measuring directional wave and current parameters, and CTDs for redundant measurement of depth, temperature, conductivity and oxygen. Communication is through 4G network or cable. However, a key purpose of the observatory is also to facilitate experiments with acoustic wireless underwater communication, which are ongoing. The aim is to expand the system(s) with demersal independent sensor nodes communicating through an “Internet of Underwater Things (IoUT)”, covering larger areas in the coastal zone, as well as open waters, of benefit to all ocean industries. The observatory also hosts experiments for sensor development, biofouling control and strategies for sensor self-validation and diagnostics. The close interactions between the experiments and the infrastructure development allow a holistic approach towards environmental monitoring across sectors and industries, plus to reduce the carbon footprint of ocean observation. This work is intended to lay a basis for sophisticated use of smart sensors with communication systems in long-term autonomous operation in remote as well as nearshore locations. Full article
Show Figures

Figure 1

Figure 1
<p>The surface units of the rigs at Austevoll. (<b>a</b>) The floating rig, seen from the research vessel. (<b>b</b>) Schematic drawing of the surface unit, showing the floaters (in red colour) (four on the surface, two at approx. 10 m depth). The grey unit contains the 4G transmitter and the batteries. The green and black lines are the connections between the units and to the lower parts of the rigs, where the sensors are (shown in <a href="#sensors-24-06530-f002" class="html-fig">Figure 2</a>).</p>
Full article ">Figure 2
<p>Schematic drawing of the two rigs at Austevoll: South (<b>left</b>) and North (<b>right</b>).</p>
Full article ">Figure 3
<p>Google maps picture of the facility showing the two sensor rigs and the fish farm facility (centre).</p>
Full article ">Figure 4
<p>Schematic representation of the bathygraphy of the Austevoll site, with the fish farm facility central and the two sensor rigs North (behind) and South (front).</p>
Full article ">Figure 5
<p>The website of the project SFI Smart Ocean [<a href="#B9-sensors-24-06530" class="html-bibr">9</a>]. Data from the rigs and various sensors are published here in near-real-time.</p>
Full article ">Figure 6
<p>Acoustic noise spectra measured at the Austevoll Research Station.</p>
Full article ">Figure 7
<p>Overview of the software architecture of the SFI Smart Ocean Platform.</p>
Full article ">
18 pages, 918 KiB  
Article
Self-Organizing and Routing Approach for Condition Monitoring of Railway Tunnels Based on Linear Wireless Sensor Network
by Haibo Yang, Huidong Guo, Junying Jia, Zhengfeng Jia and Aiyang Ren
Sensors 2024, 24(20), 6502; https://doi.org/10.3390/s24206502 - 10 Oct 2024
Viewed by 237
Abstract
Real-time status monitoring is crucial in ensuring the safety of railway tunnel traffic. The primary monitoring method currently involves deploying sensors to form a Wireless Sensor Network (WSN). Due to the linear characteristics of railway tunnels, the resulting sensor networks usually have a [...] Read more.
Real-time status monitoring is crucial in ensuring the safety of railway tunnel traffic. The primary monitoring method currently involves deploying sensors to form a Wireless Sensor Network (WSN). Due to the linear characteristics of railway tunnels, the resulting sensor networks usually have a linear topology known as a thick Linear Wireless Sensor Network (LWSN). In practice, sensors are deployed randomly within the area, and to balance the energy consumption among nodes and extend the network’s lifespan, this paper proposes a self-organizing network and routing method based on thick LWSNs. This method can discover the topology, form the network from randomly deployed sensor nodes, establish adjacency relationships, and automatically form clusters using a timing mechanism. In the routing, considering the cluster heads’ load, residual energy, and the distance to the sink node, the optimal next-hop cluster head is selected to minimize energy disparity among nodes. Simulation experiments demonstrate that this method has significant advantages in balancing network energy and extending network lifespan for LWSNs. Full article
(This article belongs to the Special Issue Energy Efficient Design in Wireless Ad Hoc and Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Long rectangular monitoring area.</p>
Full article ">Figure 2
<p>The workflow of thick LWSN.</p>
Full article ">Figure 3
<p>Monitoring area in Cartesian coordinate system.</p>
Full article ">Figure 4
<p>The unique location of node <math display="inline"><semantics> <msub> <mi>N</mi> <mi>i</mi> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>The maximum distance <span class="html-italic">L</span> between anchor nodes.</p>
Full article ">Figure 6
<p>Coordinates of node <math display="inline"><semantics> <msub> <mi>N</mi> <mi>i</mi> </msub> </semantics></math>.</p>
Full article ">Figure 7
<p>The connectivity of node <math display="inline"><semantics> <msub> <mi>N</mi> <mn>0</mn> </msub> </semantics></math>.</p>
Full article ">Figure 8
<p>The connectivity of node <math display="inline"><semantics> <msub> <mi>N</mi> <mi>i</mi> </msub> </semantics></math>.</p>
Full article ">Figure 9
<p>Clustering through the timing mechanism.</p>
Full article ">Figure 10
<p>The clusters of network.</p>
Full article ">Figure 11
<p>Number of surviving nodes.</p>
Full article ">Figure 12
<p>Number of cluster heads.</p>
Full article ">Figure 13
<p>Total system energy.</p>
Full article ">
20 pages, 1488 KiB  
Article
A Graph Convolutional Network-Based Method for Congested Link Identification
by Jiaqing Song, Xuewen Liao and Jiandong Qiao
Appl. Sci. 2024, 14(20), 9164; https://doi.org/10.3390/app14209164 - 10 Oct 2024
Viewed by 326
Abstract
Accurate and efficient congested link identification is crucial in wireless sensor networks (WSNs). However, in some networks with a centralized management architecture, it is often not feasible to monitor large numbers of internal links directly or even impossible in some heterogeneous networks. Network [...] Read more.
Accurate and efficient congested link identification is crucial in wireless sensor networks (WSNs). However, in some networks with a centralized management architecture, it is often not feasible to monitor large numbers of internal links directly or even impossible in some heterogeneous networks. Network tomography, the science of inferring the performance characteristics of a network’s interior by correlating sets of end-to-end measurements, was put forward to solve this problem. Nevertheless, a network always contains more links than end-to-end paths, making it problematic to find a determined solution. To solve this problem, most of the current methods try to use some additional prerequisites, such as the link congestion probability. However, most existing studies have not considered the congestion caused by node factors and the case of multiple congested links on one path. In this paper, we initially model the issue of link congestion as a Bayesian network model (BNM). Subsequently, we introduce a congestion link identification method based on graph convolutional networks (GCNs), novelly converting the intricate Bayesian network solving problem into a graph node classification task. The simulation results validate the feasibility of our proposed algorithm in identifying congested links and underscore its advantages in scenarios involving node congestion and multiple congested links. Full article
Show Figures

Figure 1

Figure 1
<p>A simple multiple-route topology.</p>
Full article ">Figure 2
<p>Congestion caused by node factors or channel factors.</p>
Full article ">Figure 3
<p>A simple multiple-route topology.</p>
Full article ">Figure 4
<p>BNM of the network.</p>
Full article ">Figure 5
<p>The graph constructed when <math display="inline"><semantics> <msub> <mi>r</mi> <mn>3</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>4</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>5</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>6</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>7</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mi>r</mi> <mn>8</mn> </msub> </semantics></math> are congested.</p>
Full article ">Figure 6
<p>The simplified graph when <math display="inline"><semantics> <msub> <mi>r</mi> <mn>3</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>4</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>5</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>6</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>7</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mi>r</mi> <mn>8</mn> </msub> </semantics></math> are congested.</p>
Full article ">Figure 7
<p>Transforming the task of congested link identification into graph node classification.</p>
Full article ">Figure 8
<p>GCN model structure.</p>
Full article ">Figure 9
<p>Schematic depiction of our entity classification model.</p>
Full article ">Figure 10
<p>Performance under different hidden units.</p>
Full article ">Figure 11
<p>DR versus different channel cause congestion probabilities.</p>
Full article ">Figure 12
<p>FPR versus different channel cause congestion probabilities.</p>
Full article ">Figure 13
<p>DR versus different congestion caused by node factor probabilities.</p>
Full article ">Figure 14
<p>FPR versus different congestion caused by node factor probabilities.</p>
Full article ">Figure 15
<p>Schematic diagram of binary tree network topology.</p>
Full article ">Figure 16
<p>DR versus different network size.</p>
Full article ">Figure 17
<p>FPR versus different network size.</p>
Full article ">
14 pages, 8277 KiB  
Article
Algorithmic Coverage Quantification and Visualization in Range-Free Sensor Networks
by Maria S. Zakynthinaki, Ioannis S. Barbounakis and Emmanuel N. Antonidakis
Appl. Syst. Innov. 2024, 7(5), 97; https://doi.org/10.3390/asi7050097 - 9 Oct 2024
Viewed by 406
Abstract
This study introduces a novel method that addresses the challenge of visualizing and quantifying detection coverage areas in wireless sensor networks. The method involves projecting a network of range-free sensors and pre-existing transmitters, located within a predefined area of interest, onto a global [...] Read more.
This study introduces a novel method that addresses the challenge of visualizing and quantifying detection coverage areas in wireless sensor networks. The method involves projecting a network of range-free sensors and pre-existing transmitters, located within a predefined area of interest, onto a global coordinate system. Detection areas are defined as those covered by the sensing range of at least three sensors. Pre-existing transmitters located within the detection range of the sensors are assumed to degrade the networks’ performance by causing coverage gaps. Interactive satellite maps facilitate the dynamic exploration of coverage via the calculation and visualization of the resulting detection areas. The algorithmic structure of the proposed tool is explained in detail, and four example scenarios demonstrate the tool’s capabilities, as well as its flexibility, adaptability, and effectiveness in identifying the triangulated detection areas. Designed primarily as a geometry calculation and visualization tool that allows for the adjustment of sensor parameters such as locations, ranges, and angular ranges of detection, the proposed tool has the potential to enhance decision-making in sensor network configuration, prior to final sensor placement, across a wide range of applications. Full article
Show Figures

Figure 1

Figure 1
<p>A bird’s eye view of the considered problem.</p>
Full article ">Figure 2
<p>Class diagram of the “Sensor” class.</p>
Full article ">Figure 3
<p>Flowchart describing the process of calculating the bearing angle between two given points.</p>
Full article ">Figure 4
<p>Illustration of how the presence of two nearby transmitters <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> <mi>R</mi> </mrow> <mrow> <mi>j</mi> </mrow> </msub> </mrow> </semantics></math>(represented in light green) and <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> <mi>R</mi> </mrow> <mrow> <mi>j</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> (represented in light red) creates blind zone openings for a sensor <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>R</mi> </mrow> <mrow> <mi>i</mi> </mrow> </msub> </mrow> </semantics></math>. The angle <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>θ</mi> </mrow> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msup> </mrow> </semantics></math> denotes the bearing between <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>R</mi> </mrow> <mrow> <mi>i</mi> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> <mi>R</mi> </mrow> <mrow> <mi>j</mi> </mrow> </msub> <mo>,</mo> </mrow> </semantics></math> with detection error ranging from <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>δ</mi> </mrow> <mrow> <mi>b</mi> <mi>e</mi> <mi>f</mi> <mi>o</mi> <mi>r</mi> <mi>e</mi> </mrow> </msub> </mrow> </semantics></math> to <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>δ</mi> </mrow> <mrow> <mi>a</mi> <mi>f</mi> <mi>t</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> </mrow> </semantics></math> degrees from the actual direction of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> <mi>R</mi> </mrow> <mrow> <mi>j</mi> </mrow> </msub> </mrow> </semantics></math>. (<b>a</b>) When <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>θ</mi> </mrow> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>+</mo> <mn>1</mn> </mrow> </msup> <mo>−</mo> <msup> <mrow> <mi>θ</mi> </mrow> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msup> </mrow> </semantics></math> &gt; <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>δ</mi> </mrow> <mrow> <mi>b</mi> <mi>e</mi> <mi>f</mi> <mi>o</mi> <mi>r</mi> <mi>e</mi> </mrow> </msub> <msub> <mrow> <mo>+</mo> <mi>δ</mi> </mrow> <mrow> <mi>a</mi> <mi>f</mi> <mi>t</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> <mo>,</mo> </mrow> </semantics></math> two separate blind zones are formed for <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>R</mi> </mrow> <mrow> <mi>i</mi> </mrow> </msub> </mrow> </semantics></math> due to transmitters <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> <mi>R</mi> </mrow> <mrow> <mi>j</mi> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> <mi>R</mi> </mrow> <mrow> <mi>j</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math>. (<b>b</b>) If <math display="inline"><semantics> <mrow> <msup> <mrow> <mi>θ</mi> </mrow> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>+</mo> <mn>1</mn> </mrow> </msup> <mo>−</mo> <msup> <mrow> <mi>θ</mi> </mrow> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msup> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <mo>&lt;</mo> </mrow> </semantics></math> <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>δ</mi> </mrow> <mrow> <mi>b</mi> <mi>e</mi> <mi>f</mi> <mi>o</mi> <mi>r</mi> <mi>e</mi> </mrow> </msub> <msub> <mrow> <mo>+</mo> <mi>δ</mi> </mrow> <mrow> <mi>a</mi> <mi>f</mi> <mi>t</mi> <mi>e</mi> <mi>r</mi> </mrow> </msub> </mrow> </semantics></math>, the blind zones caused by <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> <mi>R</mi> </mrow> <mrow> <mi>j</mi> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> <mi>R</mi> </mrow> <mrow> <mi>j</mi> <mo>+</mo> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> overlap, resulting in one combined blind zone for <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>R</mi> </mrow> <mrow> <mi>i</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Flowchart describing the process of approximating the q-th circular sector coverage zone of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>R</mi> </mrow> <mrow> <mi>i</mi> </mrow> </msub> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>q</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mo>…</mo> <mo>,</mo> <msub> <mrow> <mi>Q</mi> </mrow> <mrow> <mi>i</mi> </mrow> </msub> </mrow> </semantics></math>, as a list of polygon vertices <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>L</mi> </mrow> <mrow> <mi>i</mi> <mo>,</mo> <mi>q</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>A single sensor <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>R</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> positioned randomly on the map alongside four randomly placed TRs, with clear depiction of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>R</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math>’s blind zones.</p>
Full article ">Figure 7
<p>The same four TRs as in <a href="#asi-07-00097-f006" class="html-fig">Figure 6</a> with <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>S</mi> <mi>R</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math> relocated to a slightly different position, demonstrating the automatic adjustment of the blind zones.</p>
Full article ">Figure 8
<p>Triangulated detection areas of the five SRs of Scenario 3, shown in transparent red.</p>
Full article ">Figure 9
<p>Triangulated detection areas of the five SRs of Scenario 4, shown in transparent red.</p>
Full article ">
15 pages, 1563 KiB  
Article
Indeterministic Data Collection in UAV-Assisted Wide and Sparse Wireless Sensor Network
by Yu Du, Jianjun Hao, Zijing Chen and Yijun Guo
Sensors 2024, 24(19), 6496; https://doi.org/10.3390/s24196496 - 9 Oct 2024
Viewed by 342
Abstract
The widespread adoption of Internet of Things (IoT) applications has driven the demand for obtaining sensor data. Using unmanned aerial vehicles (UAVs) to collect sensor data is an effective means in scenarios with no ground communication facilities. In this paper, we innovatively consider [...] Read more.
The widespread adoption of Internet of Things (IoT) applications has driven the demand for obtaining sensor data. Using unmanned aerial vehicles (UAVs) to collect sensor data is an effective means in scenarios with no ground communication facilities. In this paper, we innovatively consider an indeterministic data collection task in a UAV-assisted wide and sparse wireless sensor network, where the wireless sensor nodes (SNs) obtain effective data randomly, and the UAV has no pre-knowledge about which sensor has effective data. The UAV trajectories, SN serve scheduling and UAV-SN association are jointly optimized to maximize the amount of collected effective sensing data. We model the optimization problem and address the indeterministic effective indicator by introducing an effectiveness probability prediction model. The reformulated problem remains challenging to solve due to the number of constraints varying with the variable, i.e., the serve scheduling strategy. To tackle this issue, we propose a two-layer modified knapsack algorithm, within which a feasibility problem is resolved iteratively to find the optimal packing strategy. Numerical results demonstrate that the proposed scheme has remarkable advantages in the sum of effective data blocks, reducing the completion time for collecting the same ratio of effective data by nearly 30%. Full article
Show Figures

Figure 1

Figure 1
<p>Indeterministic data collection in a UAV-assisted WS-WSN.</p>
Full article ">Figure 2
<p>The DNN network of the data effective probability prediction model.</p>
Full article ">Figure 3
<p>The loss value of training and validation at successive epochs.</p>
Full article ">Figure 4
<p>The ROC curve of performance evaluation on test dataset.</p>
Full article ">Figure 5
<p>The optimized UAV trajectories and SN serve scheduling of the EP-DNN scheme (<b>a</b>), the EP-RF scheme (<b>b</b>) and the NEP scheme (<b>c</b>) when <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math> s.</p>
Full article ">Figure 6
<p>The optimized UAV trajectories and SN serve scheduling of the EP-DNN scheme (<b>a</b>), the EP-RF scheme (<b>b</b>) and the NEP scheme (<b>c</b>) when <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>80</mn> </mrow> </semantics></math> s.</p>
Full article ">Figure 7
<p>The collection ratio of data blocks (DR) and effective data blocks (EDR) with respect to the flying period <span class="html-italic">T</span>.</p>
Full article ">Figure 8
<p>DR and EDR with respect to the data block size <math display="inline"><semantics> <msub> <mi>D</mi> <mn>0</mn> </msub> </semantics></math>, with <span class="html-italic">T</span> set as 80 s.</p>
Full article ">
17 pages, 7212 KiB  
Article
Zigbee-Based Wireless Sensor Network of MEMS Accelerometers for Pavement Monitoring
by Nicky Andre Prabatama, Mai Lan Nguyen, Pierre Hornych, Stefano Mariani and Jean-Marc Laheurte
Sensors 2024, 24(19), 6487; https://doi.org/10.3390/s24196487 - 9 Oct 2024
Viewed by 384
Abstract
In this paper, we propose a wireless sensor network for pavement health monitoring exploiting the Zigbee technology. Accelerometers are adopted to measure local accelerations linked to pavement vibrations, which are then converted into displacements by a signal processing algorithm. Each device consists of [...] Read more.
In this paper, we propose a wireless sensor network for pavement health monitoring exploiting the Zigbee technology. Accelerometers are adopted to measure local accelerations linked to pavement vibrations, which are then converted into displacements by a signal processing algorithm. Each device consists of an on-board unit buried in the roadway and a roadside unit. The on-board unit comprises a microcontroller, an accelerometer and a Zigbee module that transfers acceleration data wirelessly to the roadside unit. The roadside unit consists of a Raspberry Pi, a Zigbee module and a USB Zigbee adapter. Laboratory tests were conducted using a vibration table and with three different accelerometers, to assess the system capability. A typical displacement signal from a five-axle truck was applied to the vibration table with two different displacement peaks, allowing for two different vehicle speeds. The prototyped system was then encapsulated in PVC packaging, deployed and tested in a real-life road situation with a fatigue carousel featuring rotating truck axles. The laboratory and on-road measurements show that displacements can be estimated with an accuracy equivalent to that of a reference sensor. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) System Architecture; (<b>b</b>) prototype tested in the laboratory.</p>
Full article ">Figure 2
<p>(<b>a</b>) Block diagram of the embedded unit; (<b>b</b>) embedded unit prototype.</p>
Full article ">Figure 3
<p>(<b>a</b>) Block diagram of the roadside unit; (<b>b</b>) roadside unit system.</p>
Full article ">Figure 4
<p>Five-axle truck displacement signals used for the vibrating table.</p>
Full article ">Figure 5
<p>(<b>a</b>) Vibrating pot test; (<b>b</b>) vibrating table test.</p>
Full article ">Figure 6
<p>Description of the five steps adopted to extract the displacement time histories from raw acceleration data.</p>
Full article ">Figure 7
<p>Vibrating table tests: (<b>a</b>) example of raw acceleration signal; (<b>b</b>) velocity history after the first integration; (<b>c</b>) displacement history after the second time integration; (<b>d</b>) final displacement history provided by the Hilbert transform.</p>
Full article ">Figure 8
<p>Vibrating table tests featuring a peak displacement of 0.25 mm and a vehicle speed of 45 km/h: (<b>a</b>) exemplary raw ADXL355 acceleration signal; (<b>b</b>–<b>d</b>) displacement histories obtained with the adopted signal processing procedure applied to measurements collected with the three MEMS accelerometers.</p>
Full article ">Figure 9
<p>Vibrating table tests featuring a peak displacement of 0.5 mm and a vehicle speed of 45 km/h: (<b>a</b>) exemplary raw MS1002 acceleration signal; (<b>b</b>–<b>d</b>) displacement histories obtained with the adopted signal processing procedure applied to measurements collected with the three MEMS accelerometers.</p>
Full article ">Figure 10
<p>Vibrating table tests featuring a peak displacement of 0.25 mm and a vehicle speed of 18 km/h: (<b>a</b>) raw ADXL355 acceleration signal; (<b>b</b>–<b>d</b>) displacement histories obtained with measurements collected with the three MEMS accelerometers.</p>
Full article ">Figure 11
<p>Vibrating table tests featuring a peak displacement of 0.25 mm and a vehicle speed of 92 km/h: (<b>a</b>) raw ADXL355 acceleration signal; (<b>b</b>–<b>d</b>) displacement histories obtained with measurements collected with the three MEMS accelerometers.</p>
Full article ">Figure 12
<p>Designed and fabricated PVC packaging, and assembly of the embedded unit.</p>
Full article ">Figure 13
<p>(<b>a</b>) Device installation scheme; (<b>b</b>) installation of the device in the pavement.</p>
Full article ">Figure 14
<p>(<b>a</b>) Position of the roadside unit on the test track; (<b>b</b>) accelerated pavement testing setup.</p>
Full article ">Figure 15
<p>(<b>a</b>) Raw acceleration, and (<b>b</b>) displacement time history obtained with the reported signal processing strategy.</p>
Full article ">
26 pages, 16329 KiB  
Article
Quadcopters in Smart Agriculture: Applications and Modelling
by Katia Karam, Ali Mansour, Mohamad Khaldi, Benoit Clement and Mohammad Ammad-Uddin
Appl. Sci. 2024, 14(19), 9132; https://doi.org/10.3390/app14199132 - 9 Oct 2024
Viewed by 975
Abstract
Despite technological growth and worldwide advancements in various fields, the agriculture sector continues to face numerous challenges such as desertification, environmental pollution, resource scarcity, and the excessive use of pesticides and inorganic fertilizers. These unsustainable problems in agricultural field can lead to land [...] Read more.
Despite technological growth and worldwide advancements in various fields, the agriculture sector continues to face numerous challenges such as desertification, environmental pollution, resource scarcity, and the excessive use of pesticides and inorganic fertilizers. These unsustainable problems in agricultural field can lead to land degradation, threaten food security, affect the economy, and put human health at risk. To mitigate these global issues, it is essential for researchers and agricultural professionals to promote advancements in smart agriculture by integrating modern technologies such as Internet of Things (IoT), Unmanned Aerial Vehicles (UAVs), Wireless Sensor Networks (WSNs), and more. Among these technologies, this paper focuses on UAVs, particularly quadcopters, which can assist in each phase of the agricultural cycle and improve productivity, quality, and sustainability. With their diverse capabilities, quadcopters have become the most widely used UAVs in smart agriculture and are frequently utilized by researchers in various projects. To explore the different aspects of quadcopters’ use in smart agriculture, this paper focuses on the following: (a) the unique advantages of quadcopters over other UAVs, including an examination of the quadcopter types particularly used in smart agriculture; (b) various agricultural missions where quadcopters are deployed, with examples highlighting their indispensable role; (c) the modelling of quadcopters, from configurations to the derivation of mathematical equations, to create a well-modelled system that closely represents real-world conditions; and (d) the challenges that must be addressed, along with suggestions for future research to ensure sustainable development. Although the use of UAVs in smart agriculture has been discussed in other papers, to the best of our knowledge, none have specifically examined the most popular among them, “quadcopters”, and their particular use in smart agriculture in terms of types, applications, and modelling techniques. Therefore, this paper provides a comprehensive survey of quadcopters’ use in smart agriculture and offers researchers and engineers valuable insights into this evolving field, presenting a roadmap for future enhancements and developments. Full article
(This article belongs to the Special Issue Aerial Robotics and Vehicles: Control and Mechanical Design)
Show Figures

Figure 1

Figure 1
<p>Different quadcopter applications.</p>
Full article ">Figure 2
<p>Rotary-wing UAV types.</p>
Full article ">Figure 3
<p>Agricultural drone global market size over the years.</p>
Full article ">Figure 4
<p>DJI Phantom 3 Standard (photo by Cam Bradford, sourced from Unsplash under its free license [<a href="#B56-applsci-14-09132" class="html-bibr">56</a>]).</p>
Full article ">Figure 5
<p>DJI Matrice 100 (used with permission from Christiansen, Martin P. [<a href="#B60-applsci-14-09132" class="html-bibr">60</a>]).</p>
Full article ">Figure 6
<p>DJI Inspire 1 Pro (photo by Sam McGhee, sourced from Unsplash under its free license [<a href="#B66-applsci-14-09132" class="html-bibr">66</a>]).</p>
Full article ">Figure 7
<p>DJI Phantom 4 (photo by Billy Freeman, sourced from Unsplash under its free license [<a href="#B81-applsci-14-09132" class="html-bibr">81</a>]).</p>
Full article ">Figure 8
<p>DJI Mavic 2 Pro (photo by Jacob Buchhave, sourced from Unsplash under its free license [<a href="#B95-applsci-14-09132" class="html-bibr">95</a>]).</p>
Full article ">Figure 9
<p>Different custom-built quadcopters used in various agricultural missions: (<b>a</b>) furrow irrigation management (Long et al., 2016 [<a href="#B96-applsci-14-09132" class="html-bibr">96</a>]); (<b>b</b>) weed detection and herbicide spraying (Ukaegbu et al., 2021 [<a href="#B102-applsci-14-09132" class="html-bibr">102</a>]); (<b>c</b>) pneumatic planting system (Govender et al., 2022 [<a href="#B104-applsci-14-09132" class="html-bibr">104</a>]); (<b>d</b>) precision agriculture in a rice field (Muliady et al., 2023 [<a href="#B105-applsci-14-09132" class="html-bibr">105</a>]).</p>
Full article ">Figure 10
<p>Cross and plus configurations.</p>
Full article ">Figure 11
<p>Quadcopter reference frames.</p>
Full article ">
14 pages, 1739 KiB  
Article
Older Adult Fall Risk Prediction with Deep Learning and Timed Up and Go (TUG) Test Data
by Josu Maiora, Chloe Rezola-Pardo, Guillermo García, Begoña Sanz and Manuel Graña
Bioengineering 2024, 11(10), 1000; https://doi.org/10.3390/bioengineering11101000 - 5 Oct 2024
Viewed by 451
Abstract
Falls are a major health hazard for older adults; therefore, in the context of an aging population, predicting the risk of a patient suffering falls in the near future is of great impact for health care systems. Currently, the standard prospective fall risk [...] Read more.
Falls are a major health hazard for older adults; therefore, in the context of an aging population, predicting the risk of a patient suffering falls in the near future is of great impact for health care systems. Currently, the standard prospective fall risk assessment instrument relies on a set of clinical and functional mobility assessment tools, one of them being the Timed Up and Go (TUG) test. Recently, wearable inertial measurement units (IMUs) have been proposed to capture motion data that would allow for the building of estimates of fall risk. The hypothesis of this study is that the data gathered from IMU readings while the patient is performing the TUG test can be used to build a predictive model that would provide an estimate of the probability of suffering a fall in the near future, i.e., assessing prospective fall risk. This study applies deep learning convolutional neural networks (CNN) and recurrent neural networks (RNN) to build such predictive models based on features extracted from IMU data acquired during TUG test realizations. Data were obtained from a cohort of 106 older adults wearing wireless IMU sensors with sampling frequencies of 100 Hz while performing the TUG test. The dependent variable is a binary variable that is true if the patient suffered a fall in the six-month follow-up period. This variable was used as the output variable for the supervised training and validations of the deep learning architectures and competing machine learning approaches. A hold-out validation process using 75 subjects for training and 31 subjects for testing was repeated one hundred times to obtain robust estimations of model performances At each repetition, 5-fold cross-validation was carried out to select the best model over the training subset. Best results were achieved by a bidirectional long short-term memory (BLSTM), obtaining an accuracy of 0.83 and AUC of 0.73 with good sensitivity and specificity values. Full article
Show Figures

Figure 1

Figure 1
<p>The process of the realization of the TUG test decomposed into six phases.</p>
Full article ">Figure 2
<p>An instance of the readings of the G-walk during a TUG test realization shown as raw data plots: (<b>a</b>) triaxial accelerometer, and (<b>b</b>) triaxial gyroscope.</p>
Full article ">Figure 3
<p>Number of samples per recorded IMU sequence during the realization of TUG tests sorted in ascending order.</p>
Full article ">Figure 4
<p>Box-plot of each phase duration in TUG test. The median, upper-lower quartiles and maximum-minimum values are shown.</p>
Full article ">Figure 5
<p>Univariate Chi-Square Test importance ranking of TUG test phase input variables used by conventional machine learning classifiers.</p>
Full article ">Figure 6
<p>ROC curve with Point-wise Confidence Bounds of an instance of the 5-fold cross-validation of the BILSTM architecture. The dashed lines represent the chance ROC.</p>
Full article ">
24 pages, 7675 KiB  
Article
Coordinated Ship Welding with Optimal Lazy Robot Ratio and Energy Consumption via Reinforcement Learning
by Rui Yu and Yang-Yang Chen
J. Mar. Sci. Eng. 2024, 12(10), 1765; https://doi.org/10.3390/jmse12101765 - 5 Oct 2024
Viewed by 350
Abstract
Ship welding is a crucial part of ship building, requiring higher levels of robot coordination and working efficiency than ever before. To this end, this paper studies the coordinated ship-welding task, which involves multi-robot welding of multiple weld lines consisting of synchronous ones [...] Read more.
Ship welding is a crucial part of ship building, requiring higher levels of robot coordination and working efficiency than ever before. To this end, this paper studies the coordinated ship-welding task, which involves multi-robot welding of multiple weld lines consisting of synchronous ones to be executed by a pair of robots and normal ones that can be executed by one robot. To evaluate working efficiency, the objectives of optimal lazy robot ratio and energy consumption were considered, which are tackled by the proposed dynamic Kuhn–Munkres-based model-free policy gradient (DKM-MFPG) reinforcement learning algorithm. In DKM-MFPG, a dynamic Kuhn–Munkres (DKM) dispatcher is designed based on weld line and co-welding robot position information obtained by the wireless sensors, such that robots always have dispatched weld lines in real-time and the lazy robot ratio is 0. Simultaneously, a model-free policy gradient (MFPG) based on reinforcement learning is designed to achieve the energy-optimal motion control for all robots. The optimal lazy robot ratio of the DKM dispatcher and the network convergence of MFPG are theoretically analyzed. Furthermore, the performance of DKM-MFPG is simulated with variant settings of welding scenarios and compared with baseline optimization methods. Compared to the four baselines, DKM-MFPG owns a slight performance advantage within 1% on energy consumption and reduces the average lazy robot ratio by 11.30%, 10.99%, 8.27%, and 10.39%. Full article
(This article belongs to the Special Issue Ship Wireless Sensor)
Show Figures

Figure 1

Figure 1
<p>An example of the coordinated ship-welding task.</p>
Full article ">Figure 2
<p>Motion of robots on the gantry.</p>
Full article ">Figure 3
<p>The DKM-MFPG framework.</p>
Full article ">Figure 4
<p>An example of the DKM dispatcher for Case 2.</p>
Full article ">Figure 5
<p>Trajectories of robots for S1–S5 under DKM-MFPG.</p>
Full article ">Figure 5 Cont.
<p>Trajectories of robots for S1–S5 under DKM-MFPG.</p>
Full article ">Figure 6
<p>Number of non-lazy robots for S1–S5 under DKM-MFPG.</p>
Full article ">Figure 7
<p>Time histories of state, action, energy, and weights of DKM-MFPG under S1–S5.</p>
Full article ">Figure 8
<p>Pareto front of all methods under S1–S5.</p>
Full article ">Figure 8 Cont.
<p>Pareto front of all methods under S1–S5.</p>
Full article ">
22 pages, 1199 KiB  
Article
LSTM Gate Disclosure as an Embedded AI Methodology for Wearable Fall-Detection Sensors
by Sérgio D. Correia, Pedro M. Roque and João P. Matos-Carvalho
Symmetry 2024, 16(10), 1296; https://doi.org/10.3390/sym16101296 - 2 Oct 2024
Viewed by 402
Abstract
In this paper, the concept of symmetry is used to design the efficient inference of a fall-detection algorithm for elderly people on embedded processors—that is, there is a symmetric relation between the model’s structure and the memory footprint on the embedded processor. Artificial [...] Read more.
In this paper, the concept of symmetry is used to design the efficient inference of a fall-detection algorithm for elderly people on embedded processors—that is, there is a symmetric relation between the model’s structure and the memory footprint on the embedded processor. Artificial intelligence (AI) and, more particularly, Long Short-Term Memory (LSTM) neural networks are commonly used in the detection of falls in the elderly population based on acceleration measures. Nevertheless, embedded systems that may be utilized on wearable or wireless sensor networks have a hurdle due to the customarily massive dimensions of those networks. Because of this, the algorithms’ most popular implementation relies on edge or cloud computing, which raises privacy concerns and presents challenges since a lot of data need to be sent via a communication channel. The current work proposes a memory occupancy model for LSTM-type networks to pave the way to more efficient embedded implementations. Also, it offers a sensitivity analysis of the network hyper-parameters through a grid search procedure to refine the LSTM topology network under scrutiny. Lastly, it proposes a new methodology that acts over the quantization granularity for the embedded AI implementation on wearable devices. The extensive simulation results demonstrate the effectiveness and feasibility of the proposed methodology. For the embedded implementation of the LSTM for the fall-detection problem on a wearable platform, one can see that an STM8L low-power processor could support a 40-hidden-cell LSTM network with an accuracy of 96.52%. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Figure 1
<p>LSTM cell internal structure.</p>
Full article ">Figure 2
<p>Neural network topology for the fall-detection problem.</p>
Full article ">Figure 3
<p>Memory occupancy for 2 LSTM layers, 1 FC layer, 8 bytes representation.</p>
Full article ">Figure 4
<p>Memory occupancy for 2 LSTM layers, 1 FC layer, and 4 bytes representation.</p>
Full article ">Figure 5
<p>Deep network topology for the fall-detection problem.</p>
Full article ">Figure 6
<p>Accuracy and loss of the validation data samples.</p>
Full article ">Figure 7
<p>Accuracyvs. precision vs. recall.</p>
Full article ">Figure 8
<p>Confusionmatrix for 1 LSTM layer with cell size of 100.</p>
Full article ">Figure 9
<p>Accuracyand memory occupancy of 1 LSTM layer for different microcontrollers.</p>
Full article ">Figure 10
<p>Workflow of the data types at the inference stage.</p>
Full article ">Figure 11
<p>LSTM and FC weights and bias histograms vs. equivalent normal distribution.</p>
Full article ">Figure 12
<p>Distribution of the LSTM bias between the different gates.</p>
Full article ">Figure 13
<p>Quantization, inference, and simulation methodology.</p>
Full article ">Figure 14
<p>Confusion matrices of the quantized networks with state-of-the-art uniform quantization.</p>
Full article ">Figure 15
<p>Confusion matrix of the quantized networks when applying the proposed Gate Disclosure.</p>
Full article ">Figure 16
<p>Confusion matrix of the quantized networks when applying the proposed Gate Disclosure.</p>
Full article ">Figure 17
<p>Accuracy and memory occupancy of 1 LSTM layer for different microcontrollers and different quantization representations.</p>
Full article ">
40 pages, 2732 KiB  
Review
Security with Wireless Sensor Networks in Smart Grids: A Review
by Selcuk Yilmaz and Murat Dener
Symmetry 2024, 16(10), 1295; https://doi.org/10.3390/sym16101295 - 2 Oct 2024
Viewed by 814
Abstract
Smart Grids are an area where next-generation technologies, applications, architectures, and approaches are utilized. These grids involve equipping and managing electrical systems with information and communication technologies. Equipping and managing electrical systems with information and communication technologies, developing data-driven solutions, and integrating them [...] Read more.
Smart Grids are an area where next-generation technologies, applications, architectures, and approaches are utilized. These grids involve equipping and managing electrical systems with information and communication technologies. Equipping and managing electrical systems with information and communication technologies, developing data-driven solutions, and integrating them with Internet of Things (IoT) applications are among the significant applications of Smart Grids. As dynamic systems, Smart Grids embody symmetrical principles in their utilization of next-generation technologies and approaches. The symmetrical integration of Wireless Sensor Networks (WSNs) and energy harvesting techniques not only enhances the resilience and reliability of Smart Grids but also ensures a balanced and harmonized energy management system. WSNs carry the potential to enhance various aspects of Smart Grids by offering energy efficiency, reliability, and cost-effective solutions. These networks find applications in various domains including power generation, distribution, monitoring, control management, measurement, demand response, pricing, fault detection, and power automation. Smart Grids hold a position among critical infrastructures, and without ensuring their cybersecurity, they can result in national security vulnerabilities, disruption of public order, loss of life, or significant economic damage. Therefore, developing security approaches against cyberattacks in Smart Grids is of paramount importance. This study examines the literature on “Cybersecurity with WSN in Smart Grids,” presenting a systematic review of applications, challenges, and standards. Our goal is to demonstrate how we can enhance cybersecurity in Smart Grids with research collected from various sources. In line with this goal, recommendations for future research in this field are provided, taking into account symmetrical principles. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Figure 1
<p>Smart Grids.</p>
Full article ">Figure 2
<p>Wireless Sensor Networks.</p>
Full article ">Figure 3
<p>Fundamentals of information security.</p>
Full article ">Figure 4
<p>Access control.</p>
Full article ">Figure 5
<p>Secure routing.</p>
Full article ">Figure 6
<p>Secure clustering.</p>
Full article ">Figure 7
<p>Key management.</p>
Full article ">Figure 8
<p>Encryption algorithms in WSNs.</p>
Full article ">
Back to TopTop