You are here
Search results
(1 - 20 of 27)
Pages
- Title
- Advanced data analysis framework for damage identification in civil infrastructure based on self-powered sensing
- Creator
- Alavi, Amir Hossein
- Date
- 2016
- Collection
- Electronic Theses & Dissertations
- Description
-
"This interdisciplinary research proposes an advanced data analysis framework for civil infrastructure/structural health monitoring (I/SHM) based on a pioneering self-powered sensing technology. The current work characterizes the performance of a fairly new class of self-powered sensors for specific application problems with complex behavior. The proposed health monitoring systems are established through the integration of statistical, artificial intelligence and finite element methods....
Show more"This interdisciplinary research proposes an advanced data analysis framework for civil infrastructure/structural health monitoring (I/SHM) based on a pioneering self-powered sensing technology. The current work characterizes the performance of a fairly new class of self-powered sensors for specific application problems with complex behavior. The proposed health monitoring systems are established through the integration of statistical, artificial intelligence and finite element methods. Different infrastructure systems with various damage types are analyzed. A new probabilistic artificial intelligence-based damage detection technique is developed that hybridizes genetic programming and logistic regression algorithms. The proposed multi-class classification system assigns probabilities to model scores to detect damage progression. A probabilistic neural network method based on Bayesian theory is further introduced to improve the damage detection accuracy. Data obtained from the finite element simulations and experimental study of hybrid sensor networks is used to calibrate the data interpretation algorithms. The network architecture comprises self-powered sensors that use the electrical energy directly harvested by piezoelectric ceramic Lead Zirconate Titanate (PZT) transducers. The beauty of this so-called self-powered monitoring system is that the operating power for the smart sensors directly comes from the signal being monitored. An advantage of using these sensors is that there is no need to directly measure the absolute value of strain in order to estimate damage. In fact, the proposed self-sustained sensing systems use the sensor output to relate the variation rate of strain distributions to the rate of damage. The proposed data analysis framework consists of multilevel strategies for structural/infrastructure damage identification through: (a) analysis of individual self-powered strain sensors, (b) data fusion in a network of self-powered strain sensors, and (c) data analysis in a hybrid network of self-powered accelerometer and strain sensors. For each of these levels, several damage indicator features are extracted upon the simulation of the compressed data stored in memory chips of the self-powered sensors. A new data fusion concept based on the effect of group of sensors, termed as "group effect", is proposed. The goal is to improve the damage detection performance through spatial measurements over structures. Moreover, combination of the data from a network of accelerometer and strain sensors results in developing an integrated global-local damage detection approach. The investigated cases are crack growth detection in steel plates under a uniaxial tension mode, distortion-induced fatigue cracking in steel bridge girders, continuous health monitoring of pavement systems, failure of simply supported beam under three-point bending, and failure of gusset plate of the I-35W highway bridge in Minneapolis, Minnesota. 3D dynamic finite element models are developed for each of the cases. The experimental studies are carried out on a steel plate subjected to an in-plane tension, a steel plate with bolted connections, and on asphalt concrete specimens in three-point bending mode. PZT-5A ceramic discs and PZT-5H bimorph accelerometers are placed on the surface of the plates to measure the delivered voltage in each damage phase. For the asphalt experiments, a new miniaturized spherical packaging system is designed and tested to protect the PZT ceramic discs embedded inside the specimen. Uncertainty analyses are performed through the contamination of the damage indicator features with different noise levels. The results indicate that the proposed I/SHM systems are efficiently capable of detecting different damage states in spite of high-level noise contamination."--Pages ii-iii.
Show less
- Title
- Development of small biomimetic robotic fish with onboard fine-grained localization
- Creator
- Shatara, Stephan W.
- Date
- 2008
- Collection
- Electronic Theses & Dissertations
- Title
- A progressive reliability framework for wireless sensor networks
- Creator
- Qaisar, Saad Bin
- Date
- 2009
- Collection
- Electronic Theses & Dissertations
- Title
- Off-network control processing for scalable routing in very large sensor networks
- Creator
- Wu, Tao
- Date
- 2008
- Collection
- Electronic Theses & Dissertations
- Title
- Analytical and quantitative characterization of wireless sensor networks
- Creator
- Ilyas, Muhammad Usman
- Date
- 2009
- Collection
- Electronic Theses & Dissertations
- Title
- Environmental acoustics as an ecological variable to understand the dynamics of ecosystems
- Creator
- Joo, Wooyeong
- Date
- 2009
- Collection
- Electronic Theses & Dissertations
- Title
- Providing source privacy in wireless sensor networks
- Creator
- Li, Yun
- Date
- 2010
- Collection
- Electronic Theses & Dissertations
- Title
- Mobility and communication in wireless robot and sensor networks
- Creator
- Pei, Yuanteng
- Date
- 2011
- Collection
- Electronic Theses & Dissertations
- Description
-
Mobility is a primary goal of many wireless communication systems. In recent years, mobile multi-hop wireless networks, such as mobile wireless sensor networks and wireless robot networks, have attracted increased attention and have been extensively studied. However, most current research does not consider the interdependence of communication and mobility and much assume an obstacle-free environment in their problem modeling and solving process.In this dissertation, we discuss several...
Show moreMobility is a primary goal of many wireless communication systems. In recent years, mobile multi-hop wireless networks, such as mobile wireless sensor networks and wireless robot networks, have attracted increased attention and have been extensively studied. However, most current research does not consider the interdependence of communication and mobility and much assume an obstacle-free environment in their problem modeling and solving process.In this dissertation, we discuss several research topics relevant to the above two issues of communication and mobility in wireless robot and sensor networks. First, we present multi-robot real-time exploration, which calls for the joint consideration of mobility and communication: it requires video and audio streams of a newly explored area be transmitted to the base station in a timely fashion as robots explore the area. Simulations show that our mobility model has achieved both improved communication quality and enhanced exploration efficiency.Second, we further investigate the above problem with two critical and real-world network conditions: (1) heterogeneous transmission ranges and link capacities, and (2) the impact of interference. The conditions increase the model complexity but significantly influence the actual available bandwidth and the required node size in placement. We jointly consider the relay placement and routing with these two critical conditions.Third, we introduce an online relay deployment paradigm to support remote sensing and control when mobile nodes migrate farther from the base station in a cost-effective system of mobile robots, static sensors and relays. A novel multi-robot real-time search method called STAtic Relay aided Search (STARS) is presented to allow robots to search in a known environment. Its solution is based on our near-optimal solution to a new variation of the multi-traveling salesman problem: precedence constrained two traveling salesman (PC2TSP).Fourth, we propose a heterogenous multi-robot exploration strategy with online relay deployment for an unknown environment called Bandwidth aware Exploration with a Steiner Traveler (BEST). In BEST, a relay-deployment node (RDN) tracks the FNs movement and places relays when necessary to support the video/audio streams aggregation to the base station. This problem inherits characteristics of both the Steiner minimum tree and traveling salesman problems. Extensive simulations show that BEST further enhances the exploration efficiency.While the first four topics deal with communication and mobility issues in powerful but expensive robotic systems, the fifth topic focuses on a special type of low cost, limited capability mobile sensors called hopping sensors, whose unique method of movement makes them suitable for rugged terrains. We present (1) a distributed message forwarding model called Binary Splitting Message Forwarding (BSMF) and (2) a grid based movement model unique to these hopping sensors. Simulation shows that our scheme significantly reduces the communication overhead and achieves relatively constant total energy consumption with varying amount of obstructions.Finally, we discuss the future work directions of this research work. We believe that a heterogeneous mobile platform to support real-time stream transmission by mobile robots, static sensor and communication devices, have great potential in various civilian and military applications, where the communication quality of service is critically important, as well as the mobility efficiency.
Show less
- Title
- Cost-aware routing protocols for location-privacy and efficiency in wireless sensor networks
- Creator
- Lightfoot, Leron J.
- Date
- 2015
- Collection
- Electronic Theses & Dissertations
- Description
-
Wireless sensor networks (WSNs) can provide the world with a technology for real-time event monitoring for both military and civilian applications. One of the primary concerns that hinders the successful deployment of wireless sensor networks is how to provide adequate source and destination nodes location privacy. The privacy of the location is vital and highly jeopardized by the usage of wireless communications. While message content privacy can be ensured through message encryption, it is...
Show moreWireless sensor networks (WSNs) can provide the world with a technology for real-time event monitoring for both military and civilian applications. One of the primary concerns that hinders the successful deployment of wireless sensor networks is how to provide adequate source and destination nodes location privacy. The privacy of the location is vital and highly jeopardized by the usage of wireless communications. While message content privacy can be ensured through message encryption, it is much more difficult to adequately address the location privacy issue. For WSNs, location privacy service is further complicated by the fact that sensors consist of low-cost and energy efficient radio devices. Therefore, using computationally intensive cryptographic algorithms (such as public-key cryptosystems) and large scale broadcasting-based protocols are not suitable for WSNs.Many protocols have been proposed to provide location privacy but most of them are based on public-key cryptosystems, while others are either energy inefficient or have certain security flaws. After analyzing the security weaknesses of the existing schemes, we propose several creative and secure energy-aware routing protocols that can address the location privacy issue in WSNs. For source-location privacy, we propose 3 schemes. The first scheme routes each message to a randomly selected intermediate node (RSIN) before it is transmitted to the SINK node. However, this scheme can only provide local source-location privacy. In the second scheme, a network mixing ring (NMR) is proposed to provide network-level source-location privacy. The third scheme achieves network-level source-location privacy through a technique we call the Sink Toroidal Region (STaR) routing. For destination-location privacy, we propose the Bubble routing protocol and a series of R-STaR routing protocols. For each of these routing schemes, both security analysis using quantitative measurements and simulation results show that the proposed protocols are secure and energy-efficient.While providing location privacy is vital, prolonging the lifetime of the network can be a very essential component as well. In this dissertation, we propose a cluster-based energy-aware routing scheme, called Quad-Region Cluster-Head Selection (Q-ReCHS), which will prolong the network lifetime by evenly distributing the energy load among all the nodes. Our extensive simulation results on cluster-based routing demonstrates that our proposed Q-ReCHS scheme can out perform many of the existing schemes.
Show less
- Title
- Improving spectrum efficiency in heterogeneous wireless networks
- Creator
- Liu, Chin-Jung
- Date
- 2018
- Collection
- Electronic Theses & Dissertations
- Description
-
Over the past decades, the bandwidth-intensive applications that are previously confined to wired networks are now migrating to wireless networks. This trend has brought unprecedented high demand for wireless bandwidth. The wireless traffic is destined to dominate the Internet traffic in the future, but many of the popular wireless spectrum bands, especially the cellular and ISM bands, are already congested. On the other hand, some other wireless technologies, such as TV bands, often do not...
Show moreOver the past decades, the bandwidth-intensive applications that are previously confined to wired networks are now migrating to wireless networks. This trend has brought unprecedented high demand for wireless bandwidth. The wireless traffic is destined to dominate the Internet traffic in the future, but many of the popular wireless spectrum bands, especially the cellular and ISM bands, are already congested. On the other hand, some other wireless technologies, such as TV bands, often do not fully utilize their spectrum. However, the spectrum allocation is tightly regulated by the authority and adjusting the allocation is extremely difficult. The uneven utilization and the rigid regulation have led to the proposal of heterogeneous wireless networks, including cognitive radio networks (CRN) and heterogeneous cellular networks (HetNet). The CRNs that usually operate on different technologies from the spectrum owner attempt to reuse the idle spectrum (i.e., white space) from the owner, while HetNets attempt to improve spectrum utilization by smallcells. This dissertation addresses some of the challenging problems in these heterogeneous wireless networks.In CRNs, the secondary users (SU) are allowed to access the white spaces opportunistically as long as the SUs do not interfere with the primary users (PU, i.e., the spectrum owner). The CRN provides a promising means to improve spectral efficiency, which also introduces a set of new research challenges. We identify and discuss two problems in CRNs, namely non-contiguous control channel establishment and k-protected routing protocol design. The first problem deals with the need from SUs for a channel to transfer control information. Most existing approaches are channel-hopping (CH) based, which is inapplicable to NC-OFDM. We propose an efficient method for guaranteed NC-OFDM-based control channel establishment by utilizing short pulses on OFDM subcarriers. The results show that the time needed for establishing control channel is lower than that of CH-based approaches. The second problem deals with the interruption to a routing path in a CRN when a PU becomes active again. Existing reactive approaches that try to seek for an alternative route after PU returns suffer from potential long delay and possible interruption if an alternative cannot be found. We propose a k-protected routing protocol that builds routing paths with preassigned backups that are guaranteed to sustain from k returning PUs without being interrupted. Our result shows that the k-protected routing paths are never interrupted even when k PUs return, and have significantly shorter backup activation delays.HetNets formed by smallcells with different sizes of coverage and macrocells have been proposed to satisfy increased bandwidth demand with the limited and crowded wireless spectrum. Since the smallcells and macrocells operate on the same frequency, interference becomes a critical issue. Detecting and mitigating interference are two of the challenges introduced by HetNets. We first study the interference identification problem. Existing interference identification approaches often regard more cells as interferers than necessary. We propose to identify interference by analyzing the received patterns observed by the mobile stations. The result shows that our approach identifies all true interferers and excludes most non-interfering cells. The second research problem in HetNets is to provide effective solutions to mitigate the interference. The interference mitigation approaches in the literature mainly try to avoid interference, such as resource isolation that leads to significantly fewer resources, or power control that sacrifices signal quality and coverage. Instead of conservatively avoiding interference, we propose to mitigate the interference by precanceling the interfering signals from known interferers. With precancellation, the same set of resources can be shared between cells and thus throughput is improved.This dissertation addresses several challenges in heterogeneous wireless networks, including CRNs and HetNets. The proposed non-contiguous control channel protocol and k-protected routing protocol for CRNs can significantly improve the feasibility of CRNs in future wireless network applications. The proposed interference identification and interference precancellation approaches can effectively mitigate the interference and improve the throughput and spectrum utilization in HetNets. This dissertation aims at breaking the barriers for supporting heterogeneous wireless networks to improve the utilization of the precious and limited wireless spectrum.
Show less
- Title
- Reliable and efficient communications in wireless sensor networks
- Creator
- Abdelhakim, Mai M.
- Date
- 2014
- Collection
- Electronic Theses & Dissertations
- Description
-
Wireless sensor network (WSN) is a key technology for a wide range of military and civilian applications. Limited by the energy resources and processing capabilities of the sensor nodes, reliable and efficient communications in wireless sensor networks are challenging, especially when the sensors are deployed in hostile environments. This research aims to improve the reliability and efficiency of time-critical communications in WSNs, under both benign and hostile environments.We start with...
Show moreWireless sensor network (WSN) is a key technology for a wide range of military and civilian applications. Limited by the energy resources and processing capabilities of the sensor nodes, reliable and efficient communications in wireless sensor networks are challenging, especially when the sensors are deployed in hostile environments. This research aims to improve the reliability and efficiency of time-critical communications in WSNs, under both benign and hostile environments.We start with wireless sensor network with mobile access points (SENMA), where the mobile access points traverse the network to collect information from individual sensors. Due to its routing simplicity and energy efficiency, SENMA has attracted lots of attention from the research community. Here, we study reliable distributed detection in SENMA under Byzantine attacks, where some authenticated sensors are compromised to report fictitious information. The q-out-of-m rule is considered. It is popular in distributed detection and can achieve a good trade-off between the miss detection probability and the false alarm rate. However, a major limitation with this rule is that the optimal scheme parameters can only be obtained through exhaustive search. By exploiting the linear relationship between the scheme parameters and the network size, we propose simple but effective sub-optimal linear approaches. Then, for better flexibility and scalability, we derive a near-optimal closed-form solution based on the central limit theorem. It is proved that the false alarm rate of the q-out-of-m scheme diminishes exponentially as the network size increases, even if the percentage of malicious nodes remains fixed. This implies that large-scale sensor networks are more reliable under malicious attacks. To further improve the performance under time-varying attacks, we propose an effective malicious node detection scheme for adaptive data fusion; the proposed scheme is analyzed using the entropy-based trust model, and has shown to be optimal from the information theory point of view.Next, we observe that: while simplifying the routing process, a major limitation with SENMA is that data transmission is limited by the physical speed of the mobile access points (MAs) and the length of their trajectory, resulting in low throughput and large delay. To solve this problem, we propose a novel mobile access coordinated wireless sensor network (MC-WSN) architecture. The proposed MC-WSN can provide reliable and time-sensitive information exchange through hop number control, which is achieved by active network development and topology design. We discuss the optimal topology design for MC-WSN such that the average number of hops between the source and its nearest sink is minimized, and analyze the performance of MC-WSN in terms of throughput, stability, delay, and energy efficiency by exploiting tools in information theory, queuing theory, and radio energy dissipation model. It is shown that MC-WSN achieves much higher throughput and significantly lower delay and energy consumption than that of SENMA.Finally, motivated by the observation that the number of hops in data transmission has a direct impact on the network performance, we introduce the concept of the N-hop networks. Based on the N-hop concept, we propose a unified framework for wireless networks and discuss general network design criteria. The unified framework reflects the convergence of centralized and ad-hoc networks. It includes all exiting network models as special cases, and makes the analytical characterization of the network performance more tractable. Further study on N-hop networks will be conducted in our future research.
Show less
- Title
- Design and implementation of integrated self-powered sensors, circuits and systems
- Creator
- Huang, Chenling
- Date
- 2011
- Collection
- Electronic Theses & Dissertations
- Description
-
Wireless sensor systems have been widely used for both industrial and civil applications. With the development of circuit design and fabrication technique, sensor nodes now can be implemented with small scale at low cost, which is promising for ubiquitous sensing. However, with more functions integrated, the conflict between power consumption and expected lifetime became critical. Sensor nodes powered with batteries are generally compromised by extra physical size and periodic battery...
Show moreWireless sensor systems have been widely used for both industrial and civil applications. With the development of circuit design and fabrication technique, sensor nodes now can be implemented with small scale at low cost, which is promising for ubiquitous sensing. However, with more functions integrated, the conflict between power consumption and expected lifetime became critical. Sensor nodes powered with batteries are generally compromised by extra physical size and periodic battery replacement. Therefore, energy harvesting techniques are intensively involved in sensor design where environmental signal acts as auxiliary energy source.A typical energy harvesting sensor consists of four parts: energy harvester, energy storage, power management and sensor subsystem. Energy harvester scavenges power from environmental signal which is then transferred into energy storage. Since the output power is usually not in appropriate form, power management is used to provide a usable supply voltage/current for sensor subsystem. The limitation of energy harvesting sensor is determined by the power consumption of sensor subsystem, the efficiency of energy conversion and the available energy level from environment.In this dissertation, a novel solution referred as "self-powered sensor" is proposed to extend the limitation of energy harvesting sensor. The proposed sensor can directly harvest energy from input signal being sensed. Therefore the usage of energy storage and power management is eliminated, which achieves higher energy efficiency.To demonstrate proposed solution, the system and circuit design of a self-powered sensor are presented for long-term ambient vibration monitoring. Constrained by its application, the sensor can only scavenge energy from input strain signal itself, in which scenario all existing energy harvesting techniques fail. The greatest design challenge is to achieve both ultra-low power computation and non-volatile storage. In this dissertation, a novel technique based on floating-gate transistor is presented. By exploiting controllable hot electron injection procedure, specific computation can be performed according to the characteristic of input signal. In addition, floating-gates can also retain computation results with no power consumption.For autonomous sensing, a hybrid energy harvesting topology is proposed on system level. The sensor is designed with two different operation modes. In self-powered sensing mode, it can perform continuous monitoring, computation and data storage which is powered by input strain signal. In data interrogating mode, additional functions such as data sampling and wireless communication can be enabled once a certain reading device is provided.The dissertation is organized as follows. In chapter 1, the history of wireless sensor system is reviewed. The motivation of self-powered sensor and the contributions of this dissertation are presented. Existing energy harvesting techniques are evaluated in chapter 2. In chapter 3, the case of long-term ambient vibration monitoring is studied and the hybrid energy harvesting topology is proposed for self-powered sensor system. In chapter 4, the principle of ultra-low power computation and non-volatile storage is explored based on controllable injection procedure on floating-gate transistor. To verified proposed solution, a sensor prototype was fabricated in 0.5-um standard CMOS process. The details of circuit design and evaluation are presented in chapter 5, including analog signal processor, analog-to-digital converter, radio frequency front-end, digital baseband, etc. Chapter 6 shows an extension of ultrasonic powering and communication system based on preliminary work and chapter 7 draws final remarks.
Show less
- Title
- Preserving source-location privacy in wireless sensor networks
- Creator
- Lightfoot, Leron J.
- Date
- 2010
- Collection
- Electronic Theses & Dissertations
- Description
-
Wireless sensor networks (WSNs) can provide the world with a technology for real-time event monitoring for both military and civilian applications. One of the primary concerns that hinder the successful deployment of wireless sensor networks is source-location privacy. The privacy of the source location is vital and highly jeopardized by the usage of wireless communications.While message content privacy can be ensured through message encryption, it is much more difficult to adequately address...
Show moreWireless sensor networks (WSNs) can provide the world with a technology for real-time event monitoring for both military and civilian applications. One of the primary concerns that hinder the successful deployment of wireless sensor networks is source-location privacy. The privacy of the source location is vital and highly jeopardized by the usage of wireless communications.While message content privacy can be ensured through message encryption, it is much more difficult to adequately address the source-location privacy. For WSNs, source-location privacy service is further complicated by the fact that sensors consist of low-cost and energy efficient radio devices. Therefore, using computationally intensive cryptographic algorithms (such as public-key cryptosystems) and large scale broadcasting-based protocols are not suitable for WSNs.Many protocols have been proposed to provide source-location privacy but most of them are based on public-key cryptosystems, while others are either energy inefficient or have certain security flaws. In this thesis, after analyzing the security weakness of the existing scheme, we propose three routing-based source-location privacy schemes. The first scheme routes each message to a randomly selected intermediate node before it is transmitted to the SINK node. However, this scheme can only provide local source-location privacy. In the second scheme, a network mixing ring (NMR) is proposed to provide network-level source-location privacy. The third scheme achieve network-level source-location privacy through a technique we call the Sink Toroidal Region (STaR) routing. For each of these routing schemes, both security analysis and simulation results show that the proposed schemes are secure and efficient.
Show less
- Title
- Towards discrete-pulse-based networking and event detection architectures for resource-constrained applications
- Creator
- Das, Saptarshi (Graduate of Michigan State University)
- Date
- 2019
- Collection
- Electronic Theses & Dissertations
- Description
-
"In this dissertation thesis, we develop a scalable and energy-efficient discrete-pulse-based networking architecture along with a Spiking-Neuron-based low-power detection framework for use in resource-constrained settings. Applications such as Structural Health Monitoring (SHM) using wireless sensor networks powered by ambient energy harvesting are particularly suited for such a framework. The key idea in pulse-based networking is to eschew unnecessary overhead as incurred in traditional...
Show more"In this dissertation thesis, we develop a scalable and energy-efficient discrete-pulse-based networking architecture along with a Spiking-Neuron-based low-power detection framework for use in resource-constrained settings. Applications such as Structural Health Monitoring (SHM) using wireless sensor networks powered by ambient energy harvesting are particularly suited for such a framework. The key idea in pulse-based networking is to eschew unnecessary overhead as incurred in traditional packet-based networking and encode only the essential information using small number of discrete pulses and their positions with respect to a synchronized time frame structure. The baseline pulse networking does not scale well with increase in network size. In order to ameliorate this, we develop a scalable time frame structure for use in applications with large network size while preserving the energy advantages of pulse networking. In addition, we stress the importance of judicious use of erratic energy availability in ambient energy harvesting powered systems. To that effect, we build energy-awareness syntaxes within the pulse networking framework for better utilization of energy resources in such systems. We also demonstrate the feasibility of pulse networking over a through-substrate ultrasonic link layer and the advantages thereof in terms of utilizing existing infrastructure and removing the need for radio retrofits. We explore how the protocol performance varies for an airplane stabilizer monitoring application powered by ambient vibration energy harvesting in different energy availability scenarios. Beyond this, we also develop a Spiking-Neuron-based low-power event pattern detection architecture and illustrate how this can be incorporated within a pulse-networked SHM system. The Spiking Neuron based architecture is evidenced to be simpler in terms of implementation but more efficient in terms of computation and energy usage, thus enabling in-situ detection even at intermediate nodes in the network and robust low-power event pattern detection immune to pulse drifts and errors."--Pages ii-iii.
Show less
- Title
- Wireless sensors for enhancing food supply chain visibility
- Creator
- Karuppuswami, Saranraj
- Date
- 2019
- Collection
- Electronic Theses & Dissertations
- Description
-
"The demand for providing safe and quality food from the farm to the plate had led to the development of sensor technologies for quality control and real-time end-to-end monitoring of food along the supply chain. These advanced sensors serve as the first line of defense against food-borne outbreaks, economically motivated adulteration, and food contamination preventing illness, deaths, huge economic losses and promotes global health and well-being. The key goal is to ensure that the food...
Show more"The demand for providing safe and quality food from the farm to the plate had led to the development of sensor technologies for quality control and real-time end-to-end monitoring of food along the supply chain. These advanced sensors serve as the first line of defense against food-borne outbreaks, economically motivated adulteration, and food contamination preventing illness, deaths, huge economic losses and promotes global health and well-being. The key goal is to ensure that the food reaching the fork meets the highest safety standards by promoting tamper-free sustainable practices along the food supply chain. Real-time food monitoring also prevents unnecessary wastage due to spoilage or good food being thrown out due to misconception of the labeled expiration date. In this dissertation, a number of RF passive wireless sensing approaches are presented that allows simultaneous tracking and quality monitoring of packaged food products as it moves along the supply chain. The end goal is to develop a low cost, long range, battery-free, and real time sensor tag which can detect multiple parameters of the packaged food simultaneously and at the same time provide the identification information. In order to realize a multi-functional sensor tag, a number of sensing approaches are developed targeting four different types of food related quality control challenges; Adulteration, Contamination, Wastage, and Spoilage. To identify and eliminate food adulteration, magnetoelastic based dielectric and viscosity sensors are developed. These hybrid sensors are shorter range sensors and a number of liquid food items such as milk and oil are characterized. A sensing approach that utilizes 3D printed RF sensors coupled to a microfludic channel for liquid profling by monitoring the dielectric constant is developed for food quality detection. Next, to prevent contamination, capacitance based short range inductor-capacitor (LC) tanks are developed. An interdisciplinary approach which is a confluence of carbohydrate coated nano particles capturing bacteria in liquid food with RF detection is developed. A common method to prevent wastage or spoilage is to detect and profile aroma emitted from food. Adsorption, absorption, and capillary condensation based short range as well as long range sensors that monitor the dielectric constant or the conductivity of the target food are developed. First, a short range capillary condensation based sensor is demonstrated for volatile profiling using a porous substrate and an LC tank. This is followed by demonstrating sensitivity and specificity of different thin-film coated short range sensors that detect vapors that are directly related to the spoilage index of the food. Finally, a long range passive sensor integrated with ID is demonstrated for detecting Ammonia in packaged food. The developed sensor is compatible with existing RFID infrastructure and is capable of digitizing the sensor information along with the identification information for transmission. Overall, the work demonstrates that a passive multi-modal sensor provides additional information about products moving across the supply chain transforming the tracebility-centric supply chain into a value-centric one with increased visibility and empowers the different stake holders with the quality information as the product moves along the supply chain."--Pages ii-iii.
Show less
- Title
- Gliding robotic fish : design, collaborative estimation, and application to underwater sensing
- Creator
- Ennasr, Osama Nasr
- Date
- 2020
- Collection
- Electronic Theses & Dissertations
- Description
-
Autonomous underwater robots have received significant attention over the past two decades due to the increasing demand for environmental sustainability. Recently, gliding robotic fish has emerged as a promising mobile sensing platform in versatile aquatic environments. Such robots, inspired by underwater gliders and robotic fish, combine buoyancy-driven gliding and fin-actuated swimming to realize both energy-efficient locomotion and high maneuverability. In this dissertation, we first...
Show moreAutonomous underwater robots have received significant attention over the past two decades due to the increasing demand for environmental sustainability. Recently, gliding robotic fish has emerged as a promising mobile sensing platform in versatile aquatic environments. Such robots, inspired by underwater gliders and robotic fish, combine buoyancy-driven gliding and fin-actuated swimming to realize both energy-efficient locomotion and high maneuverability. In this dissertation, we first discuss the design improvements for the second-generation gliding robotic fish "Grace 2". These improvements have transformed the robots to underwater sensing platforms that can be modified to fit the requirements of a specific application with relative ease.We focus on the application of detecting and tracking live fish underwater, which is an important part of fishery research, as it helps scientists understands habitat use, migratory patterns, and spawning behavior of fishes. The gliding robotic fish has demonstrated its ability to detect special acoustic signals emulating tagged fish through a series of trials in Higgins Lake, Michigan. These tests have also validated a gliding-based strategy for navigating to a GPS waypoint, and offered insight into the limitations of the current design. Additional improvements are proposed to allow these robots to glide at larger depths and perform more interesting working patterns underwater.Motivated by the problem of tracking real fish, we consider the case where multiple robots localize and track a moving target without the need for a centralized node. We present theoretical treatment on how a network of robots can infer the location of an emitter (or target), and then track it, through a time-difference-of-arrival (TDOA) localization scheme in a fully distributed manner. In particular, we utilize a networked extended Kalman filter to estimate the target's location in a distributed manner, and establish that successful localization can be achieved under fixed and time-varying undirected communication topologies if every agent is part of a network with a minimum of 4 connected, non-coplanar agents. We further propose a movement control strategy based on the norm of the estimation covariance matrices, with a tuning parameter to balance the trade-off between estimation performance and the total distance traveled by the robots.Finally, motivated by the distributed localization problem, we investigate a more general problem of distributed estimation by a network of sensors. Specifically, we consider the class of consensus-based distributed linear filters (CBDLF) where each sensor updates its estimate in two steps: a consensus step dictated by a weighted and directed communication graph, followed by a local Luenberger filtering step. We show that the sub-optimal filtering gains that minimize an upper bound of a quadratic filtering cost are related to the convergence of a set of coupled Riccati equations. Then we show that the convergence of these coupled Riccati equations depends on the notion of squared detectability for the networked system, and proceed to provide necessary conditions that link the convergence of the coupled Riccati equations to the network topology and consensus weights of the communication graph.
Show less
- Title
- Transmission timing modulation for information coding in energy-constrained wireless networks
- Creator
- Feng, Dezhi
- Date
- 2020
- Collection
- Electronic Theses & Dissertations
- Description
-
The objective of this thesis is to develop a framework of transmission timing-based modulation framework for improving energy efficiency, security, and information transfer capacity in embedded wireless networks with very thin energy budgets. The key idea is to modulate both intra-PDU (Protocol Data Unit) and inter-PDU timing for addressing energy, security, and information transfer capacity in wireless embedded networks. As for energy efficiency, we developed a novel pulse position-coded PDU...
Show moreThe objective of this thesis is to develop a framework of transmission timing-based modulation framework for improving energy efficiency, security, and information transfer capacity in embedded wireless networks with very thin energy budgets. The key idea is to modulate both intra-PDU (Protocol Data Unit) and inter-PDU timing for addressing energy, security, and information transfer capacity in wireless embedded networks. As for energy efficiency, we developed a novel pulse position-coded PDU (PPCP) paradigm. The core idea is to encode a protocol data unit (PDU) in terms of the silence duration between two sets of delimiter pulses, whose positions are modulated based on the value of the PDU. This PPCP architecture achieves significant energy savings by using a lesser amount of bit/pulse transmissions, and by eliminating long multi-bit preambles and headers, which are normally used in traditional packets. The proposed multi-access pulse-based PDU scheme enables medium sharing among many sensor nodes without requiring per-PDU frame synchronization. As for security, we developed the concept of a novel chaotic pulse position coded protocol data unit (CPPCP) for secure embedded networking. The core idea of CPPCP is to encode a protocol data unit (PDU) with a wideband pulse train with chaotically-varied inter-pulse intervals. The architecture ensures communication security by introducing randomness between data symbols, noise-like frequency spectrum, and significant energy savings by using a smaller number of pulse transmissions compared to existing secure coding schemes such as Bluetooth Low Energy (BLE). Compared with the traditional key-based cryptographic techniques, CPPCP suppresses decipherable information by eliminating symbol periodicity. The mechanism can also be piggy-backed on traditional cryptography solutions to achieve higher levels of security. Finally, for enhancing the information transfer capacity, we developed a data packet position modulation (DPPM) paradigm. Packet transmissions in low duty cycle networks are often scheduled as TDMA slots, whose periodicity is determined based on application sampling requirements and the energy in-flow, often in the form of energy harvesting. The key idea of DPPM is to modulate the inter-packet spacing for coding additional information without incurring additional transmission energy expenditures. We first developed a have a DPPM based networking solution for single-hop transmit-only networks in which a number of low-energy nodes transmit data to an aggregator. The architecture is developed for a two-node point-to-point link, followed by a multipoint-to-point multi-access network. Detailed analytical and simulation models are developed to demonstrate the performance of a symmetric and an asymmetric version of DPPM.
Show less
- Title
- Implementation of a high throughput low power MAC protocol in wireless sensor networks
- Creator
- Liu, Chin-Jung
- Date
- 2011
- Collection
- Electronic Theses & Dissertations
- Description
-
This thesis presents the design, implementation, and evaluation of TATD-MAC, a TDMA-based low duty cycle synchronous MAC protocol that improves throughput by increasing channel uti- lization with a traffic-adaptive time slot scheduling method. Conventional time division multiple access (TDMA) introduces significant end-to-end packet delivery delay and its throughput is lim- ited. TATD-MAC achieves higher throughput by improving TDMA with a novel traffic-adaptive mechanism that assigns time...
Show moreThis thesis presents the design, implementation, and evaluation of TATD-MAC, a TDMA-based low duty cycle synchronous MAC protocol that improves throughput by increasing channel uti- lization with a traffic-adaptive time slot scheduling method. Conventional time division multiple access (TDMA) introduces significant end-to-end packet delivery delay and its throughput is lim- ited. TATD-MAC achieves higher throughput by improving TDMA with a novel traffic-adaptive mechanism that assigns time slots only to nodes that are expecting traffic. Our traffic-adaptive mechanism is a two-phase design, which decomposes the DATA period into traffic notification part and data transmission scheduling part. The two-phase design enables TATD-MAC to optimize the control packets and improve their energy efficiencies according to the characteristics of each phase. The source nodes inform all nodes on the routing path that these sources have outgoing traffic by transmitting traffic notification packets in a "pulse" fashion. With traffic notification packets, ev- ery node on the routing path claims time slots in data transmission part. Therefore, TATD-MAC is able to forward a packet over multiple hops in a single cycle and thus reduce the end-to-end delay. The data transmission scheduling mechanism only assigns time slots to nodes with traf- fic through an ordered schedule negotiation scheme. This innovative traffic-adaptive scheduling mechanism assigns time slots based on traffic and totally eliminates the idle listening slots on nodes with no traffic. Moreover, if any other nodes need more time slots, they are able to claim them, which further improves channel utilization and achievable throughput. We implemented a TATD-MAC prototype on Tmote-Sky running TinyOS 2.1.0. Performance evaluation shows that TATD-MAC significantly improves throughput compared to conventional TDMA and achieves the same throughput as TDMA with slot stealing while having 70% less power consumption.
Show less
- Title
- Pulse switching : an ultra-light network paradigm without packet abstraction
- Creator
- Huo, Qiong
- Date
- 2013
- Collection
- Electronic Theses & Dissertations
- Description
-
In this dissertation we develop a novel pulse switching framework for ultra light-weight networking applications involving severely resource-constrained embedded devices. The key idea is to abstract a single pulse, as opposed to multi-bit packets, as the network switching granularity. Pulse switching can be shown to be sufficient for on-off style event monitoring applications for which a monitored parameter can be modeled using just a binary variable. Monitoring such events with conventional...
Show moreIn this dissertation we develop a novel pulse switching framework for ultra light-weight networking applications involving severely resource-constrained embedded devices. The key idea is to abstract a single pulse, as opposed to multi-bit packets, as the network switching granularity. Pulse switching can be shown to be sufficient for on-off style event monitoring applications for which a monitored parameter can be modeled using just a binary variable. Monitoring such events with conventional packet paradigm can be prohibitively inefficient due to the communication, processing, and buffering overheads of the large number of bits within packet data, header, and preambles for synchronization. In the proposed paradigm, an event can be coded as a single pulse, which is then transported multi-hop while preserving sufficient information so that a destination (i.e., sink or actuator nodes) can derive certain spatio-temporal context information about the event in question. The resulting operational lightness, leveraged via zero buffering, no addressing, no packet processing, and an ultra-low communication energy budget makes the framework applicable for embedded devices such as Radio Frequency Identifiers operating with ultra-tight energy budgets, such as from harvested energy.Specific contributions includes: 1) Developing a joint MAC-Routing abstraction for pulse switching, 2) Mapping the proposed pulse switching architecture on Ultra Wideband Band (UWB) impulse radio technology, 3) Developing a hop-angular spatial context abstraction and the related estimation algorithms for event localization, 4) Designing a cellular alternative to the hop-angular abstraction, 5) Designing a peer-to-peer pulse routing protocol, finally 6) System characterization through modeling and large scale simulation.
Show less
- Title
- Exploiting node mobility for energy optimization in wireless sensor networks
- Creator
- El-Moukaddem, Fatme Mohammad
- Date
- 2012
- Collection
- Electronic Theses & Dissertations
- Description
-
Wireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g....
Show moreWireless Sensor Networks (WSNs) have become increasingly available for data-intensive applications such as micro-climate monitoring, precision agriculture, and audio/video surveillance. A key challenge faced by data-intensive WSNs is to transmit the sheer amount of data generated within an application's lifetime to the base station despite the fact that sensor nodes have limited power supplies such as batteries or small solar panels. The availability of numerous low-cost robotic units (e.g. Robomote and Khepera) has made it possible to construct sensor networks consisting of mobile sensor nodes. It has been shown that the controlled mobility offered by mobile sensors can be exploited to improve the energy efficiency of a network.In this thesis, we propose schemes that use mobile sensor nodes to reduce the energy consumption of data-intensive WSNs. Our approaches differ from previous work in two main aspects. First, our approaches do not require complex motion planning of mobile nodes, and hence can be implemented on a number of low-cost mobile sensor platforms. Second, we integrate the energy consumption due to both mobility and wireless communications into a holistic optimization framework.We consider three problems arising from the limited energy in the sensor nodes. In the first problem, the network consists of mostly static nodes and contains only a few mobile nodes. In the second and third problems, we assume essentially that all nodes in the WSN are mobile. We first study a new problem called max-data mobile relay configuration (MMRC) that finds the positions of a set of mobile sensors, referred to as relays, that maximize the total amount of data gathered by the network during its lifetime. We show that the MMRC problem is surprisingly complex even for a trivial network topology due to the joint consideration of the energy consumption of both wireless communication and mechanical locomotion. We present optimal MMRC algorithms and practical distributed implementations for several important network topologies and applications. Second, we consider the problem of minimizing the total energy consumption of a network. We design an iterative algorithm that improves a given configuration by relocating nodes to new positions. We show that this algorithm converges to the optimal configuration for the given transmission routes. Moreover, we propose an efficient distributed implementation that does not require explicit synchronization. Finally, we consider the problem of maximizing the lifetime of the network. We propose an approach that exploits the mobility of the nodes to balance the energy consumption throughout the network. We develop efficient algorithms for single and multiple round approaches. For all three problems, we evaluate the efficiency of our algorithms through simulations. Our simulation results based on realistic energy models obtained from existing mobile and static sensor platforms show that our approaches significantly improve the network's performance and outperform existing approaches.
Show less