Computer Technos

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 10 October 2011

WSN Applications

Posted on 10:22 by Unknown
The wide range of sensors and collective instrumental functionality of WSNs, coupled with the underlying wireless networks, make it possible to provide unprecedented levels of data access and associated intelligence, bringing about a new dimension of application for different industry sectors. WSN applications can be divided into three categories: monitoring space, including objects as part of the space; monitoring operation states of objects; and monitoring interactions between objects and space. The first category represents the most common and basic use of WSNs (dealing with physical environments), whereas the second is mainly concerned with a specific entity rather than its surroundings. The third category encompasses more sophisticated monitoring and control over communications and interactions between objects and between an object and its surroundings. Some pilot projects have explored WSNs for a number of different application scenarios. Many potential applications are being developed to leverage WSNs. Some examples are introduced as follows.


Environmental Sensing
Using a large number of sensor nodes deployed in a target geographic location, it is possible to derive useful patterns and trends based on datasets collected over time. Examples of environmental sensing are light sensing, microclimate monitoring, traffic monitoring, pollution level monitoring, indoor climate control, and habitat monitoring. Very often users are only concerned with independent characteristics of an entity, such as the number of vehicles passing by during a time period or the propagation speed of some contaminant in a river.


Object Sensing
Aside from environmental sensing, sensors can be attached to objects and collect data regarding motion, pressure, or any mechanical, electronic, or biological characteristics of the host. Object sensing is predominantly used in industrial control and maintenance. Examples include structural monitoring of buildings, bridges, vehicles, and airplanes; sensing machinery wear in a factory; industrial asset tracking in warehouses and stores; surveillance in parking lot and streets; crop monitoring; and military-related object sensing in battlefields. In particular, RFID, a scaled-down wireless sensing technology, utilizes small tags of very limited local computing power and storage to identify and inventory objects. Section 13 has presented a detailed introduction to RFID.


Sensing with Intelligence
More challenging application scenarios require embedded intelligence that goes beyond raw data sensing, thus requiring the simultaneous sensing of multiple related quantities and in-network processing so as to detect internal interactions between objects. Examples of this category are monitoring wildlife habitats, telemedicine sensing, context-aware pervasive computing using sensors, and disaster management. For instance, researchers at the University of California, Berkeley, and Intel have developed a successful experimental WSN to monitor petrels on an uninhabited island off the coast of Maine. The birds being observed are Leach’s store petrels, a type of tiny reclusive seabird that burrows in sandy soil and emerges only at night. To ornithologists, monitoring and understanding the comings and goings of these birds in a wild area are not simple tasks, as they would have to dig into the birds ’ burrows for more information. The WSN deployed on the island consists of 190 wireless sensor nodes called motes , some of which are located in burrows and others on the ground, and a solar-powered central computer station that collects sensory data from a gateway mote and reports back to a remote site in real-time via satellite links. Sensors on the motes monitor temperature, humidity, barometric pressure, and ambient light. The temperature reading within a burrow can be used to infer if a petrel is present or not. Other data also contribute to our understanding of the behavior of these petrels and their responses to changes in their surroundings.

Source of Information : Elsevier Wireless Networking Complete 2010
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Wireless | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 7 Shortcut Keys
    Longtime users of Windows have probably grown accustomed to navigating around the Windows user interface using the keyboard. This especially...
  • Windows on Mac: Virtualization Solutions
    If you’d prefer to join the ever-increasing ranks of Mac switchers—you traitor, you—you can still run Windows and, more important, Windows a...
  • Customizing Library Folders in Windows 7
    In your library folders, you can customize view options based on the contents. In the toolbar of the Pictures and Music library folders, Win...
  • Windows 7 BitLocker Drive Encryption
    In Windows Vista, you had the BitLocker Drive Encryption feature that allowed you to encrypt the content of entire volumes. In Windows 7, Mi...
  • Using Windows 7’s Performance Options
    While all the performance tools are available individually throughout the system, Windows 7 introduces a nice list of available tools, if yo...
  • Windows 7 - Installing and Configuring a Printer
    If your printer is already installed and operational at this point, you can skip this section and skim ahead for others that may be of inter...
  • Considering Centralized versus Group Sharing
    One of the most important preparation steps for your server is determining how to store the data you create. The two common methods are cent...
  • Berkeley Motes
    The Berkeley motes are a family of embedded sensor nodes sharing roughly the same architecture. Let us take the MICA mote as an example. The...
  • Using Windows 7 Ease of Access Tools
    If you have difficulty using a mouse or typing, have slightly impaired vision, or are deaf or hard of hearing, you can adjust the appearance...
  • Troubleshooting Boot and Startup Problems - Driver Loading in Safe Mode
    How does Windows know which device drivers and services are part of standard and networking-enabled safe mode? The answer lies in the HKLM\S...

Categories

  • Access 2010
  • BlackBerr
  • BlackBerry
  • Computer Science
  • Cyber Security
  • Exchange Server 2010
  • File Utilities
  • Foursquare
  • Google
  • Hardware
  • Internet
  • iPad
  • Linux
  • Lync Server
  • Microsoft Virtualization
  • Mobile Web
  • Networking
  • News
  • Security
  • Server Architectures
  • Smartphone
  • Ubuntu Linux
  • Windows
  • Windows 7
  • Windows Home Server
  • Windows Security
  • Windows Server 2008
  • Windows Server 2008 Hyper-V
  • Windows XP
  • Wireless

Blog Archive

  • ►  2012 (66)
    • ►  August (5)
    • ►  July (9)
    • ►  June (9)
    • ►  May (8)
    • ►  April (9)
    • ►  March (9)
    • ►  February (8)
    • ►  January (9)
  • ▼  2011 (85)
    • ►  December (5)
    • ►  November (6)
    • ▼  October (7)
      • Standardization in the Wireless World
      • ZigBee
      • Self-Organized Networks
      • Wireless Sensor Node
      • WSN Applications
      • Wireless Sensor Networks
      • Satellite
    • ►  September (8)
    • ►  August (9)
    • ►  July (9)
    • ►  June (7)
    • ►  May (7)
    • ►  April (4)
    • ►  March (6)
    • ►  February (8)
    • ►  January (9)
  • ►  2010 (230)
    • ►  December (13)
    • ►  November (3)
    • ►  October (2)
    • ►  September (10)
    • ►  August (31)
    • ►  July (32)
    • ►  June (23)
    • ►  May (2)
    • ►  April (21)
    • ►  March (32)
    • ►  February (28)
    • ►  January (33)
  • ►  2009 (119)
    • ►  December (33)
    • ►  November (31)
    • ►  October (35)
    • ►  September (20)
Powered by Blogger.

About Me

Unknown
View my complete profile