Search results for "Real-time computing"
showing 10 items of 366 documents
Power Consumption Analysis of Operating Systems for Wireless Sensor Networks
2010
In this paper four wireless sensor network operating systems are compared in terms of power consumption. The analysis takes into account the most common operating systems-TinyOS v1.0, TinyOS v2.0, Mantis and Contiki-running on Tmote Sky and MICAz devices. With the objective of ensuring a fair evaluation, a benchmark composed of four applications has been developed, covering the most typical tasks that a Wireless Sensor Network performs. The results show the instant and average current consumption of the devices during the execution of these applications. The experimental measurements provide a good insight into the power mode in which the device components are running at every moment, and t…
Automated inventory management and security surveillance system using image processing techniques
2010
Efficient inventory management and allocation of cargo space is an imperative parameter in the industry today. In this paper we propose an algorithm to automate complete inventory unit with the aid of image processing and artificial intelligence algorithms. These algorithms work on the data acquired through image processing. This data then integrates with the Artificial Intelligence algorithm which in turn takes inputs from the sensors present on the robot. These sensors help in precise localization of the robot. The path planning algorithm takes input from virtual map buffer which is present in the CPU memory. This buffer in accordance with the sensor data and Image Processing data generat…
On the performance of joint processing schemes over the cluster area
2010
En este trabajo se caracterizan tres esquemas de transmisión conjunta para el enlace descendente y se compara su rendimiento dentro de un clúster de estaciones base. La motivación de este estudio es analizar el rendimiento de estos esquemas dentro del área del clúster, como un primer paso hacia el diseño de un esquema de transmisión conjunta adaptable que soporte escenarios de uso dinámicos. Cada uno de los esquemas analizados, centralizado, parcial y distribuido, requiere una cantidad diferente de conocimiento del canal disponible en el lado del transmisor, un intercambio distinto de información entre estaciones base y la retroalimentación de los usuarios. Además, estos esquemas muestran d…
A Bayesian Network Model for Fire Assessment and Prediction
2015
Smartphones and other wearable computers with modern sensor technologies are becoming more advanced and widespread. This paper proposes exploiting those devices to help the firefighting operation. It introduces a Bayesian network model that infers the state of the fire and predicts its future development based on smartphone sensor data gathered within the fire area. The model provides a prediction accuracy of 84.79i¾?% and an area under the curve of 0.83. This solution had also been tested in the context of a fire drill and proved to help firefighters assess the fire situation and speed up their work.
Aggregated Packet Transmission in Duty-Cycled WSNs: Modeling and Performance Evaluation
2017
[EN] Duty cycling (DC) is a popular technique for energy conservation in wireless sensor networks (WSNs) that allows nodes to wake up and sleep periodically. Typically, a single-packet transmission (SPT) occurs per cycle, leading to possibly long delay. With aggregated packet transmission (APT), nodes transmit a batch of packets in a single cycle. The potential benefits brought by an APT scheme include shorter delay, higher throughput, and higher energy efficiency. In the literature, different analytical models have been proposed to evaluate the performance of SPT schemes. However, no analytical models for the APT mode on synchronous DC medium access control (MAC) mechanisms exist. In this …
Consensus-based Distributed Intrusion Detection for Multi-Robot Systems
2008
This paper addresses a security problem in robotic multi-agent systems, where agents are supposed to cooperate according to a shared protocol. A distributed Intrusion Detection System (IDS) is proposed here, that detects possible non-cooperative agents. Previous work by the authors showed how single monitors embedded on-board the agents can detect non- cooperative behavior, using only locally available information. In this paper, we allow such monitors to share the collected information in order to overcome their sensing limitation. In this perspective, we show how an agreement on the type of behavior of a target-robot may be reached by the monitors, through execution of a suitable consensu…
Synchronization in Vehicle Routing—A Survey of VRPs with Multiple Synchronization Constraints
2012
This paper presents a survey of vehicle routing problems with multiple synchronization constraints. These problems exhibit, in addition to the usual task covering constraints, further synchronization requirements between the vehicles, concerning spatial, temporal, and load aspects. They constitute an emerging field in vehicle routing research and are becoming a “hot” topic. The contribution of the paper is threefold: (i) It presents a classification of different types of synchronization. (ii) It discusses the central issues related to the exact and heuristic solution of such problems. (iii) It comprehensively reviews pertinent literature with respect to applications as well as successful s…
Unidirectional Direct Load Control through Smart Plugs
2014
International audience; Balancing energy demand and production is be-coming a more and more challenging task for energy utilities also because of the larger penetration of renewable energies which are more difficult to predict and control. While the traditional solution is to dynamically adapt energy production to follow time-varying demand, a new trend is to drive demand itself. Most of the ongoing actions in this direction involve greedy energy consumers, like industrial plants, supermarkets or large buildings. Pervasive communication technologies may allow in the near future to push further the granularity of such approach, by having the energy utility interacting with residen-tial appli…
Distributed Multi-level Motion Planning for Autonomous Vehicles in Large Scale Industrial Environments
2013
In this paper we propose a distributed coordination algorithm for safe and efficient traffic management of heterogeneous robotic agents, moving within dynamic large scale industrial environments. The algorithm consists of a distributed resource--sharing protocol involving a re--planning strategy. Once every agent is assigned with a desired motion path, the algorithm ensures ordered traffic flows of agents, that avoid inter--robot collision and system deadlock (stalls). The algorithm allows multi--level representation of the environment, i.e. large or complex rooms may be seen as a unique resource with given capacity at convenience, which makes the approach appealing for complex industrial e…
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi–Agent Systems
2007
This paper focuses on the detection of misbehav- ing agents within a group of mobile robots. A novel approach to automatically synthesize a decentralized Intrusion Detection System (IDS) as well as an efficient implementation of local monitors are presented. In our scenario, agents perform possi- bly different independent tasks, but cooperate to guarantee the entire system’s safety. Indeed, agents plan their next actions by following a set of logic rules which is shared among them. Such rules are decentralized, i.e. they depend only on configurations of neighboring agents. However, some agents may not be acting according to this cooperation protocol, due to spontaneous failure or tampering.…