scholarly journals Design and Implementation of a Mobile Multihop WSN for AGV System

2010 ◽  
Vol 2010 ◽  
pp. 1-12
Author(s):  
Jiaqi Zhang ◽  
Molin Jia ◽  
Noriyoshi Yamauchi ◽  
Takaaki Baba

A system data sharing protocol of mobile WSN named synchronous dynamic multihop data sharing protocol (S-DMDS) is presented for automated guided vehicle (AGV) system. It is a cross-layer protocol designed from route layer to MAC layer. By adopting a concept of system data sharing, it is possible to make each node exchange the data timely with all the other nodes. It is also a topology-agnostic protocol which has no knowledge of neighbors, routes, or next hops. From the results of the 16-nodes simulation, S-DMDS protocol is proved to be efficient exchange data timely between the devices of AGV system in mobile multihop situation. Moreover, it also shows that S-DMDS significantly outperforms NST-AODV with investing about 41.6% system sharing delay as well as 80% RAM consumption. At last, 5-node experiment indicates that S-DMDS can work well in real environment.

2012 ◽  
Vol 542-543 ◽  
pp. 473-477
Author(s):  
Zhi Ming Zhang ◽  
Ming Yu ◽  
Xiao Yong Xiong

With the rapid development of the Internet, a large number of data information appears on the Internet, however, these data information are come from incompatible applications and frameworks that cannot interoperate or exchange data, and it is difficult to effective share and use these data information. Web Service is a new model for the integration and sharing of data information, many scholars have been done much research work on how to achieve data sharing by using the web service technology. This paper analyzes the accessing process of web service based on the Axis2, and takes the library web service as an example to describe the whole process of web services creating, publishing, and accessing. The example of library web service shows that it has speediness, practicability and effectiveness to design and implement the web service by Apache Axis2.


Author(s):  
Jiaqi Zhang ◽  
Tansheng Li ◽  
N. Yamauchi ◽  
S. Oyamada ◽  
K. Miyake ◽  
...  
Keyword(s):  

Network ◽  
2021 ◽  
Vol 1 (1) ◽  
pp. 28-49
Author(s):  
Ehsan Ahvar ◽  
Shohreh Ahvar ◽  
Syed Mohsan Raza ◽  
Jose Manuel Sanchez Vilchez ◽  
Gyu Myoung Lee

In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the demands of massive IoT devices and applications requiring data sharing and processing. 5G and beyond mobile networks are expected to fulfill a part of these requirements by providing a data rate of up to terabits per second. It will be a key enabler to support massive IoT and emerging mission critical applications with strict delay constraints. On the other hand, the next generation of software-defined networking (SDN) with emerging cloudrelated technologies (e.g., fog and edge computing) can play an important role in supporting and implementing the above-mentioned applications. This paper sets out the potential opportunities and important challenges that must be addressed in considering options for using SDN in hybrid cloud-fog systems to support 5G and beyond-enabled applications.


2018 ◽  
Vol 165 ◽  
pp. 24-37 ◽  
Author(s):  
Davi Resner ◽  
Gustavo Medeiros de Araujo ◽  
Antônio Augusto Fröhlich

2020 ◽  
Vol 2 (3) ◽  
pp. 103
Author(s):  
Ponco Sukaswanto ◽  
Abdul Fadlil

This research proposes a wireless communication between two dancer robots using zigbee to overcome the differences in movement between the robots in order to dance in harmony. The robotic music processor uses Audio Analyzer V2.0 which functions to get 7 frequency values for the music being played. The frequency will be processed by Arduino to determine the condition of the music on and off which will be sent to each robot via the XBee S2C module using the Zigbee method, namely with 1 master and 2 routers. The result is that the music processing system becomes more robust because it uses the Zigbee method. By using the Zigbee method, robot 1 and robot 2 can also communicate with each other because with this method, fellow routers can exchange data. The robot produced by this study can already distinguish the conditions when music is playing or muted, and between robot 1 and robot 2 can communicate with each other. Communication between robots functions so that when one of the robots is late in getting data, the other robots will wait until the late robot completes its movements so that robot 1 and robot 2 are back in sync.


Author(s):  
Shriya A. Hande ◽  
Nitin R. Chopde

<p>In today’s world, in almost all sectors, most of the work is done by robots or robotic arm having different number of degree of freedoms (DOF’s) as per the requirement. This project deals with the Design and Implementation of a “Wireless Gesture Controlled Robotic Arm with Vision”. The system design is divided into 3 parts namely: Accelerometer Part, Robotic Arm and Platform. It is fundamentally an Accelerometer based framework which controls a Robotic Arm remotely utilizing a, little and minimal effort, 3-pivot (DOF's) accelerometer by means of RF signals. The Robotic Arm is mounted over a versatile stage which is likewise controlled remotely by another accelerometer. One accelerometer is mounted/joined on the human hand, catching its conduct (motions and stances) and hence the mechanical arm moves in like manner and the other accelerometer is mounted on any of the leg of the client/administrator, catching its motions and stances and in this way the stage moves as needs be. In a nutshell, the robotic arm and platform is synchronised with the gestures and postures of the hand and leg of the user / operator, respectively. The different motions performed by robotic arm are: PICK and PLACE / DROP, RAISING and LOWERING the objects. Also, the motions performed by the platform are: FORWARD, BACKWARD, RIGHT and LEFT.</p>


2007 ◽  
Vol 3 (3) ◽  
pp. 199 ◽  
Author(s):  
Chin-Tser Huang ◽  
Manton Matthews ◽  
Matthew Ginley ◽  
Xinliang Zheng ◽  
Chuming Chen ◽  
...  

Effectively adding security measures to a multicast service is an intriguing problem, especially when the service isdeployed in a wireless setting. Next generation IEEE 802.16standard WirelessMAN networks are a perfect example of this problem, and the latest draft specification of the standard includes a secure protocol solution called Multicast and Broadcast Rekeying Algorithm (MBRA). In this paper, we expose the security problems of MBRA, including non-scalability and omission of backward and forward secrecy, and propose new approaches, ELAPSE and ELAPSE+, to address these problems. In particular, ELAPSE+ makes use of membership and mobility information gathered in the application layer to augment the adaptive group management in the MAC layer. We analyze the security property of ELAPSE and ELAPSE+, and compare their performances with MBRA by simulating group rekeying scenarios.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 2858-2863

The main goal of this article is to implement an effective Non-Blocking Benes switching Network. Benes Switching Network is designed with the uncomplicated switch modules & it’s have so many advantages, small latency, less traffic and it’s required number of switch modules. Clos and Benes networks are play a key role in the class of multistage interconnection network because of their extensibility and mortality. Benes network provides a low latency when compare with the other networks. 8x8 Benes non blocking switching network is designed and synthesized with the using of Xilinx tool 12.1.


Author(s):  
Neetu Faujdar

Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with the internet of things can help in getting the greater extend of data sharing. Little attention has been provided to the security of the various stakeholders that are the part of the system. IoT cloud integration involved privacy, security, and personal safety risk of the stakeholders. Not only are these types of security attacks possible, but there is also the possibility of attack on the IoT components like hardware manipulation to disrupt the services. As we are on the network, all the communication attacks of network are also possible. This chapter will cover common aspects of regarding the cloud and internet of things (IOT) with 5G networks.


2019 ◽  
Vol 2019 ◽  
pp. 1-33
Author(s):  
Muwonge Ssajjabbi Bernard ◽  
Tingrui Pei ◽  
Kimbugwe Nasser

Wireless multimedia sensor networks (WMSNs) have got capacity to collect both scalar sensor data and multidimensional sensor data. It is the basis for the Internet of things (IoT). Quality of service (QoS) pointers like energy efficiency, reliability, bit error rate, and latency can be helpful in data collection estimation over a network. In this paper, we review a number of QoS strategies for WMSNs and wireless sensor networks (WSNs) in the IoT context from the perspective of the MAC and application layers as well as the cross-layer paradigm. Considering the MAC layer, since it is responsible for regulating the admittance to the shared medium and transmission reliability and efficiency through error correction in wireless transmissions, and for performance of framing, addressing, and flow control, the MAC protocol design greatly affects energy efficiency. We thus review a number of protocols here including contention-free and contention-based protocols as well as the hybrid of these. This paper also surveys a number of state-of-the-art machine-to-machine, publish/subscribe, and request/response protocols at the application layer. Cross-layer QoS strategies are very vital when it comes to system optimization. Many cross-layer strategies have been reviewed. For these QoS strategies, the challenges and opportunities are reviewed at each of the layers considered. Lastly, the future research directions for QoS strategies are discussed for research and application before concluding this paper.


Sign in / Sign up

Export Citation Format

Share Document