scholarly journals CO2 Monitoring System Prototype using Wireless Sensor Network

Author(s):  
Hanif Arief Wisesa

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>An abstract of no more than 200 words should state the purposes of the study, procedures, </span><span>fi</span><span>ndings and conclusions. It should be written in Times New Roman with font size of 9. Abstract should be followed by four to eight key words to assist cross-indexing. The key words should be ordered alphabetically and separated by commas. For your paper to be published in the journal, you must use this document as both an instruction set and as a template into which you can type your own text. If your paper does not conform to the required format, you will be asked to </span><span>fi</span><span>x it. In the paper, authors are suggested to present their articles in the sections structure: Introduction - Previous Study/Literature Review - The Proposed Method/Algorithm/Procedure speci</span><span>fi</span><span>cally designed (optional) - Research Method Results and Discussion - Conclusion. Authors may present complex proofs of theorems or non-obvious proofs of correctness of algorithms after introduction section (obvious theorems and straightforward proofs of existing theorems are not needed). </span></p></div></div></div>

2016 ◽  
Vol 12 (10) ◽  
pp. 86 ◽  
Author(s):  
Jingyi Bo ◽  
Yubin Wang ◽  
Na Xu

<span style="font-family: 'Times New Roman',serif; font-size: 10pt; -ms-layout-grid-mode: line; mso-fareast-font-family: SimSun; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">Combining the characteristics of wireless sensor network, the ant colony algorithm is applied to a wireless sensor network, and a wireless sensor network route algorithm based on energy equilibrium is proposed in this paper. This algorithm takes the energy factor into the consideration of selection of route based on probability and enhanced calculation of information so as to find out the optimal route from the source node to the target node with low cost and balanced energy, and it prolongs the life cycle of the whole network</span><span style="font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: SimSun; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">.</span>


2017 ◽  
Vol 13 (03) ◽  
pp. 174
Author(s):  
Haishan Zhang ◽  
Xinchun Wang ◽  
Chenghui Jia

<span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;">The injection attack of false data is a common attack form in wireless sensor network. This attack form achieves the purpose of consuming limited network resources and severely threatens the safety of wireless sensor network through consistent sending false data. This paper proposes a type of false data filtering strategy based on neighbor node monitoring. The idea of this strategy is to enable each node to store the neighbor node's information within the two-hop range. In the meantime, the data package determines whether the upstream node is original node or data forwarding intermediate node through whether ACK package is remitted by the upstream node to avoid the impersonation of wireless sensor network node by malicious node. The false data package of malicious node will be filtered within one hop. The simulation experiment verifies the filtering performance and anti-capture performance of this strategy, thus guaranteeing the safety of wireless sensor network.</span>


2016 ◽  
Vol 12 (10) ◽  
pp. 11
Author(s):  
Weimin Han ◽  
Shijun Li ◽  
Weidong Li

<p style="margin: 0in 0in 10pt;"><span style="-ms-layout-grid-mode: line;"><span style="font-family: Times New Roman; font-size: small;">The traditional multi-hop positioning algorithm is easily affected by the network anisotropy, thus resulting in unstable positioning performance. The wireless sensor network multi-hop positioning algorithm based on continuous regression is put forwarded in the paper to address this problem. By utilizing the continuous regression model, the mapping relationship between the hop count and Euclidean distance is constructed so as to transform the positioning process model into regression prediction. Theoretical analysis and simulation results show that the improved algorithm improves the positioning accuracy, and avoids the influence of the network topology anisotropy on the performance of the algorithm. The algorithm requires little expenditure and few parameters so it can be adapted to wireless sensor networks with irregular nodes distribution, and can be of great engineering application value.</span></span></p>


2021 ◽  
pp. 635-641
Author(s):  
Masdum Ibrahim ◽  
. Samiaji

Hallucinations are a symptom of mental disorders during which the patient can experience changes in, or receive false messages from, sensory perceptions. Nursing approaches for patients suffering hallucinations are focused on physical, intellectual, emotional and socio-spiritual aspects. One of the therapeutic modalities in the management of schizophrenic patients with hallucinations is occupational therapy, such as drawing activities. The drawing activity aims to minimize the patient’s interaction with their own world; release thoughts, feelings, or emotions that have been affecting the behavior; provide motivation and entertainment; and distract the patient from the hallucinations experienced. The purpose of this study was to summarize the results of studies which explain that occupational drawing therapy can control hallucinations in schizophrenic patients. The research method used is literature review from the search results conducted through Google Scholar. 29 articles were obtained with a combination of the key words including ‘Occupational Therapy’, ‘Drawing’ and ‘Hallucination’ Then the researchers conducted a screening by focusing according to the topic of discussion, so that only 3 articles were obtained that met all the search criteria. The results showed that occupational therapy was effective in controlling hallucinations in schizophrenic patients. It is expected to be a reference in the provision of therapeutic modalities and further research development.   Keywords: Schizofrenia, Hallucinations, Occupational Drawing Therapy


2016 ◽  
Vol 12 (10) ◽  
pp. 4
Author(s):  
Lei An ◽  
Aihua Li ◽  
Ling Pang ◽  
Guangdong He

<span style="font-family: 'Times New Roman',serif; font-size: 10pt; -ms-layout-grid-mode: line; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">There are many differences between the routing protocol design of a wireless sensor network and wireless ad-hoc network. Highly restricted resource and frequent node failure are two major challenges. Relevant technical research into wireless sensor network has become an issue of intense interest. In recent years, achievements in research on routing protocol of wireless sensor network have been summarized, analyzed and compared. Features of wireless sensor networks have been introduced and key factors of its routing protocol design have been introduced. According to the realization features of protocol, routing protocol of wireless sensor network has been divided into five categories, and each category of important protocols has been elaborated and analyzed. Finally, the features of these protocols are summarized and compared and the development trend of such research has been forecasted</span><span style="font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">.</span>


2017 ◽  
Vol 13 (07) ◽  
pp. 4
Author(s):  
Xiaobin Shu ◽  
Caihong Liu ◽  
Chunxia Jiao ◽  
Qin Wang ◽  
Hongfeng Yin

<span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">To d</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">esign an effective secure routing of trusted nodes in wireless sensor networks</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">, </span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">quantum ant colony algorithm is applied to the design of large-scale wireless sensor network routing. The trustworthy network is used as the pheromone distribution strategy.</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">Then</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">,</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US"> the pheromone is encoded by the quantum bit</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">. The pheromone is updated by the quantum revolving door, and the energy consumption prediction is carried out to select the path. Finally, the trusted security routing algorithm of the wireless sensor network based on the global energy balance is realized. </span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">The quantum ant colony algorithm is superior to the traditional ant colony algorithm in algorithm convergence speed and global optimization. It can balance the energy consumption of the network node and can effectively resist the attacks such as Wormholes.</span><span style="font-family: 'Times New Roman',serif; font-size: 10.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: 宋体; mso-fareast-language: DE; mso-bidi-language: AR-SA;" lang="EN-US">It is very promising to apply the quantum ant colony algorithm to the routing algorithm of large scale wireless sensor networks.</span>


2013 ◽  
Vol 1 (6) ◽  
pp. 4
Author(s):  
Jakub Kraus ◽  
Petr Fajčík ◽  
Peter Vittek ◽  
Tomáš Duša

<span style="line-height: 115%; font-family: 'Times New Roman','serif'; font-size: 9pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-GB; mso-fareast-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-theme-font: minor-latin;" lang="EN-GB">This article focuses on the use of wireless sensor networks for airport security, respectively using sensor networks as a replacement or add-on to existing security measures. The article describes the sensor network and its possible application to various airport objects and financial analysis of the perimeter security with wireless sensor network.<strong> </strong></span>


2016 ◽  
Vol 12 (10) ◽  
pp. 18
Author(s):  
Xiyuan Wei

<span style="font-family: 'Times New Roman',serif; font-size: 10pt; -ms-layout-grid-mode: line; mso-fareast-font-family: SimSun; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">According to the current technology of wireless sensor networks and the development situation and the research topic of ZigBee that is currently gaining much attention, this paper further studies the working principle of ZigBee technology and completes the establishment and test of a wireless sensor network using this technology. Finally, it integrates the design of remote data monitoring and analyzes the application of a wireless sensor network based on ZigBee technology</span><span style="font-family: 'Times New Roman',serif; font-size: 10pt; mso-fareast-font-family: SimSun; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">.</span>


Sign in / Sign up

Export Citation Format

Share Document