In this paper, for the purpose of clarifying the desired ITS information and communication systems considering both safety and social feasibility to prevention overengineering, using a microscopic traffic flow simulator, we discuss the required information acquisition rate of three types of safety driving support systems, that is, the sensor type and the communication type, the sensor and communication fusion type. Performances are evaluated from the viewpoint of preventing overengineering performance using the “TsRm evaluation method” that considers a vehicle approaching within the range of R meters within T seconds as the vehicle with a high possibility of collision, and that evaluates only those vehicles. The results show that regarding the communication radius and the sensing range, overengineering performance may be estimated when all vehicles in the evaluation area are used for evaluations without considering each vehicle's location, velocity and acceleration as in conventional evaluations. In addition, it is clarified that the sensor and communication fusion type system is advantageous by effectively complementing the defects of the sensor type systems and the communication type systems.
This study proposes a design method for a rectifier circuit that can be rapidly charged by focusing on the design-load value of the circuit and the load fluctuation of a storage capacitor. The design-load value is suitable for rapidly charging the capacitor. It can be obtained at the lowest reflection condition and estimated according to the circuit design. This is a conventional method for designing the rectifier circuit using the optimum load. First, we designed rectifier circuits for the following three cases. The first circuit design uses a load set to 10 kΩ. The second design uses a load of 30 kΩ that is larger than the optimum load. The third design utilizes a load of 3 kΩ. Then, we measure the charging time to design the capacitor on each circuit. Consequently, the results show that the charge time could be shortened by employing the design-load value lower than that used in the conventional design. Finally, we discuss herein whether this design method can be applied regardless of the rectifier circuit topology.
In this paper, we propose an active calibration algorithm to tackle both gain-phase errors and position perturbations. Unlike many other active calibration methods, which fix the array while changing the location of the source, our approach rotates the array but does not change the location of the source, and knowledge of the direction-of-arrival (DOA) of the far-field calibration source is not required. The superiority of the proposed method lies in the fact that measurement of the direction of a far-field calibration source is not easy to carry out, while measurement of the rotation angle via the proposed calibration strategy is convenient and accurate. To obtain the receiving data from different directions, the sensor array is rotated to three different positions with known rotation angles. Based on the eigen-decomposition of the data covariance matrices, we can use the direction of the auxiliary source to represent the gain-phase errors and position perturbations. After that, we estimate the DOA of the calibration source by a one-dimensional search. Finally, the sensor gain-phase errors and position perturbations are calculated by using the estimated direction of the calibration source. Simulations verify the effectiveness and performance of the algorithm.
Misaki SHIKAKURA Yusuke KAMEDA Takayuki HAMAMOTO
This paper reports the evolution and application potential of image sensors with high-speed brightness gradient sensors. We propose an adaptive exposure time control method using the apparent motion estimated by this sensor, and evaluate results for the change in illuminance and global / local motion.
Chia-Yu WANG Chia-Hsin TSAI Sheng-Chung WANG Chih-Yu WEN Robert Chen-Hao CHANG Chih-Peng FAN
In this paper, the effective Long Range (LoRa) based wireless sensor network is designed and implemented to provide the remote data sensing functions for the planned smart agricultural recycling rapid processing factory. The proposed wireless sensor network transmits the sensing data from various sensors, which measure the values of moisture, viscosity, pH, and electrical conductivity of agricultural organic wastes for the production and circulation of organic fertilizers. In the proposed wireless sensor network design, the LoRa transceiver module is used to provide data transmission functions at the sensor node, and the embedded platform by Raspberry Pi module is applied to support the gateway function. To design the cloud data server, the MySQL methodology is applied for the database management system with Apache software. The proposed wireless sensor network for data communication between the sensor node and the gateway supports a simple one-way data transmission scheme and three half-duplex two-way data communication schemes. By experiments, for the one-way data transmission scheme under the condition of sending one packet data every five seconds, the packet data loss rate approaches 0% when 1000 packet data is transmitted. For the proposed two-way data communication schemes, under the condition of sending one packet data every thirty seconds, the average packet data loss rates without and with the data-received confirmation at the gateway side can be 3.7% and 0%, respectively.
Masaaki ISEKI Takamichi NAKAMOTO
An olfactory display is a device to present smells. Temporal characteristics of three types of olfactory displays such as one based upon high-speed switching of solenoid valves, desktop-type one based on SAW atomizer and wearable-type one based on SAW atomizer were evaluated using three odorants with different volatilities. The sensory test revealed that the olfactory displays based on SAW atomizer had the presentation speeds faster than that of solenoid valves switching. Especially, the wearable one had an excellent temporal characteristic. These results largely depend on the difference in the odor delivery method. The data obtained in this study provides basic knowledge when we make olfactory contents.
Hitoshi KAWAKITA Hiroyuki YOMO Petar POPOVSKI
In this paper, we advocate applying the concept of content-based wake-up to distributed estimation in wireless sensor networks employing wake-up receivers. With distributed estimation, where sensing data of multiple nodes are used for estimating a target observation, the energy consumption can be reduced by ensuring that only a subset of nodes in the network transmit their data, such that the collected data can guarantee the required estimation accuracy. In this case, a sink needs to selectively wake up those sensor nodes whose data can contribute to the improvement of estimation accuracy. In this paper, we propose wake-up signaling called estimative sampling (ES) that can selectively activate the desired nodes by using content-based wake-up control. The ES method includes a mechanism that dynamically searches for the desired nodes over a distribution of sensing data. With numerical results obtained by computer simulations, we show that the distributed estimation with ES method achieves lower energy consumption than conventional identity-based wake-up while satisfying the required accuracy. We also show that the proposed dynamic mechanism finely controls the trade-off between delay and energy consumption to complete the distributed estimation.
Muhammad MUDASIR QAZI Rana ASIF REHMAN Asadullah TARIQ Byung-Seo KIM
Information-centric networking (ICN) provides an alternative to the traditional end-to-end communication model of the current Internet architecture by focusing on information dissemination and information retrieval. Named Data Networking (NDN) is one of the candidates that implements the idea of ICN on a practical level. Implementing NDN in wireless sensor networks (WSNs) will bring all the benefits of NDN to WSNs, making them more efficient. By applying the NDN paradigm directly to wireless multi-hop ad-hoc networks, various drawbacks are observed, such as packet flooding due to the broadcast nature of the wireless channel. To cope with these problems, in this paper, we propose an Interest called the accumulation-based forwarding scheme, as well as a novel content store architecture to increase its efficiency in terms of storing and searching data packets. We have performed extensive simulations using the ndnSIM simulator. Experimental results showed that the proposed scheme performs better when compared to another scheme in terms of the total number of Interests, the content store search time, and the network lifetime.
Hiroshi HAGA Takuya ASAI Shin TAKEUCHI Harue SASAKI Hirotsugu YAMAMOTO Koji SHIGEMURA
We developed an 8.4-inch electrostatic-tactile touch display using a segmented-electrode array (30×20) as both tactile pixels and touch sensors. Each pixel can be excited independently so that the electrostatic-tactile touch display allows presenting real localized tactile textures in any shape. A driving scheme in which the tactile strength is independent of the grounding state of the human body by employing two-phased actuation was also proposed and demonstrated. Furthermore, tactile crosstalk was investigated to find it was due to the voltage fluctuation in the human body and it was diminished by applying the aforementioned driving scheme.
Giang-Truong NGUYEN Van-Quyet NGUYEN Van-Hau NGUYEN Kyungbaek KIM
In a smart home environment, sensors generate events whenever activities of residents are captured. However, due to some factors, abnormal events could be generated, which are technically reasonable but contradict to real-world activities. To detect abnormal events, a number of methods has been introduced, e.g., clustering-based or snapshot-based approaches. However, they have limitations to deal with complicated anomalies which occur with large number of events and blended within normal sensor readings. In this paper, we propose a novel method of detecting sensor anomalies under smart home environment by considering spatial correlation and dependable correlation between sensors. Initially, we pre-calculate these correlations of every pair of two sensors to discover their relations. Then, from periodic sensor readings, if it has any unmatched relations to the pre-computed ones, an anomaly is detected on the correlated sensor. Through extensive evaluations with real datasets, we show that the proposed method outperforms previous approaches with 20% improvement on detection rate and reasonably low false positive rate.
Lu LU Mingxing KE Shiwei TIAN Xiang TIAN Tianwei LIU Lang RUAN
To tackle the distributed power optimization problems in wireless sensor networks localization systems, we model the problem as a hierarchical game, i.e. a multi-leader multi-follower Stackelberg game. Existing researches focus on the power allocation of anchor nodes for ranging signals or the power management of agent nodes for cooperative localization, individually. However, the power optimizations for different nodes are indiscerptible due to the common objective of localization accuracy. So it is a new challenging task when the power allocation strategies are considered for anchor and agent nodes simultaneously. To cope with this problem, a hierarchical game is proposed where anchor nodes are modeled as leaders and agent nodes are modeled as followers. Then, we prove that games of leaders and followers are both potential games, which guarantees the Nash equilibrium (NE) of each game. Moreover, the existence of Stackelberg equilibrium (SE) is proved and achieved by the best response dynamics. Simulation results demonstrate that the proposed algorithm can have better localization accuracy compared with the decomposed algorithm and uniform strategy.
Sheng HAO Yuh YAMASHITA Koichi KOBAYASHI
This paper proposes an active vibration-suppression control method for the systems with multiple disturbances using only the relative displacements and velocities. The controller can suppress the vibration of the main body in the world coordinate, where a velocity disturbance and a force disturbance affect the system simultaneously. The added device plays a similar role as an accelerometer, but we avoid the algebraic loop. The main idea of the feedback law is to convert a nonlinear system into an aseismatic desired system by using the energy shaping technique. A parameter selection procedure is derived by combining the constraints of nonlinear IDA-PBC and the evaluation of the control performance of the linearly approximated system. The effectiveness of the proposed method is confirmed by simulations for an example.
Yoshitaka NOZAKI Takashi WATANABE
Rehabilitation and evaluation of motor function are important for motor disabled patients. In stride length estimation using an IMU attached to the foot, it is necessary to detect the time of the movement state, in which acceleration should be integrated. In our previous study, acceleration thresholds were used to determine the integration section, so it was necessary to adjust the threshold values for each subject. The purpose of this study was to develop a method for estimating stride length automatically using an artificial neural network (ANN). In this paper, a 4-layer ANN with feature extraction layers trained by autoencoder was tested. In addition, the methods of searching for the local minimum of acceleration or ANN output after detecting the movement state section by ANN were examined. The proposed method estimated the stride length for healthy subjects with error of -1.88 ± 2.36%, which was almost the same as the previous threshold based method (-0.97 ± 2.68%). The correlation coefficients between the estimated stride length and the reference value were 0.981 and 0.976 for the proposed and previous methods, respectively. The error ranges excluding outliers were between -7.03% and 3.23%, between -7.13% and 5.09% for the proposed and previous methods, respectively. The proposed method would be effective because the error range was smaller than the conventional method and no threshold adjustment was required.
In the statistic en-route filtering, each report generation node must collect a certain number of endorsements from its neighboring nodes. However, at some point, a node may fail to collect an insufficient number of endorsements since some of its neighboring nodes may have dead batteries. This letter presents a report generation method that can enhance the generation process of sensing reports under such a situation. Simulation results show the effectiveness of the proposed method.
Takuma HAMAGAMI Shinsuke HARA Hiroyuki YOMO Ryusuke MIYAMOTO Yasutaka KAWAMOTO Takunori SHIMAZAKI Hiroyuki OKUHATA
When we collect vital data from exercisers by putting wireless sensor nodes to them, the reliability of the wireless data collection is dependent on the position of node on the body of exerciser, therefore, in order to determine the suitable body position, it is essential to evaluate the data collection performances by changing the body positions of nodes in experiments involving human subjects. However, their fair comparison is problematic, because the experiments have no repeatability, that is, we cannot evaluate the performances for multiple body positions in an experiment at the same time. In this paper, we predict the performances by a software network simulator. Using two main functions such as a channel state function and a mobility function, the network simulator can repeatedly generate the same channel and mobility conditions for nodes. Numerical result obtained by the network simulator shows that when collecting vital data from twenty two footballers in a game, among three body position such as waist, forearm and calf, the forearm position gives the highest data collection rate and the predicted data collection rates agree well with the ones obtained by an experiment involving real subjects.
Boqi GAO Takuya MAEKAWA Daichi AMAGATA Takahiro HARA
Mobile wireless sensor networks (WSNs) are facing threats from malicious nodes that disturb packet transmissions, leading to poor mobile WSN performance. Existing studies have proposed a number of methods, such as decision tree-based classification methods and reputation based methods, to detect these malicious nodes. These methods assume that the malicious nodes follow only pre-defined attack models and have no learning ability. However, this underestimation of the capability of malicious node is inappropriate due to recent rapid progresses in machine learning technologies. In this study, we design reinforcement learning-based malicious nodes, and define a novel observation space and sparse reward function for the reinforcement learning. We also design an adaptive learning method to detect these smart malicious nodes. We construct a robust classifier, which is frequently updated, to detect these smart malicious nodes. Extensive experiments show that, in contrast to existing attack models, the developed malicious nodes can degrade network performance without being detected. We also investigate the performance of our detection method, and confirm that the method significantly outperforms the state-of-the-art methods in terms of detection accuracy and false detection rate.
Li TAN Xiaojiang TANG Anbar HUSSAIN Haoyu WANG
To solve the problem of the self-deployment of heterogeneous directional wireless sensor networks in 3D space, this paper proposes a weighted Voronoi diagram-based self-deployment algorithm (3DV-HDDA) in 3D space. To improve the network coverage ratio of the monitoring area, the 3DV-HDDA algorithm uses the weighted Voronoi diagram to move the sensor nodes and introduces virtual boundary torque to rotate the sensor nodes, so that the sensor nodes can reach the optimal position. This work also includes an improvement algorithm (3DV-HDDA-I) based on the positions of the centralized sensor nodes. The difference between the 3DV-HDDA and the 3DV-HDDA-I algorithms is that in the latter the movement of the node is determined by both the weighted Voronoi graph and virtual force. Simulations show that compared to the virtual force algorithm and the unweighted Voronoi graph-based algorithm, the 3DV-HDDA and 3DV-HDDA-I algorithms effectively improve the network coverage ratio of the monitoring area. Compared to the virtual force algorithm, the 3DV-HDDA algorithm increases the coverage from 75.93% to 91.46% while the 3DV-HDDA-I algorithm increases coverage from 76.27% to 91.31%. When compared to the unweighted Voronoi graph-based algorithm, the 3DV-HDDA algorithm improves the coverage from 80.19% to 91.46% while the 3DV-HDDA-I algorithm improves the coverage from 72.25% to 91.31%. Further, the energy consumption of the proposed algorithms after 60 iterations is smaller than the energy consumption using a virtual force algorithm. Experimental results demonstrate the accuracy and effectiveness of the 3DV-HDDA and the 3DV-HDDA-I algorithms.
Masato NARUSE Masahiro KUWATA Tomohiko ANDO Yuki WAGA Tohru TAINO Hiroaki MYOREN
A lumped element kinetic inductance detector (LeKID) relying on a superconducting resonator is a promising candidate for sensing high energy particles such as neutrinos, X-rays, gamma-rays, alpha particles, and the particles found in the dark matter owing to its large-format capability and high sensitivity. To develop a high energy camera, we formulated design rules based on the experimental results from niobium (Nb)-based LeKIDs at 1 K irradiated with alpha-particles of 5.49 MeV. We defined the design rules using the electromagnetic simulations for minimizing the crosstalk. The neighboring pixels were fixed at 150 µm with a frequency separation of 250 MHz from each other to reduce the crosstalk signal as low as the amplifier-limited noise level. We examined the characteristics of the Nb-based resonators, where the signal decay time was controlled in the range of 0.5-50 µs by changing the designed quality factor of the detectors. The amplifier noise was observed to restrict the performance of our device, as expected. We improved the energy resolution by reducing the filling factor of inductor lines. The best energy resolution of 26 for the alpha particle of 5.49 MeV was observed in our device.
Naoyuki KARASAWA Kazuyuki MIYAKITA Yuto INAGAWA Kodai KOBAYASHI Hiroshi TAMURA Keisuke NAKANO
Information floating (IF) permits mobile nodes to transmit information to other nodes by direct wireless communication only in transmittable areas (TAs), thus avoiding unneeded and inefficient information distribution to irrelevant areas, which is a problem with the so-called epidemic communication used in delay tolerant networks. In this paper, we propose applying IF to sensor networking to find and share available routes in disaster situations. In this proposal, IF gathers and shares information without any assistance from gateways, which is normally required for conventional wireless sensor networks. A performance evaluation based on computer simulation results is presented. Furthermore, we demonstrate that the proposed method is effective by highlighting its advantageous properties and directly comparing it with a method based on epidemic communication. Our findings suggest that the proposed method is a promising step toward more effective countermeasures against restricted access in disaster zones.
Kedir MAMO BESHER Juan-Ivan NIETO-HIPÓLITO Juan de Dios SÁNCHEZ LÓPEZ Mabel VAZQUEZ-BRISENO Raymundo BUENROSTRO MARISCAL
End-to-end delay, aiming to realize how much time it will take for a traffic load generated by a Mobile Node (MN) to reach Sink Node (SN), is a principal objective of most new trends in a Wireless Sensor Network (WSN). It has a direct link towards understanding the minimum time delay expected where the packet sent by MN can take to be received by SN. Most importantly, knowing the average minimum transmission time limit is a crucial piece of information in determining the future output of the network and the kind of technologies implemented. In this paper, we take network load and transmission delay issues into account in estimating the Average Minimum Time Limit (AMTL) needed for a health operating cognitive WSN. To further estimate the AMTL based on network load, an end-to-end delay analysis mechanism is presented and considers the total delay (service, queue, ACK, and MAC). This work is proposed to answer the AMTL needed before implementing any cognitive based WSN algorithms. Various time intervals and cogitative channel usage with different application payload are used for the result analysis. Through extensive simulations, our mechanism is able to identify the average time intervals needed depending on the load and MN broadcast interval in any cognitive WSN.