Академический Документы
Профессиональный Документы
Культура Документы
Introduction
Recent years have witnessed a growing interest in the search for low-power, lowdata-rate and body-centric wireless communications. Academic and industrial
eorts in this research eld have led to the emergence of a new kind of promising
networks, called the wireless body area networks (WBANs). WBANs consist
of a set of wearable biosensor nodes, which collect or relay physiological and
contextual signals proling the human body activities. Typical applications include real-time monitoring of heart activity, blood pressure, breathing rate, or
skin temperature; continuous diagnostics; and remote medical treatment of a
patient. The close proximity of sensors to one another and to the human body
demands challenging optimizations to limit the radiated power, the consumption
as well as the interference with other sensors and coexistent networks. Hence,
a detailed knowledge of on-body multi-link propagation is crucial to properly
design relevant systems at the physical and access network layers. There have
been immense advancements in eld of technology over the past years. Small
size, low cost sensor networks have been developed which are capable of collecting, analyzing and transmitting information to a central processor node for
further analysis and report generation. Wireless Sensor Network is a term for
densely deployed sensor nodes which are capable of collecting real time information. These networks provide advantages over traditional sensing devices as
they provide low cost network deployment and are fault tolerant and robust. A
sensor network consists of large no of sensor nodes deployed in random topology.
Sensor networks are deployed close to the phenomenon which is to be observed.
Instead of sending collected data directly to processor node, sensor nodes uses
its processing capabilities and transmit partially processed data to task manager node via satellite for further processing as . The communication power
of transceiver is limited therefore information is communicated to Base station
or Sink by multihop path . Wireless Sensor Network (WSN) has become a vital research area, due to their wide ranging applications. WSN based systems
have been deployed widely in many applications including civilian, industrial,
agricultural, and military applications . A sensor network is composed of sensor nodes which are small in size, low in cost, and have short communication
range. A sensor node usually consists of four sub-systems: a. A computing
subsystem: this is responsible for functions such as execution of the communication protocols and control of sensors, b. A sensing subsystem: this subsystem
is responsible for sensing the environmental characteristics, such as using temperature, humidity, or acoustic sensor, c. A communication subsystem: this
consists of a short radio range used to communicate with neighboring nodes,
d. A power supply subsystem: this includes a battery which provides energy
to sensor node. Researchers have focused on dierent aspects of WSN, such
as hardware de- sign, routing, data aggregation, and localization. One of the
critical issues which needs to be taken into consideration is localizing objects
through distributed sensor network. Node localization is the problem of nding
the geographical location of each target node (the object with unknown location)
based on other reference nodes (nodes with known location). Localizing sensor
nodes is one of the fundamental and dicult problems that must be solved for
WSN. Track- ing and localization systems have been deployed to track civilian,
soldiers, and animals. depicts the idea of tracking mobile targets through WSNs,
and trans2
mit the localization information to a base station. The WSN based localization and tracking issues have received much attention recently driven by the
need to achieve high localization accuracy with the minimum cost. This is because: Sensor eld Local monitoring a. In several applications, the location itself
is the information of interest, b. Transferring sensors measurements without incurring the sensors locations is an ineective task, c. Several routing protocols
are based on the locations of sensor nodes. There are many issues aecting the
eciency of the tracking system includ- ing: the cost of extra localization hardware, number of reference nodes in the tracking area, and the communication
range for the target and reference nodes. These issues have to be taken into
account before developing a WSN-based tracking system. A wide range of node
localization and tracking systems have been proposed recently. According to ,
most of the WSN-based localization solutions are either range-based or rangefree . Range-based approaches deploy various techniques (ultrasound, infrared,
and GPS devices) to rst determine the distance between reference and target
nodes, and then compute the location using geometric principles. In order to
calculate the distance between the target and reference nodes, an additional
hardware is usually required to be attached to each wireless sensor device. On
the other hand, in range-free approaches, distances are not computed directly,
as the number of hops between the target and reference nodes is calculated. As
soon as the hop counts are calculated, dis- tances between nodes (reference and
target nodes) are computed based on the average distance per hop. And then,
geometric principles are used to calculate the targets location. Range-free techniques are not accurate as range-based ones and often require a high number of
messages to be transmitted before cal- culating the targets locations . Since,
range-based systems require attaching additional hardware to each target and
reference nodes, which increases both the cost and power consumption for sensor nodes. But, range-based approaches oer better localization accuracy than
the range-free systems. Furthermore, range free approaches require scattering
a large number of reference nodes in order to oer ecient localization accuracy .
Therefore, this paper focuses on range based systems as they oer better localization accuracy than range free systems. The existing WSN-based localization
systems are discussed in details . However, in this paper, we aim to discuss the
existing WSN based localization approaches which could be used for Threats detection and tracking in military applications, and point out the key issues which
need to be taken into consid- eration before designing and implementing a WSN
based localization approach for Threats detection and tracking. The idea of the
researchs goal is depicted . Our contribution lies on the following aspects: i.
Study the existing WSN-based localization and tracking systems, ii. Present,
discuss, and compare WSN based localization and tracking methods which could
be deployed in military appli- cations, iii. Present the key issues which need
to be taken into consideration before designing and developing a WSN-based
localization system for Threats detection and tracking applications. This paper is organized as follows: presents a classication of WSN-based tracking and
localization. discusses the strengths and weaknesses of the existing localization
and tracking systems. Recommen- dations for WSN developers in order to design and implement a WSN-based tracking system for military applications are
. And nally, conclusions and future work presented.
LITERATURE SURVEY
WSN is one of the fastest growing technologies in ubiquitous networking today. Standardization eorts, such as IEEE 802.15.4 , are geared to reduce costs,
provide device customizability for diverse applications and create standards for
interoperability. The IEEE 802.15.4 standard was developed to address a demand for low-power and low-cost in low-rate wireless personal area networks
(LR-WPAN). Dealing with low data rates, IEEE 802.15.4 oers very long battery life (months or even years) and very low complexity. The IEEE standard
802.15.4 denes the physical layer (PHY) and medium access control (MAC) sublayer specications for LR-WPAN in the 2.4 GHz and 868/915 MHz bands. A
free license to use the industrial, scientic and medical (ISM) 2.4 GHz band is
available worldwide, while the ISM 868 MHz and 915 MHz bands are only available in Europe and North America, respectively. A total of 27 channels with
three dierent data rates are allocated in IEEE 802.15.4, including 16 channel
with a data rate of 250 Kbps in the 2.4 GHz band, 10 channels with a data rate
of 40 Kb/s in the 915 MHz band and 1 channel with a data rate of 20 Kb/s
in the 868 MHz band. Channel sharing is achieved using carrier-sense multiple
access (CSMA), and acknowledgments are provided for reliability. Addressing
modes for 64-bit (long) and 16-bit (short) addresses are provided with unicast
and broadcast capabilities. The main characteristics of WSN devices are small
physical size, low-power consumption, limited processing power, short-range
communication capability and small storage capacity. A number of studies and
projects have focused on novel ubiquitous healthcare systems utilizing WSN
technology to simplify methods of monitoring and treating patients. A case in
point is the MobiHealth project, which developed a system for ambulant patient
monitoring over public wireless networks based on a body area network (BAN)
. Another example is the Ubiquitous Monitoring Environment for Wearable and
Implantable Sensors project (UbiMon) [33] at Imperial College London, which
aims to provide a continuous and unobtrusive monitoring system for patients to
capture transient, but life-threatening events. CodeBlue was designed to operate across a wide range of devices, including low-power motes, PDAs and PCs,
and it addresses the special robustness and security requirements of medical
care settings. Rapid technological development, ease of use and falling costs
have made mobile devices increasingly popular, producing great changes in todays lifestyle. During the past decade, the development of wireless mobile and
information technologies (IT) has helped to extend the concept of ubiquitous
coverage to new segments of society. Thus, many applications that were initially
available at a xed location only have been transformed into ubiquitous applications, to be used wirelessly and exibly at anytime, anywhere. The same trend
has been observed in the medical eld. Over the years, many telemedicine and
healthcare related societies and authorities have turned to wireless technologies to overcome the poor mobility of desktop PC-based healthcare monitoring systems. As a result, the possibility to monitor biomedical signals using a
mobile device is no longer an unachievable dream. In this work, an Androidbased smartphone is used as monitoring terminal due to its smart functions and
computer-like features. Compared to other smartphone operation systems, the
Android device has many advantages, such as openness. Moreover, all applications are equal, there are no boundaries between applications and its development is fast. Furthermore, the Android smartphone is currently one of the
4
EXISTING METHOD
3.1
In this section, we study and compare the eciency of the existing systems in
terms of their strengths and weaknesses. We start with GPS-based approaches.
GPS-based systems oer reasonable localization accuracy and have been deployed in several applications including military, civilian and industrial. However, using GPS-based systems for Threats detection and tracking tasks is an inecient for several reasons: First, each threat object is required to be at- tached
with a GPS receiver and transceiver, and this is not applicable in mili- tary
Threats detection and tracking applications. Second, GPS systems require a
straight line of sight between the receiver and GPS satellites, and this re- quirement is not valid for indoor tracking, due to the obstacles and walls found
between the senders and receivers. And third, attaching additional hardware
to each sensor node will increase both the sensors size and cost. Therefore,
GPS-based systems are considered as inecient tracking system for Threats detection and tracking applications. Lets move to the second approach discussed
in the literature, the camera-based approach. Camera-based systems oer efcient localization accuracy, as these systems track positions and identities of
mobile targets, without the need for attaching any device to suspect objects.
The same with GPS approaches, camera-based systems suer from a high cost,
in addition to the requirement of a straight line of sight to be existed between
the camera (reference node) and target object, in order to compute the targets
locations. One the other hand, camera-based approaches require to be used in
day time in order to be able to detect the targets positions. A night camera can
be used to track objects; however this solution is an ineective in terms of cost.
Consequently, using the camera approach in WSN-based tracking system is not
a practical tracking solution for several reasons: a. The requirement of installation and maintenance, including periodic lens cleaning, b. Performance aected
by inclement weather such as fog, rain, and snow, c. Reliable night-time signal
actuation requires street lighting, d. Some models are susceptible to camera
motion caused by strong winds or vibration of camera mounting structure. RFbased approach was the third approach taken into consideration for de- tecting
and tracking Threats. RF-based systems can be deployed to track targets with
low cost, as there is no need to attach special hardware to each reference and
target wireless sensor nodes. These approaches oer cost-wise localization solutions, but oering low localization accuracy. RF-based systems dont re- quire
attaching any additional device or sensor to each target node except the transmitter and receiver found at each sensor device; however the sensors cost is
not expensive as in the camera and GPS-based systems. The last approach discussed in the literature was the acoustic-based approach. This kind of sys- tems
oer ecient localization information and considered as cost wise systems,as they
6
3.2
In this section, we compare the exiting WSN based approaches which have
been discussed in the literature. Table 1 compares the existing localization
techniques in terms of accuracy, the requirement of additional hardware (HW),
cost, den- sity, deployability, and power consumption. In terms of tracking
GPS and camera-based systems oer reasonable localization accuracy, but GPS
tracking systems require attaching an expensive hardware to each target object,
which increases cost, complexity, and power consumption for each sensor node.
The to additional hardware is a critical requirement in Threats detec- tion
and tracking systems. GPS, and RF-based approaches require each suspect
(target) object to be attached with an additional hardware, in order to be localized. While, there is no need for any additional hardware to be attached to
the target node when the camera or acoustic-based systems are used. In terms
of , GPS and camera-based systems are considered as high cost localization
solutions. GPS systems require attaching a GPS receiver and transceiver to
each target object, while an additional camera sensor is required to be added
to each reference node in the camera-based tracking systems. In acoustic-based
systems, an additional hardware is needed (acoustic sensor), however its considered as a low cost sensor compared to GPS receiver, transceiver, and camera
sensors. RF-based systems oer low cost localization system, as there is no
requirement to attach any special device (microphone, ultrasonic, or camera) to
reference and target wireless sensor nodes, as this kind of systems depends only
on the radio signals transmitted from reference nodes .GPS tracking systems do
not require a high density of sensor nodes to be deployed in the tracking area of
interest, as the targets coordinates computed through the values received from
the satellites. However, vision-based systems require a high density of reference
nodes. The density of reference nodes in the RF-based systems is based on
the transmission range. In the acoustic-based systems, the density of reference
nodes is based on the voice emitted by the target node.
3.3
The constrained computation power, battery power, storage capacity, and communication bandwidth of the tiny sensor devices pose challenging problems in
the design and deployment of Threats detection and tracking systems. Threats
detection and tracking systems pose many challenges when deployed for military applications. One of the key technological challenges is how to track threat
objects without attaching any additional device (sensor) to those targets. In
RF and GPS-based tracking system, its essentially to attach a device (GPS
receiver and transceiver, or RF module) in order to be able to detect and track
Threats positions. One more challenge is how to track Threats with the lowest
cost possible. Attaching additional hardware (camera, or GPS) to each threat
object is inecient too, because it rises up the tracking systems cost. Using
7
acoustic sensor might reduce the tracking complexity and cost. Acoustic-based
systems require attaching a simple acoustic sensor to each reference node, in
contrast to GPS and camera-based systems. Now, using an acoustic method to
detect and track the position of target objects might overcome some of those
challenges.
KEY ISSUES
Through discussing and analyzing the existing approaches for military tasks,
there are many recommendations must to be taken into consideration before
designing and implementing a military tracking system. As result, developers
need to consider the following issues: 1. Accuracy: the designed system must
oer reasonable localization accuracy for Threats detection and tracking systems, as obstacles and walls could be existed in the tracking area of interest,
and hence achieves low localization accuracy. 2. Cost: adding a supplementary
hardware to hundreds or thousands of nodes is a highly inecient solution in
terms of cost. The localization technique must be cheap in cost in order to be
attractive solution for WSN systems . 3. Power consumption: in WSN, energy
is mainly consumed by three subsystems: signal processing, data transmission,
and hardware operations. Consuming less energy in WSN based tracking systems is a primary objective in designing a WSN application, as each sensor node
is usually equipped with batteries which could be hard to replace. 4. Coverage:
the localization system should cover the tracking area of interest in order to
sense any suspicious object, and then achieve the goal that was designed for . 5.
Density of reference node: a high density of reference nodes will increase both
the cost and power consumption for WSN system. Therefore, the total number
of reference nodes should be as minimum as possible 6. Delay time: the sink
node (administrator) must be informed about the threats position as soon as
one of the reference nodes detects its position 7. Deployability : usually, sensor nodes are scattered or deployed using airplanes. The tracking system must
be easy to deploy with no need for a hard installation . 8. Accessibility: the
designed tracking system must be able to work indoors and outdoors. As the
system could be deployed where a number of obstacles (such as tree, wall, or
vehicle) found in the tracking area of interest. 9. Form factor: attaching additional hardware or sensor device to each sensor node will increase the sensors
size. In Threats detection and tracking system, its critical to keep the sensor
nodes size as tiny as possible in order to be invisible for Threats objects.
SYSTEM ARCHITECTURE
modest number of sensors are being employed, long spreading sequences would
be unnecessary. The complexity of multi-user detection is comparable or less
than that of the activity detection methods that we have already implemented
on the mobile phone and are described in the sequel. Finally, the KMCore service manager communicates with the KMClient graphical user interface (GUI).
The framework is fairly complex and resource intensive, but not critical to data
collection. If mobile phone resources (memory, computation power) are limited,
the KMClient is shut down without aecting the KMCore since the GUI and
data collection systems are separate.
11
Figure 1: KNOWME system architecture flow diagram and screen shot from
the sedentary behavior analyzer implemented on the mobile platform.JPG
.
12
14
As noted, our selected set of o-the-shelf biometric sensors is Bluetooth en- abled.
Bluetooth is an access protocol/technology for the exchange of data over short
distances between both xed and mobile platforms. Several modulation formats
have been considered since the inception of the standard; currently 8- dierential
phase shift keying is possible to achieve a 3 Mb/s data rate. To achieve a desired
spectral mask, frequency- hopped spread spectrum is em- ployed, although not
exploited for multiple access. The Bluetooth protocol is packet-based and enables a master-slave system wherein a single master may have up to seven slaves
in a piconet. It is this master-slave piconet that com- prises our WBAN. The
system works in a time-division multiple access mode wherein slaves communicate with the master in a round-robin fashion; although it is the master (the
mobile phone) that determines with which slave it will communicate. As previously noted, in contrast to the traditional view of a sensor network, it is the cell
phone fusion center that is the energy bottleneck of our system.Coordinating and
listening to the Bluetooth transmissions from the biometric sensors consumes
much more energy for the cell phone than the transmission of those signals from
the sensors. As such, to maximize system life, we need to optimally determine
which sensors to listen to and for how long this is the sensor selection problem. In particular, we have considered the problem of allocating a xed number
of transmission samples across the sensors while balancing between classication
error and energy consumption. Further- more, the evolution of physical activity
state during the day can be modeled as a dynamic stochastic system. We explicitly considered these properties to determine sequential allocations exploiting
stochastic control methods. Finally, a unique feature of WBANs with heterogeneous sensors is that each sensor has dierent discriminative properties as well
as dierent energy costs. Ideally, we would derive an optimal sampling protocol
based on the SVM classier. Such an approach faces two important challenges:
There is no closed form expression for the performance of the SVM to optimize.
The top performing SVM uses a large feature set and complexity of optimal
feature selection would be prohibitive for implementation on a mobile device.
Thus, we considered a single exemplary feature per sensor, exploited Gaus- sian
models for the sensor measurements, and further approximated the proba- bility of classication error in order to convert a combinatorial integer-programming
problem into a continuous vector-valued optimization. This approximation effort is largely motivated by the need to implement the sampling strategy on the
mobile phone. When the optimal sampling strategy derived in this manner is
applied to the SVM classier, signicant energy savings are experienced with no
performance loss. We extended our work in by modeling our allocation problem as a partially observable Markov decision process (POMDP) to capture the
systems se- quential nature. POMDPs are well matched to our problem as we
can model the dynamics of physical state change via a Markov chain (Fig. 4b).
Dy- namic programming (DP) and greedy search strategies are employed to
opti- mize the trade-o between classication error and energy cost, and signicant
energy gains are obtained . We observe that other sensor selection strategies
for WBANs often assume correct knowledge of the current PA state .presents
a simplied form of our proposed sensor selection scheme. The individ- ual is
alternating between a set of physical activities and during this process, a set
of measurements is generated and communicated to the fusion center, which
15
then estimates the underlying activity. This estimate is used to update the
fusion centers belief on the underlying true activity (belief state) that in turn
determines the subsequent samples allocation.
16
Related Work
taking into account the in uence of the body movement; 3) the multi-link crosscorrelation is also modeled on a perlink basis. Finally, the proposed model
is compared with the original measurements by considering several validation
metrics.
18
19
MEASUREMENT CAMPAIGN
20
10
10.1
To ensure security of the overall system, BAN/BASN must be protected, for example, against eavesdropping, injection, and modication of packets. Se- curity
issues in BANs/BASNs for telemedicine and m-health are particularly important
because sensitive medical information must be protected from unau- thorized
use for personal advantage andfraudulent acts that might be hazardous to a
users life (e.g., alteration of system settings, drug dosages, or treatment procedures). Although the security issues in networks are always considered top
priority, studies carried out in this area for BANs/BASNs were few. The very
limited work found in this area is not applicable to BASN in telemedicine and
mhealth because the biosensors in a BASN must operate with extremely stringent constraints, a requirement that was relatively relaxed in generic BANs.
Less threatening than eavesdropping and tampering problems, but as important, is avoidance of interference between BASNs of dierent individuals, because communications of BASNs could easily cross over to each other when
many people have their own BASNs in the future. Therefore, the problem of
anti-interference must also be taken care of in the development of a BASN.
Even though the two challenges seem to be unrelated to each other, the problems could be converged into one simple question: how can sensors or nodes
of a BASN know that they belong to the same individual? In this article we
intend to present and investigate the system performance of a novel biometric
solution to this question. Biometrics is a technique commonly known as the automatic identication or verication of an individual by his or her physiological
or behavioral characteristics. In order to be a practical biometrics system,it is
postulated that the utilized characteristics should be : Universal: possessed by
the majority, if not the entire population Distinc- tive: suciently dierent in any
two individuals Permanent: suciently in- variant, with respect to the matching
21
criterion, over a reasonable period of time Collectable: easily collected and measured quantitatively Eective: yield a biometric system with good performance;
that is, given limited resources in terms of power consumption, computation
complexity, and memory storn age, the characteristic should be able to be processed at a fast speed with recognized accuracy Acceptable: willingness of the
general public to use as an identier Invulnerable: relatively dicult to reproduce
such that the biometric system would not be easily circumvented by fraudulent
acts Instead of applying bio- metrics generally in user authentication of common cryptosystems, we intend to develop a technique that would authenticate
sensors nodes and/or secure cipher key transmission among them in BASN. As
illustrated in Fig. , since the human body is physiologically and biologically
well-known to consist of its own trans- mission or transportation systems (e.g.,
the blood circulation system), we would like to investigate how to make use of
these secured communication pathways available specically in BASN but not
other wireless networks. It is believed that if used properly, these systems can
be naturally secured conduits for in- formation transmission within a BASN,
where other techniques (e.g., hardware or software programming) must be used
in generic wireless networks to achieve the same purpose. The idea is particularly practical in securing BASN with a telemedicine or m-Health application,
as nodes of these BASN would already comprise biosensors for collecting medical data, which could be physiological characteristics uniquely representing an
individual. If these intrinsic character- istics can be used to verify whether two
sensors belong to the same individual, the multiple usages of the recorded physiological signals will certainly save re- sources while adequate security measures
are employed.
22
23
Figure 4: Level crossing rate for measurement and model for vertical polarization.JPG.
24
11
We used data collected previously from two experiments, of which the original purpose was to simultaneously capture electrocardiogram (ECG) and photoplethysmogram (PPG) data for the estimation of blood pressure. In-house
circuits were designed for capturing ECG and PPG via stainless steel electrodes
and infrared optical sensors. In one experiment 14 healthy subjects were recruited and two PPGs captured from the index ngers of the two hands of each
subject, and an ECG captured from three ngers of the subjects were recorded
simultaneously for 23 min. In another experiment [12], 85 subjects were recruited, and within a 2-month period, ECG and PPG were captured for 23 min
on 3 4 days. ECG and PPG were both sampled at 1000 Hz. An algorithm was
developed to mark the peak of the R-wave of ECG and the foot of the PPG
pulse. We divided the ECG and PPG pairs into segments such that the corresponding ECG segment contained exactly 68 R-waves (resulting in 67 IPIs). A
total of 838 data segments were obtained from the 99 subjects. As shown in Fig.
3, IPIs were obtained independent from the dierent physiological signals, and the
sequence of IPIs in one segment was coded into a binary sequence b of 128 bits.
Since the Hamming distance was used to evaluate the dissimilarity be- tween
two binary sequences b and c, the encoding method was carefully selected such
that the Hamming distance of the binary codes corresponding to any two similar
IPIs would be small. Two binary sequences would only be considered matched
if the Hamming distance was smaller than a threshold. Ideally, b and c should
match only if they were recorded from the same person during the same period
of time. Similar to the generic biometric verication systems, we evaluated the
performance of the proposed biometric approach by two types of errors: False
rejection rate (FRR), the rate of which b and c measured from the same person
during the same period of time were unmatched (i.e., corresponding to a node
in the same BASN being rejected by the judging node) False acceptance rate
(FAR), the rate of which b matched c measured from a dierent person or at
a dierent time (i.e., corresponding to a node of another BASN or an impostor
being accepted as a legal node). In addition to the conditions stated above, we
investigated the performance of the operating system when the number of IPIs
used for each b was reduced from 67 IPIs to 34 IPIs so that b would have 64 bits
instead of 128 bits. We also studied the scenario when both ECG and PPG were
downsampled from 1000 Hz to 200 Hz. The left and right panels of Fig. 4 show,
respectively, the half total error rate (HTER = 1/2(FAR + FRR)) against the
distance, and the genuine acceptance rate against the false acceptance rate for
the dierent test conditions.
25
12
12.1
26
our algorithms. A single, custom-developed hip-mounted inertial sensor consisting of a triaxial ACC and a triaxial gyroscope was employed . An important component in our study [14] was to compare the ecacy of gyroscope-based
models against ACC-only solutions with respect to predicting energy expenditure. Gyroscopes are much more useful in tracking dynamic activities and do
not suer from the problems of gravitational bias as do accelerometers. Our further innovation was the development of data-driven kinematic motion models
mapping movement to energy for walking, which exploited the inherently cyclical nature of walk. We designed three prediction methods that show signicant improvement over simple linear regression tting: Least Squares Regression
(LSR), Bayesian Linear Regression (BLR), and Gaussian Process Regression
(GPR). Many accelerometry-based studies on physical activity in the area of
health focus on the use of uniaxial ACCs. Not surprisingly, triaxial information
is more accurate than uniaxial information. Our data-driven statistical models
allowed us to bypass count-based techniques and the use of thresholds yielding
improvements over . However,a surprise from our study was the fact that gyroscopic information yielded prediction accuracy equivalant to, if not better, than
ACCs. This result was important because it demonstrated the use of a sensor
alternative to accelerometers in measuring energy expenditure.
12.2
Our analysis showed that LSR-based approaches are prone to outlier sensitivity and overtting. Nonlinear regression methods showed better prediction accuracy, but required an order of magnitude increase in runtime. Our study showed
how probabilistic models in conjunction with joint modeling of triaxial accelerations and rotational rates could improve energy expenditure prediction for
steady-state treadmill walking, closely matching ground truth. Another signicant contribution of our work was that our sensors transmitted data via Bluetooth to secondary devices as opposed to local storage. We have success- fully
connected sensors to both traditional PCs and Android-based smartphones to
receive streaming data. Range and the number of simultaneously transmitting Bluetooth devices limited the maximum data transmission rate using Bluetooth. We are currently examining the integration of these inertial sensors into
KNOWME.
27
28
29
13
CONCLUSION
In this paper, time-variant multi-sensor WBANs were investigated. An experimental campaign was performed to measure the dierent links of a full-mesh
WBAN simultaneously for long periods of time, using a multi-port channel
sounder and two polarizations (vertical and normal). A stochastic channel model
was then derived from the measurements. The power of the dierent links cannot be modeled satisfactorily with a simple power-distance law. Therefore, a
scenario-based approach is chosen, where the powers of each link are modeled
as deterministic values. The channel fading was modeled with a log-normal
distribution. The autocorrelation of each link was modeled by combining an
exponential decay and a sinusoidal component, the latter being related to the
periodical movement of the arms and legs when walking. The parameters of the
autocorrelation model were extracted from the measurements with a MMSE
estimator. The correlation between the dierent links were measured, and were
shown to be high for certain links, especially for links with nodes on the limbs.
The channel model was eventually validated with a number of validation metrics. The multi-link capacity was used to determine whether the channel model
was able to reproduce the received power and fading statistics of each link, individually and taken in a multi-link setup. It was shown that there is a good
match between the measurements and the model. The multi-link capacity also
revealed that, for certain nodes, the fact of using one (or two) relay(s) may signicantly improve the link reliability. Finally, the time-variant behavior of the
model was successfully validated by comparing the LCR and the AFD for both
measurements and model, except for very low received power levels, thereby
illustrating the limits of the log-normal distribution for modeling the fading
statistics. Our main objective was to study the exiting localization approaches
which can be deployed in WSN and could serve military applications, in order
to bring out few key issues for designing and implementing a tracking system to
detect and track Threats through border security area. And have outlined how
the tracking approach can meet these requirements. It stands for integrating
the acoustic device with wireless sensor nodes in order to be able to detect and
track the positions of threat objects. The major contribution of this paper includes classication the exiting WSN-based tracking and localization systems.
For future work, we aim to develop and design an acoustic-based system for
Threats detection and tracking. This kind of systems is based only on emitting
a voice by a threat object. Moreover, acoustic sensors are considered as an effective cost solution. Further improvements would be considered to enhance the
localization accuracy for the proposed system, by integrating ultrasonic sensor
to track the positions of silent Threats. Wireless Sensor Networks are emerging
as a great way of data collection of monitoring. Its applications are not limited
to Military Services but extend to vast area of human activities. The exibility,
fault tolerance, high sensing delity, low-cost and rapid deployment characteristics of sensor networks create many new and exciting application areas for
remote sensing. In the future, this wide range of application areas will make
sensor networks an integral part of our life.
30
14
REFERENCES
31
32
Item
Widgets
Gadgets
Quantity
42
13
14.1
14.2
X1 + X2 + + Xn
1X
Sn =
=
Xi
n
n i
denote their mean. Then as n approaches infinity, the random variables
) converge in distribution to a normal N (0, 2 ).
14.3
n(Sn
Use section and subsections to organize your document. Simply use the section
and subsection buttons in the toolbar to create them, and well handle all the
formatting and numbering automatically.
14.4
33