SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 8, Issue 7 (September 2013), PP. 89-94
www.ijerd.com 89 | Page
A Modelof Real-Time Outdoor Wireless Monitoring
Dr Ezechukwu O A
Department of Electrical Engineering, Nnamdi Azikiwe University Awka.
Abstract:- This paper presents development of Received Signal Strength Indicator (RSSI) model of an outdoor
environment using TelosB sensor nodes. Extensive real-time measurement of the RSSI was done at the library
field of Nnamdi Azikiwe University, Awka for several months. The average of the measurement was taken and
used for the development of the RSSI model. Least Mean Square Error (LMSE) method of linear regression
analysis was used to develop the model. The developed model was tested and the goodness of fit (R2
) of the
model was determined to be 0.83. This confirmed that the model can be used to determine the RSSI at any
given distance of an environment with similar radio characteristics.
Keywords:- RSSI, WSN, TelosB, Sensor nodes.
I. INTRODUCTION
Since the start of the third Millennium, wireless sensor networks (WSNs) generated an increasing
interest from industrial and research perspectives [1, 2]. A WSN can be generally described as a network of
nodes that cooperatively sense and may control the environment enabling interaction between persons or
computers and the surrounding environment [3]. A large number of such sensors can be deployed in an area to
achieve an overall sensing objective. In addition to sensing and collecting data, these sensors are also equipped
with processing capabilities to deduce how to route the data packets through the neighbours to an Internet-
connected base station or sink. The wireless sensor nodes are usually battery powered or have energy harvesting
units built in them to prolong their lifetime. The sensing circuitry measures ambient condition related to the
environment surrounding the sensor and transforms these into an electric signal. Processing such a signal reveals
some properties about objects located and/or events happening in the vicinity of the sensor. The sensor sends the
collected data through a radio transceiver to the sink either directly or through a gateway. The decrease in the
size and cost of these sensors, resulting from technological advances, has fuelled interests in the possible use of
large set of disposable unattended sensors. Such interests have motivated intensive research in the past few years
addressing the potential of collaboration among sensors in data gathering and processing and the coordination
and management of the sensing activity and data flow to the sink. A natural architecture for such collaborative
distributed sensors is a network with wireless links that can be formed among the sensors in an ad hoc manner.
The TelosB sensor node by crossbow is an IEEE 802.15.4/ Zigbee compliant node. The nodes are composed of
four main units namely; the Chipcon CC2420 transceiver, the MSP430 microcontroller, the power section which
consists of two AA (3V) batteries and the sensor section which consists of temperature (-40-123.8o
c), humidity
(0-100%RH), visible light (320nm-730nm) sensors and slot for any two sensors of ones choice. The chipcon
CC2420 transceiver operates at 2.4-2.4835GHz, has 250kbps data rates, RF power of -24 to 0dBm, receive
sensitivity of -90 to -94dBm. The MSP430 microcontroller has 16kbytes EEPROM, 48kbytes program flash
memory, 12 bit ADC, 12 bit DAC and 10kbytes Ram. The TelosB sensor node has USB slot with which it is
connected to computer/laptop for programming. It uses tinyOS operating system and runs only on window XP
with cygwin. TinyOS 2.x has Java 1.5, cross compilers for MSP430 Platforms and TinyOS/NesC related tools.
The codes written were compiled and loaded into the node via USB. In this paper, the RSSI model of an outdoor
environment is developed based on extensive empirical study in an open field.
II. RSSI MODEL
Received Signal Strength Indicator (RSSI) measures the strength of the radio signal received. The
characteristics of RSSI, shows that the received signal strength will decrease with increased distance as shown
by equation 1, [4]
  )1(log10 AdnRSSI 
Where n is the path loss exponent, d is distance from sender to receiver, A is received signal strength at
a reference distance.
In embedded devices like wireless sensor nodes, the received signal strength is converted to a received
signal strength indicator (RSSI) which is defined as a ratio of the received power to the reference power (Pref).
Typically, the reference power represents an absolute value of Pref = ImW. An increasing received power results
in a rising RSSI.
A Modelof Real-Time Outdoor Wireless Monitoring
www.ijerd.com 90 | Page
  )2()(log10 dBmRSSI
P
P
RSSI
ref
r

The specific point in a system where position estimates are calculated is an important design parameter.
For environmental changes the log model also will change. So using a scaling factor for adjusting the log model
with the measured data, the basic RSSI log model equation changes to
)3(])1(log10[ 10 AsdnRSSI 
where s = scaling factor.
)4(
)1(log10 10 


sd
ARSSI
n
)5(10
1][ 10
s
n
ARSSI
d



RSSI model is very important because RSSI measurements are applied in many areas such as
estimation of the position of targets in an observation area, determination of Link Quality of a testbed
environment, development of routing algorithms, characterization of environments and determination of the
energy spent by the sensor nodes in communicating to each other.
The authors in [5] described an enhancement method for location estimation based on RSSI-values and extended
Kalman filter, using per-calibration measurements. However they support their system with a standard wireless
local area network over the 2.4GHz frequency band. The authors in [6] also described localization in a WSN
using RSSI as the underlying model. However, their major focus has to quantify distance estimation errors
across multiple environments. In [7], the authors derived the Cramer-Rao Bound (CRB) for location estimation
using RSS and Time Of Arrival (TOA) relative localization techniques. Their testbed developed at Motorola
Labs consisted of 12 prototype peer-to-peer wireless sensor devices with RSS measurement capabilities. They
concluded that despite the reputation of RSS as a coarse localization model, it can nevertheless achieve an
accuracy of about 1m RMS in a real testbed environment. The authors in [8,9] discussed the characterization of
an environment using RSSI in WSNs. The energy model of WSNs in terms of the distance and pathloss
exponent was described by authors in [10,11]. In [12,13], the authors showed how RSSI can be used in
developing routing protocols in WSNs. This paper presents the development of RSSI model using Least Mean
Square Error (LMSE) method of linear regression analysis.
III. RESEARCH METHODOLOGY
In this work extensive real-time experiments were conducted to determine the practical distance range
of Wireless Sensor Nodes in an outdoor environment. The aim of this work is to predict the RSSI value at a
given distance in an environment with similar radio characteristics as the one used in the work. The
development kit used is Crossbow TelosB sensor node from Texas Instrument which have Chipcon CC2420
transceiver- an IEEE 802.15.4 radio with a built in 2.4 GHz antenna as the communication unit. The transceiver
has built-in RSSI providing a digital value that can be read from the 8 bit, signed 2’s complement
RSSI.RSSI_VAL register. The RSSI value is always averaged over 8 symbol periods (128µs), in accordance
with [14]. The RSSI_VALID status bit indicates when the RSSI value is valid, meaning that the receiver has
been enabled for at least 8 symbol periods.
The experimental setup consist of four Crossbow TelosB sensor nodes programmed with NesC programming
language is shown in figure1.
Fig. 1 shows pictorial representation of the experimental tesebed.
A Modelof Real-Time Outdoor Wireless Monitoring
www.ijerd.com 91 | Page
Programs written in NesC were used to convert the readings from the sensor nodes direct to actual
values. The program for the collection of data and graphical user interface display of the sensor node was
written in Java language. The program displays the data received and also shows graphical relationship of the
sensor node for voltage, temperature, light intensity, humidity. The graphical display has options for save data,
clear data, start monitoring and stop monitoring as shown in figure 2.
Fig 2: Run SensorRouterApp screen
The nodes are programmed to send data every 5 seconds. The data collected over a long period of time
was averaged and used for analysis. One of the sensor nodes was attached to the laptop through a USB cable and
was used as the sink. The remaining three sensor nodes were placed at 00
, 900
, 1800
from the sink at the same
distances while taking the measurements. The measurements were taken from 5m to 60m distance at the interval
of 5m. At each distance readings were taken for 2 minutes giving a total of about 20 readings for every distance.
The mean of the RSSI value obtained at a given distance was calculated and variance and the standard error of
the mean were determined.
In the experiment, the RSSI value is an average of the received signal strength at the packets arrival
time. RSSI is the estimate of the signal power and is calculated over 8 symbol periods and stored in the
RSSI_VAL register. Chipcon [15] specifies the following formula to compute the received signal power (P) in
dBm.
)6(__ OFFSETRSSIVALRSSIP 
where RSSI – OFFSET is about – 45.
Tables 1 shows the mean RSSI values of the nodes from measurement testbeds (outdoor environment).
Table 1 RSSI values against distance of the testbed
Distance
(m)
RSSI (dBm)
for node ID
301
RSSI (dBm)
for node ID
302
RSSI (dBm)
for node ID
303
Ave. RSSI
(dBm) of the
3 nodes
1 -40.7 -46 -44.8 -43.83
5 -61.4 -64.1 -62.3 -62.60
10 -68.1 -69.6 -65.8 -67.83
15 -82.4 -75.9 -74.7 -77.67
20 -80.3 -77.7 -81.9 -79.97
25 -77.6 -88.5 -81.3 -82.47
30 -81.5 -88.5 -89.5 -86.50
35 -88.7 -89.2 -84.7 -87.53
40 -75.8 -88.2 -86.3 -83.40
45 -82.3 -91.8 -85.5 -86.53
50 -84.7 -91.8 -92.2 -89.57
A Modelof Real-Time Outdoor Wireless Monitoring
www.ijerd.com 92 | Page
55 -78.8 -88.8 -89.3 -85.63
60 -92.2 -92.43 -92.3 -92.3
IV. RESULT ANALYSIS
From the data obtained graphs were plotted to show the relationship between RSSI and distance of the
measurements. A bar chart showing the mean values of the RSSI of the three sensor nodes and their average at
various distances of the measurement were drawn. Also, the average value of the RSSI of the three sensor nodes
and their average was plotted against distance in matlab. Least Mean Square Error method of Linear Regression
Analysis was used to develop a model of the testbed environment.
Fig 3: Bar chart showing the mean RSSI of the three sensor nodes and their average
Figure 4: Plot of RSSI of the three nodes and their average against distance
A model equation of RSSI of the testbed environment was developed by finding the least mean square
error line of the measured points. The plot is shown in Figure 5.
A Modelof Real-Time Outdoor Wireless Monitoring
www.ijerd.com 93 | Page
Figure 5: Plot of the developed model of the RSSI of the testbed environment
The RSSI developed model of the testbed environment follows the trend given by equation 7.
)7(61*58.0  dRSSI
Where d is the distance.
The goodness of fit (R2
) of the RSSI model developed for the testbed environment was tested and found to be
0.83.
V. CONCLUSION
From the graphs, it was observed that RSSI decreases as the distance increases, although, there are
some exceptions which may be due to line of sight measurements or multipath effects. The RSSI at any known
distances can be calculated using the developed model of equation 7 for the outdoor environment. The goodness
of fit (R2
) of the developed RSSI model was 0.83 which shows that the model can generally be applied in RSSI
determination of an environment with similar radio characteristics. Therefore, the RSSI at any known distance
can be calculated using the developed model of equation 7 for the outdoor testbed.
REFERENCES
[1]. Akyildiz, I., Su, W., Sankarasubramaniam, Y. and Cayirci, E., (2002), “A survey on sensor networks”.
IEEE Communication Mag., Vol. 40, 102–114.
[2]. Rajaravivarma, V.; Yang, Y.; Yang, T. (2003), “An Overview of Wireless Sensor Network and
Applications”, Proceedings of 35th South Eastern Symposium on System Theory, Morgantown, WV,
USA, Pp. 432–436.
[3]. Verdone, R.; Dardari, D.; Mazzini, G.; Conti, A., (2008), “Wireless Sensor and Actuator Networks”,
Elsevier: London, UK , Pp 206-211.
[4]. IEEE 802.15.4 Standard. Part 15.4, (2006), “Wireless Medium Access Control (MAC) and Physical
Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)”; IEEE:
Piscataway, NJ, USA.
[5]. Marko Helen, Juha Latvala, Hannu Ikonen and Jarkko Niittylahti (2001), “using Calibration in
RSSI_Based Location Tracking System”, Proceedings of the 5th
World Multiconference on Circuits,
Systems, Communications and computers.
[6]. Aaron Ault,Edward Coyle and Xuan Zhong, (2005), “ K-nearest-Neighbor Analysis of Received Signal
Strength Distance Estimation across Environments”, Proceedings of the First Workshop on Wireless
Network Measurements.
[7]. Patwari, N., Hero III, A.O., Perkins, M., Correal, N.S., and O’Dea, R.J., (2003) “Relative location
estimation in wireless sensor networks”, IEEE Trans. Signal Processing, Pp 2137–2148.
[8]. Joaquim A.R. Azevedo, Filipe Edgar Santos, (2007), “Signal Propagation Measurements with Wireless
sensor Nodes.
[9]. Taewoo Kwoo, Emre Ertin, Anish Arora (2011), “Transporting Protocols Across Different
Environments”, Technical Report, OSU-CISRC-9/08-TR47.
A Modelof Real-Time Outdoor Wireless Monitoring
www.ijerd.com 94 | Page
[10]. Shah R.C. et.al (2004), “Joint Optimization of a Protocol Stack for Sensor Networks”, MILCOM 2004
IEEE Military Communications Conference.
[11]. Wan Norsyafizan W. Muhamad et.al (2010), “Evaluation of Stable Cluster Head Election (SCHE)
Routing protocol for Wireless Sensor Networks”, Proceedings of the international MultiConference of
Engineers and Computer Scientists, Hong Kong, vol II.
[12]. Poornachandra Bharat U. et. al, (2012), “Design of RSSI Threshold based Routing Protocol for Static
Wireless Sensor Networks, M.Tech stage II report, Indian Institute of Technology, Bombay.
[13]. Sivagami A. et. al (2010), Energy and Link Quality Based Routing for Data Gathering Tree in Wireless
Sensor Networks under TinyOS-2.X”, International Journal of Wireless and Mobile Networks
(IJWMN), vol. 2, No. 2.
[14]. Chipcon (2005), “CC2420 low power radio transceiver datasheet”, http://www.chipcon.com.
[15]. Tang, L., Wang, K.C., Huang, Y. and Gu, F., (2007), “Channel characterisation and link quality
assessment of IEEE 802.15.4-complaint radio for factory environments” IEEE Trans. Industrial
Informatics, vol. 3, no. 2, Pp. 99-100.

Mais conteúdo relacionado

Mais procurados

Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNIJTET Journal
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKScsandit
 
Node localization
Node localizationNode localization
Node localizationad-hocnet
 
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANAnalysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANijtsrd
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksChuka Okoye
 
Energy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkEnergy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkIJARIIE JOURNAL
 
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...IJERA Editor
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Compression of data collected in big scale wireless sensor networks
Compression of data collected in big scale wireless sensor networksCompression of data collected in big scale wireless sensor networks
Compression of data collected in big scale wireless sensor networkseSAT Journals
 
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGS
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGSDETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGS
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGScsandit
 
Internet of Things: Energy Efficient Public Sensing
Internet of Things: Energy Efficient Public SensingInternet of Things: Energy Efficient Public Sensing
Internet of Things: Energy Efficient Public SensingRashed Miraj
 
Performance evaluation of adaptive receivers for uwb
Performance evaluation of adaptive receivers for uwbPerformance evaluation of adaptive receivers for uwb
Performance evaluation of adaptive receivers for uwbeSAT Publishing House
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...IDES Editor
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksambitlick
 

Mais procurados (18)

Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSN
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
 
Node localization
Node localizationNode localization
Node localization
 
10.1.1.118.4231
10.1.1.118.423110.1.1.118.4231
10.1.1.118.4231
 
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANAnalysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 
Energy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor NetworkEnergy Efficient Target Coverage in wireless Sensor Network
Energy Efficient Target Coverage in wireless Sensor Network
 
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Q04606103106
Q04606103106Q04606103106
Q04606103106
 
Max_Poster_FINAL
Max_Poster_FINALMax_Poster_FINAL
Max_Poster_FINAL
 
Compression of data collected in big scale wireless sensor networks
Compression of data collected in big scale wireless sensor networksCompression of data collected in big scale wireless sensor networks
Compression of data collected in big scale wireless sensor networks
 
D05122235
D05122235D05122235
D05122235
 
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGS
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGSDETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGS
DETECTION OF POWER-LINES IN COMPLEX NATURAL SURROUNDINGS
 
Internet of Things: Energy Efficient Public Sensing
Internet of Things: Energy Efficient Public SensingInternet of Things: Energy Efficient Public Sensing
Internet of Things: Energy Efficient Public Sensing
 
Performance evaluation of adaptive receivers for uwb
Performance evaluation of adaptive receivers for uwbPerformance evaluation of adaptive receivers for uwb
Performance evaluation of adaptive receivers for uwb
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
A self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networksA self localization scheme for mobile wireless sensor networks
A self localization scheme for mobile wireless sensor networks
 

Destaque

Виктор Барановский "10 лет тому вперед"
Виктор Барановский "10 лет тому вперед" Виктор Барановский "10 лет тому вперед"
Виктор Барановский "10 лет тому вперед" Logist.FM
 
COMPARATIVE STUDY ON VEHICLE DETECTION TECHNIQUES IN AERIAL SURVEILLANCE
COMPARATIVE STUDY ON VEHICLE DETECTION TECHNIQUES IN AERIAL SURVEILLANCECOMPARATIVE STUDY ON VEHICLE DETECTION TECHNIQUES IN AERIAL SURVEILLANCE
COMPARATIVE STUDY ON VEHICLE DETECTION TECHNIQUES IN AERIAL SURVEILLANCEIJCI JOURNAL
 
Андрей Корнийчук "Не ждите милости от природы"
Андрей Корнийчук "Не ждите милости от природы"Андрей Корнийчук "Не ждите милости от природы"
Андрей Корнийчук "Не ждите милости от природы"Logist.FM
 
Rader_Nathan - CAIP Letter of Recommendation
Rader_Nathan - CAIP Letter of RecommendationRader_Nathan - CAIP Letter of Recommendation
Rader_Nathan - CAIP Letter of RecommendationNathan Rader
 
Daniel 7
Daniel 7Daniel 7
Daniel 7donna14
 
Programa CAMBRIDGE VIRTUAL – Módulo III- FONÉTICA - Encuesta de Satisfacción ...
Programa CAMBRIDGE VIRTUAL – Módulo III- FONÉTICA - Encuesta de Satisfacción ...Programa CAMBRIDGE VIRTUAL – Módulo III- FONÉTICA - Encuesta de Satisfacción ...
Programa CAMBRIDGE VIRTUAL – Módulo III- FONÉTICA - Encuesta de Satisfacción ...maritegambino
 
Daily mcx newsletter 17 sep 2013
Daily mcx newsletter 17 sep 2013Daily mcx newsletter 17 sep 2013
Daily mcx newsletter 17 sep 2013Richa Sharma
 
Certificate of Attendance - Biologics
Certificate of Attendance - BiologicsCertificate of Attendance - Biologics
Certificate of Attendance - BiologicsDawid Walas
 
Александр Соколенко, Сергей Зверяка "Логистика по ТОС"
Александр Соколенко, Сергей Зверяка "Логистика по ТОС"Александр Соколенко, Сергей Зверяка "Логистика по ТОС"
Александр Соколенко, Сергей Зверяка "Логистика по ТОС"Logist.FM
 

Destaque (11)

Виктор Барановский "10 лет тому вперед"
Виктор Барановский "10 лет тому вперед" Виктор Барановский "10 лет тому вперед"
Виктор Барановский "10 лет тому вперед"
 
COMPARATIVE STUDY ON VEHICLE DETECTION TECHNIQUES IN AERIAL SURVEILLANCE
COMPARATIVE STUDY ON VEHICLE DETECTION TECHNIQUES IN AERIAL SURVEILLANCECOMPARATIVE STUDY ON VEHICLE DETECTION TECHNIQUES IN AERIAL SURVEILLANCE
COMPARATIVE STUDY ON VEHICLE DETECTION TECHNIQUES IN AERIAL SURVEILLANCE
 
Андрей Корнийчук "Не ждите милости от природы"
Андрей Корнийчук "Не ждите милости от природы"Андрей Корнийчук "Не ждите милости от природы"
Андрей Корнийчук "Не ждите милости от природы"
 
Rader_Nathan - CAIP Letter of Recommendation
Rader_Nathan - CAIP Letter of RecommendationRader_Nathan - CAIP Letter of Recommendation
Rader_Nathan - CAIP Letter of Recommendation
 
Daniel 7
Daniel 7Daniel 7
Daniel 7
 
Elit 22 class 6
Elit 22 class 6Elit 22 class 6
Elit 22 class 6
 
Programa CAMBRIDGE VIRTUAL – Módulo III- FONÉTICA - Encuesta de Satisfacción ...
Programa CAMBRIDGE VIRTUAL – Módulo III- FONÉTICA - Encuesta de Satisfacción ...Programa CAMBRIDGE VIRTUAL – Módulo III- FONÉTICA - Encuesta de Satisfacción ...
Programa CAMBRIDGE VIRTUAL – Módulo III- FONÉTICA - Encuesta de Satisfacción ...
 
Gelincikler
GelinciklerGelincikler
Gelincikler
 
Daily mcx newsletter 17 sep 2013
Daily mcx newsletter 17 sep 2013Daily mcx newsletter 17 sep 2013
Daily mcx newsletter 17 sep 2013
 
Certificate of Attendance - Biologics
Certificate of Attendance - BiologicsCertificate of Attendance - Biologics
Certificate of Attendance - Biologics
 
Александр Соколенко, Сергей Зверяка "Логистика по ТОС"
Александр Соколенко, Сергей Зверяка "Логистика по ТОС"Александр Соколенко, Сергей Зверяка "Логистика по ТОС"
Александр Соколенко, Сергей Зверяка "Логистика по ТОС"
 

Semelhante a International Journal of Engineering Research and Development (IJERD)

Accurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueAccurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueIJECEIAES
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
 
Indoor localization in sensor network with
Indoor localization in sensor network withIndoor localization in sensor network with
Indoor localization in sensor network witheSAT Publishing House
 
Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor Network
Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor NetworkAdaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor Network
Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor NetworkIJCNCJournal
 
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
On the analysis of received signal strength indicator from ESP8266
On the analysis of received signal strength indicator from ESP8266On the analysis of received signal strength indicator from ESP8266
On the analysis of received signal strength indicator from ESP8266journalBEEI
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...ijcseit
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ijcseit
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKijceronline
 

Semelhante a International Journal of Engineering Research and Development (IJERD) (20)

Accurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point techniqueAccurate indoor positioning system based on modify nearest point technique
Accurate indoor positioning system based on modify nearest point technique
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
 
F017544247
F017544247F017544247
F017544247
 
Indoor localization in sensor network with
Indoor localization in sensor network withIndoor localization in sensor network with
Indoor localization in sensor network with
 
Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor Network
Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor NetworkAdaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor Network
Adaptive Sensor Sensing Range to Maximise Lifetime of Wireless Sensor Network
 
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
On the analysis of received signal strength indicator from ESP8266
On the analysis of received signal strength indicator from ESP8266On the analysis of received signal strength indicator from ESP8266
On the analysis of received signal strength indicator from ESP8266
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 

Mais de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mais de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 8, Issue 7 (September 2013), PP. 89-94 www.ijerd.com 89 | Page A Modelof Real-Time Outdoor Wireless Monitoring Dr Ezechukwu O A Department of Electrical Engineering, Nnamdi Azikiwe University Awka. Abstract:- This paper presents development of Received Signal Strength Indicator (RSSI) model of an outdoor environment using TelosB sensor nodes. Extensive real-time measurement of the RSSI was done at the library field of Nnamdi Azikiwe University, Awka for several months. The average of the measurement was taken and used for the development of the RSSI model. Least Mean Square Error (LMSE) method of linear regression analysis was used to develop the model. The developed model was tested and the goodness of fit (R2 ) of the model was determined to be 0.83. This confirmed that the model can be used to determine the RSSI at any given distance of an environment with similar radio characteristics. Keywords:- RSSI, WSN, TelosB, Sensor nodes. I. INTRODUCTION Since the start of the third Millennium, wireless sensor networks (WSNs) generated an increasing interest from industrial and research perspectives [1, 2]. A WSN can be generally described as a network of nodes that cooperatively sense and may control the environment enabling interaction between persons or computers and the surrounding environment [3]. A large number of such sensors can be deployed in an area to achieve an overall sensing objective. In addition to sensing and collecting data, these sensors are also equipped with processing capabilities to deduce how to route the data packets through the neighbours to an Internet- connected base station or sink. The wireless sensor nodes are usually battery powered or have energy harvesting units built in them to prolong their lifetime. The sensing circuitry measures ambient condition related to the environment surrounding the sensor and transforms these into an electric signal. Processing such a signal reveals some properties about objects located and/or events happening in the vicinity of the sensor. The sensor sends the collected data through a radio transceiver to the sink either directly or through a gateway. The decrease in the size and cost of these sensors, resulting from technological advances, has fuelled interests in the possible use of large set of disposable unattended sensors. Such interests have motivated intensive research in the past few years addressing the potential of collaboration among sensors in data gathering and processing and the coordination and management of the sensing activity and data flow to the sink. A natural architecture for such collaborative distributed sensors is a network with wireless links that can be formed among the sensors in an ad hoc manner. The TelosB sensor node by crossbow is an IEEE 802.15.4/ Zigbee compliant node. The nodes are composed of four main units namely; the Chipcon CC2420 transceiver, the MSP430 microcontroller, the power section which consists of two AA (3V) batteries and the sensor section which consists of temperature (-40-123.8o c), humidity (0-100%RH), visible light (320nm-730nm) sensors and slot for any two sensors of ones choice. The chipcon CC2420 transceiver operates at 2.4-2.4835GHz, has 250kbps data rates, RF power of -24 to 0dBm, receive sensitivity of -90 to -94dBm. The MSP430 microcontroller has 16kbytes EEPROM, 48kbytes program flash memory, 12 bit ADC, 12 bit DAC and 10kbytes Ram. The TelosB sensor node has USB slot with which it is connected to computer/laptop for programming. It uses tinyOS operating system and runs only on window XP with cygwin. TinyOS 2.x has Java 1.5, cross compilers for MSP430 Platforms and TinyOS/NesC related tools. The codes written were compiled and loaded into the node via USB. In this paper, the RSSI model of an outdoor environment is developed based on extensive empirical study in an open field. II. RSSI MODEL Received Signal Strength Indicator (RSSI) measures the strength of the radio signal received. The characteristics of RSSI, shows that the received signal strength will decrease with increased distance as shown by equation 1, [4]   )1(log10 AdnRSSI  Where n is the path loss exponent, d is distance from sender to receiver, A is received signal strength at a reference distance. In embedded devices like wireless sensor nodes, the received signal strength is converted to a received signal strength indicator (RSSI) which is defined as a ratio of the received power to the reference power (Pref). Typically, the reference power represents an absolute value of Pref = ImW. An increasing received power results in a rising RSSI.
  • 2. A Modelof Real-Time Outdoor Wireless Monitoring www.ijerd.com 90 | Page   )2()(log10 dBmRSSI P P RSSI ref r  The specific point in a system where position estimates are calculated is an important design parameter. For environmental changes the log model also will change. So using a scaling factor for adjusting the log model with the measured data, the basic RSSI log model equation changes to )3(])1(log10[ 10 AsdnRSSI  where s = scaling factor. )4( )1(log10 10    sd ARSSI n )5(10 1][ 10 s n ARSSI d    RSSI model is very important because RSSI measurements are applied in many areas such as estimation of the position of targets in an observation area, determination of Link Quality of a testbed environment, development of routing algorithms, characterization of environments and determination of the energy spent by the sensor nodes in communicating to each other. The authors in [5] described an enhancement method for location estimation based on RSSI-values and extended Kalman filter, using per-calibration measurements. However they support their system with a standard wireless local area network over the 2.4GHz frequency band. The authors in [6] also described localization in a WSN using RSSI as the underlying model. However, their major focus has to quantify distance estimation errors across multiple environments. In [7], the authors derived the Cramer-Rao Bound (CRB) for location estimation using RSS and Time Of Arrival (TOA) relative localization techniques. Their testbed developed at Motorola Labs consisted of 12 prototype peer-to-peer wireless sensor devices with RSS measurement capabilities. They concluded that despite the reputation of RSS as a coarse localization model, it can nevertheless achieve an accuracy of about 1m RMS in a real testbed environment. The authors in [8,9] discussed the characterization of an environment using RSSI in WSNs. The energy model of WSNs in terms of the distance and pathloss exponent was described by authors in [10,11]. In [12,13], the authors showed how RSSI can be used in developing routing protocols in WSNs. This paper presents the development of RSSI model using Least Mean Square Error (LMSE) method of linear regression analysis. III. RESEARCH METHODOLOGY In this work extensive real-time experiments were conducted to determine the practical distance range of Wireless Sensor Nodes in an outdoor environment. The aim of this work is to predict the RSSI value at a given distance in an environment with similar radio characteristics as the one used in the work. The development kit used is Crossbow TelosB sensor node from Texas Instrument which have Chipcon CC2420 transceiver- an IEEE 802.15.4 radio with a built in 2.4 GHz antenna as the communication unit. The transceiver has built-in RSSI providing a digital value that can be read from the 8 bit, signed 2’s complement RSSI.RSSI_VAL register. The RSSI value is always averaged over 8 symbol periods (128µs), in accordance with [14]. The RSSI_VALID status bit indicates when the RSSI value is valid, meaning that the receiver has been enabled for at least 8 symbol periods. The experimental setup consist of four Crossbow TelosB sensor nodes programmed with NesC programming language is shown in figure1. Fig. 1 shows pictorial representation of the experimental tesebed.
  • 3. A Modelof Real-Time Outdoor Wireless Monitoring www.ijerd.com 91 | Page Programs written in NesC were used to convert the readings from the sensor nodes direct to actual values. The program for the collection of data and graphical user interface display of the sensor node was written in Java language. The program displays the data received and also shows graphical relationship of the sensor node for voltage, temperature, light intensity, humidity. The graphical display has options for save data, clear data, start monitoring and stop monitoring as shown in figure 2. Fig 2: Run SensorRouterApp screen The nodes are programmed to send data every 5 seconds. The data collected over a long period of time was averaged and used for analysis. One of the sensor nodes was attached to the laptop through a USB cable and was used as the sink. The remaining three sensor nodes were placed at 00 , 900 , 1800 from the sink at the same distances while taking the measurements. The measurements were taken from 5m to 60m distance at the interval of 5m. At each distance readings were taken for 2 minutes giving a total of about 20 readings for every distance. The mean of the RSSI value obtained at a given distance was calculated and variance and the standard error of the mean were determined. In the experiment, the RSSI value is an average of the received signal strength at the packets arrival time. RSSI is the estimate of the signal power and is calculated over 8 symbol periods and stored in the RSSI_VAL register. Chipcon [15] specifies the following formula to compute the received signal power (P) in dBm. )6(__ OFFSETRSSIVALRSSIP  where RSSI – OFFSET is about – 45. Tables 1 shows the mean RSSI values of the nodes from measurement testbeds (outdoor environment). Table 1 RSSI values against distance of the testbed Distance (m) RSSI (dBm) for node ID 301 RSSI (dBm) for node ID 302 RSSI (dBm) for node ID 303 Ave. RSSI (dBm) of the 3 nodes 1 -40.7 -46 -44.8 -43.83 5 -61.4 -64.1 -62.3 -62.60 10 -68.1 -69.6 -65.8 -67.83 15 -82.4 -75.9 -74.7 -77.67 20 -80.3 -77.7 -81.9 -79.97 25 -77.6 -88.5 -81.3 -82.47 30 -81.5 -88.5 -89.5 -86.50 35 -88.7 -89.2 -84.7 -87.53 40 -75.8 -88.2 -86.3 -83.40 45 -82.3 -91.8 -85.5 -86.53 50 -84.7 -91.8 -92.2 -89.57
  • 4. A Modelof Real-Time Outdoor Wireless Monitoring www.ijerd.com 92 | Page 55 -78.8 -88.8 -89.3 -85.63 60 -92.2 -92.43 -92.3 -92.3 IV. RESULT ANALYSIS From the data obtained graphs were plotted to show the relationship between RSSI and distance of the measurements. A bar chart showing the mean values of the RSSI of the three sensor nodes and their average at various distances of the measurement were drawn. Also, the average value of the RSSI of the three sensor nodes and their average was plotted against distance in matlab. Least Mean Square Error method of Linear Regression Analysis was used to develop a model of the testbed environment. Fig 3: Bar chart showing the mean RSSI of the three sensor nodes and their average Figure 4: Plot of RSSI of the three nodes and their average against distance A model equation of RSSI of the testbed environment was developed by finding the least mean square error line of the measured points. The plot is shown in Figure 5.
  • 5. A Modelof Real-Time Outdoor Wireless Monitoring www.ijerd.com 93 | Page Figure 5: Plot of the developed model of the RSSI of the testbed environment The RSSI developed model of the testbed environment follows the trend given by equation 7. )7(61*58.0  dRSSI Where d is the distance. The goodness of fit (R2 ) of the RSSI model developed for the testbed environment was tested and found to be 0.83. V. CONCLUSION From the graphs, it was observed that RSSI decreases as the distance increases, although, there are some exceptions which may be due to line of sight measurements or multipath effects. The RSSI at any known distances can be calculated using the developed model of equation 7 for the outdoor environment. The goodness of fit (R2 ) of the developed RSSI model was 0.83 which shows that the model can generally be applied in RSSI determination of an environment with similar radio characteristics. Therefore, the RSSI at any known distance can be calculated using the developed model of equation 7 for the outdoor testbed. REFERENCES [1]. Akyildiz, I., Su, W., Sankarasubramaniam, Y. and Cayirci, E., (2002), “A survey on sensor networks”. IEEE Communication Mag., Vol. 40, 102–114. [2]. Rajaravivarma, V.; Yang, Y.; Yang, T. (2003), “An Overview of Wireless Sensor Network and Applications”, Proceedings of 35th South Eastern Symposium on System Theory, Morgantown, WV, USA, Pp. 432–436. [3]. Verdone, R.; Dardari, D.; Mazzini, G.; Conti, A., (2008), “Wireless Sensor and Actuator Networks”, Elsevier: London, UK , Pp 206-211. [4]. IEEE 802.15.4 Standard. Part 15.4, (2006), “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)”; IEEE: Piscataway, NJ, USA. [5]. Marko Helen, Juha Latvala, Hannu Ikonen and Jarkko Niittylahti (2001), “using Calibration in RSSI_Based Location Tracking System”, Proceedings of the 5th World Multiconference on Circuits, Systems, Communications and computers. [6]. Aaron Ault,Edward Coyle and Xuan Zhong, (2005), “ K-nearest-Neighbor Analysis of Received Signal Strength Distance Estimation across Environments”, Proceedings of the First Workshop on Wireless Network Measurements. [7]. Patwari, N., Hero III, A.O., Perkins, M., Correal, N.S., and O’Dea, R.J., (2003) “Relative location estimation in wireless sensor networks”, IEEE Trans. Signal Processing, Pp 2137–2148. [8]. Joaquim A.R. Azevedo, Filipe Edgar Santos, (2007), “Signal Propagation Measurements with Wireless sensor Nodes. [9]. Taewoo Kwoo, Emre Ertin, Anish Arora (2011), “Transporting Protocols Across Different Environments”, Technical Report, OSU-CISRC-9/08-TR47.
  • 6. A Modelof Real-Time Outdoor Wireless Monitoring www.ijerd.com 94 | Page [10]. Shah R.C. et.al (2004), “Joint Optimization of a Protocol Stack for Sensor Networks”, MILCOM 2004 IEEE Military Communications Conference. [11]. Wan Norsyafizan W. Muhamad et.al (2010), “Evaluation of Stable Cluster Head Election (SCHE) Routing protocol for Wireless Sensor Networks”, Proceedings of the international MultiConference of Engineers and Computer Scientists, Hong Kong, vol II. [12]. Poornachandra Bharat U. et. al, (2012), “Design of RSSI Threshold based Routing Protocol for Static Wireless Sensor Networks, M.Tech stage II report, Indian Institute of Technology, Bombay. [13]. Sivagami A. et. al (2010), Energy and Link Quality Based Routing for Data Gathering Tree in Wireless Sensor Networks under TinyOS-2.X”, International Journal of Wireless and Mobile Networks (IJWMN), vol. 2, No. 2. [14]. Chipcon (2005), “CC2420 low power radio transceiver datasheet”, http://www.chipcon.com. [15]. Tang, L., Wang, K.C., Huang, Y. and Gu, F., (2007), “Channel characterisation and link quality assessment of IEEE 802.15.4-complaint radio for factory environments” IEEE Trans. Industrial Informatics, vol. 3, no. 2, Pp. 99-100.