1. Trang chủ
  2. » Luận Văn - Báo Cáo

Nghiên cứu các giải pháp sử dụng năng lượng hiệu quả trong mạng cảm biến không dây

85 0 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Nghiên Cứu Các Giải Pháp Sử Dụng Năng Lượng Hiệu Quá Trong Mạng Cảm Biến Không Dây
Tác giả PGS.TS. Nguyễn Tuấn Minh, Trần Anh Thắng, Lê Thị Huyền Trang, Trần Quốc Sơn, Nguyễn Thị Tuyết Hoa, Đặng Thị Ngọc Ánh, Bạch Văn Nam, Nguyễn Minh Đức, Đỗ Trung Hải, Định Văn Nghiệp, Nguyễn Tiến Duy
Người hướng dẫn PGS.TS. Vũ Ngọc Phi
Trường học Đại học Thái Nguyên
Chuyên ngành Kỹ thuật điện tử
Thể loại Thesis
Năm xuất bản 2021
Thành phố Thái Nguyên
Định dạng
Số trang 85
Dung lượng 25,08 MB

Nội dung

Approach, research methods ...cscscssecssereerreeesssesessessseessseeneseeereenerernerscess 12 Mobile Robots Support Collecting Data in Wireless Sensor Networks.... | 30 | WPANS Wireless

Trang 1

ĐẠI HỌC THÁI NGUYÊN TRƯỜNG ĐẠI HỌC KỸ THUẬT CÔNG NGHIỆP

BAO CAO TONG KET

pk TAI KHOA HOC VA CONG NGHỆ CAP TRUONG

NGHIÊN CỨU CÁC GIẢI PHÁP SỬ DỤNG NĂNG LƯỢNG HIỆU QUÁ TRONG

MANG CAM BIEN KHONG DAY

Trang 2

ĐẠI HỌC THÁI NGUYÊN

TRƯỜNG ĐẠI HỌC KỸ THUẬT CÔNG NGHIỆP

BAO CAO TONG KET

DE TAI KHOA HOC VA CONG NGHE CAP TRUONG

-skeleemeis

NGHIÊN CỨU CÁC GIẢI PHÁP SỬ DỤNG NĂNG LƯỢNG HIỆU QUA TRONG

MANG CAM BIEN KHONG DAY

Mã số: T2020-B30_

Trang 3

Danh sách những thành viên tham gia nghiên cứu đề tài

1 3 Tran Qué Son Bộ môn Kỹ thuật Điện giảng dạy bằng

TA - Khoa Quốc tê -

4 Nguyễn Thị Tuyết Hoa Bộ môn Kỹ thuật Điện tử - Khoa Điện

Ngô Minh Đức Bộ môn Tự động hóa - Khoa Điện

Đễ Trung Hải Bộ môn Tự động hóa - Khoa Điện

Định Văn Nghiệp Bộ môn Tự động hóa - Khoa Điện

10 Nguyễn Tiến Duy Bộ môn Tin học công nghiệp - Khoa

Trang 4

1, LieTatufe рVIW cco i06 6x k64114046413803839525185516844595844838346655058613 36442140 10

‘ 2 The necessary of the SUbjeCt cccececseceeeeneneneteteterseeteesesesssesssesereneseresesereees 10

k 4 Object and Scope ofresearch .-.-ceceenehhhhhrrrrrrrrrirrdire 11

5 Approach, research methods .cscscssecssereerreeesssesessessseessseeneseeereenerernerscess 12

Mobile Robots Support Collecting Data in Wireless Sensor Networks 34

3.2 Wireless sensor network with Mobile robots (MRs) ccssceeeeeetereneneeeens 36 3.3 Overview of data collection in WSN with MEs or MRs assisted 42 Chapter 4: Unmmaned Aerial Vehicle Support Collecting Data in WSNs (UAWSNS) nssescssssssssccosserscscsensnscnessscscosenescssassesosssasonsssessenenenenens

4.1 Introduction to Unmanned Aerial Vechicles Networks

4.3 Protocol Operation-Based Routing -cc chen 60

Trang 5

Chapter 5: Cooperative Tracking Framework for Multiple Unmanned Aerial Vehicles (UA V§) co s21 9099 0 1 0 010000000001381400000890698 64

Salis Introduction escsseseveveuxecsrereequeese cosas oir e ts contest ce aoa en teraeon rover E815 158 563:a srss3 64

5 2) literature REV iGW sccccrge erect Meet atte ect canbe nen ronne sree egtene Teaees Soke 65

5.4 Conclusions and Future Developimenifs - ¿-¿: tt scs+essteeteteieieree 74

Chapter 6: Blockchain Technology in Wireless Network: Benefits and

———————6.4-ConclusiofS= -=-

Trang 6

List of Tables, Figures (Danh mục bảng biểu và hình vẽ)

Figure 3.1, Architecture ofa WSN-ME with relocatable nodes Sf Figure 3.2 Architectures of WSN-MEs with MDCs: (a) mobile sinks and (b) EñöBI1Ì€:É€lãV S840 na S01 HbfnnbistedfitlSsdfi 10100980 0861001áyaea

Figure 3.3 Architecture of a WSN-ME with mobile peers

———————— Figure4.5 Multi-tier UAWSN network Tưng bon Si

Figure 4.6 Particle swarm optimization (PSO)-based shortest-path selection 61 Figure 4.7 General architecture of a UAWSN system cccccccsssseseesseereeeseeeseeees 62 Figure.5 1 Ene system architecture, «ss crseenasareenvertanrcinnecesmn oevereveieevsevesss 66 Figure 5.2, Graph representattOny ssresecccosseccstaesiesttersctassasacrseaterancasserecaeneesseenenenen 7 Figure 5.3 Ten UAVs with different predicted values reach a consensus 71 ElðfifE 2.4 TTOCKIHDTd SLAHG EHĐGL7 ri iccnnnniiiiini in iao aninoiooinioaniing T2 Figure 5.5 Gathering at the taFB€( St t v21 2 1 113 101 111111181111111 11 te, 72 Figure 5.6 Snapshots of initial positions of UAVs (a), avoiding obstacles and while moving to targets (b,c) and tracking the moving target (d,e) 73 Figure 6.1 WSN network types, data flow in WSN, data flow in WSN with Blockchaii technology ssiscuusommrnsrestenes cence 77

Table 6.I Table 6.1 COMPARISION BETWEEN TYPES OF W§N: cccccc, 78

Trang 7

List of Abbreviations (Danh muc cac chữ viết tắt)

STT Abbreviations

1 Al Artificial Intelligence

3 CELVNET Cellular Vehicular Networks

4 CH Cluster Head

q 7 |DSRC Dedicated Short-Range Communication

i 8 |DTNS | Delay-Tolerant Networks

9 | FL Federated Learning

— 11 |MAC —— |Medium Access Control ——

12 | MANETS Mobile Ad Hoc Networks

13 | MBDC Multimedia Big Data Collection

14 | MDCS Mobile Data Collectors

21 | UAIOT Uav-Aided Iot

22 | UAVS Unmanned Aerial Vehicle

23 | UAWSNS UAV-Aided Wireless Sensor Networks

24 |1V2I Vehicle-To-Infrastructure 25_ | V2P Vehicle-To-Pedestrian Links

26 | V2V Vehicle-To- Vehicle Links

| 27 |V2X Vehicle-To-Everything

| 28} VLC Visible Light Communication

| 29 | WLANS Wireless Local Area Networks

| 30 | WPANS Wireless Personal Area Networks

31 | WSN-MES Wireless Sensor Networks With Mobile Elements

32 | WSNS Wireless Sensor Networks

Trang 8

TRƯỜNG ĐẠI HỌC

THONG TIN KET QUA NGHIÊN CỨU

1 Thong tin chung:

- Tên để tài: Nghiên cứu các giải pháp sử dụng năng lượng hiệu quả trong

mạng cảm biến không dây

- Mã số: T2020-B30

- Chủ nhiệm dé tài: PGS.TS Nguyễn Tuần Minh

- Cơ quan chủ trì: Trường ĐH Kỹ thuật Công nghiệp - ĐH Thái Nguyên

2 Mục tiêu:

Mục tiêu của để tài là hướng tới những giải pháp nâng cao hiệu quả sử dụng năng

eer cua mạng cảm biến không dây Các phương án tập trung vào phương pháp/thuật —

———— toán thu thập dữ liệu, các công nghệ truyền thông, quản lý hệ thống xử lý dữ liệu hiệu

quả, để tối ưu cho mạng cảm biến không dây

3 Kết quả nghiên cứu:

Nghiên cứu để xuất một số giải pháp sử dụng các hệ thống truyền thông không dây hỗ trợ và mang lại hiệu quả cho mạng cảm biến không dây

Giảm thiểu được dữ liệu truyền trong quá trình thu thập dữ liệu, dẫn tới tiết kiệm năng

lượng, băng thông trong quá trình truyền

6 Khả năng áp dụng và phương thức chuyển giao kết quả nghiên cứu:

Ngày 27 tháng 09 năm 2021

Cơ quan chủ trì Chủ nhiệm đề tài

KT HIỆU TRƯỞNG PHÓ HIỆU TRƯỞNG

Trang 9

INFORMATION ON RESEARCH RESULTS

1 General information:

Project title: Research on energy efficient solutions in wireless sensor networks

Code number: T2020-B30 Coordinator: Assoc Prof Dr Nguyen Tuan Minh Implementing institution: Thai Nguyen University of Technology

The study proposes a number of solutions using wireless communication systems to support

and bring efficiency to wireless sensor networks

Trang 10

PHẢN MỞ ĐẦU

1 TÔNG QUAN TÌNH HÌNH NGHIÊN CỨU THUỘC LINH VUC CUA DE

Mang cam biến không dây hiện nay đang được triển khai trong rất nhiều lĩnh vực, cả trong quân sự và dân sự và mang lại nhiều đóng góp đáng kể về mặt kinh tế, quốc phòng an nỉnh, Đặc điểm của mạng này là các thành phần nút

cảm biến luôn cần được cấp một mức độ năng lượng ôn định cho hoạt động lâu đài, duy trì được chất lượng phục vụ của mạng [1, 2]

te Ä "Hiện nay có rất nhiều các kết quả nghiên cứu nâng cao hiệu quả sử dụng năng

lượng cho mạng cảm biến không dây Các nhà nghiên cứu, các công ty trong các ngành công nghiệp, khoa học công nghệ liên tục tìm kiếm các giải pháp mới

Để đạt được hiệu quả hơn cho mạng cảm biến không dây trong việc sử dụng

| năng lượng, sẽ có nhiều bài toán tích hợp các công nghệ, chia sẻ sử dụng nguồn

tài nguyên từ việc liên kết các mạng với nhau thông qua internet, bài toán tối ưu,

bài toán mới, [Š]

2 TINH CAP THIET CUA DE TAI

Mạng cảm biến không dây (WSNs) nói chung, mạng cảm biến di dong (MSNs), mạng robot di động hiện đang là đối tượng nghiên cứu rất phổ biến trên thế giới

Những mạng trên có rất nhiều ứng dụng không chỉ trong dân dụng mà còn trong

quân sự [1, 2] Chức năng chính của những mạng trên là phát hiện, cảnh báo sự kiện, thu thập thông tin cảm biến, tạo ra những bản đồ cảm biến, phục cho nhiều

mục đích giám sát khác nhau

Sử dụng hiệu quả năng lượng luôn là vấn đề quan trọng được dé cập ở các mạng

trên [3, 4, 5] Các bộ cảm biến được thả xuống các nơi có điều kiện khắc nghiệt,

khó tiếp cận, không có điều kiện sạc lại pin Các phương thức truyền nhận dữ liệu, thuật toán di chuyển phải được sử dụng hiệu quả

10

Trang 11

5 CÁCH TIẾP CẬN, PHƯƠNG PHÁP NGHIÊN CỨU

5.1 Cách tiếp cận

- Từ những nghiên cứu tổng quát, chỉ tiết về các phương pháp, kỹ thuật, công nghệ điều khiển và truyền thông cho mạng robot đã được công bố,

để tài sẽ tiếp cận được các công nghệ, các giải pháp nền tảng và nâng cao

Từ đó đề tài sẽ triển khai các thuật toán và các phương pháp mới nhằm đáp ứng được các yêu cầu đề ra

- Trên các cơ sở lý thuyết và thực tiễn, các thành viên của đề tài sẽ tiếp tục phát triển, có thể đề xuất các thuật toán, phương pháp điều khiển và

truyền thông mới

5.2 Phuong phap nghiên cứu

- Neghién ciru tat cả các nội dung cơ bản liên quan: những công trình đã

—————— công bố: được nghiên cứu, xem xét tính ổn: định, tính mới được ghinhận ——————

thành những nội dung liên quan, nền móng, để từ đó có thể xây dụng ý

tưởng mới, dự kiến có kết qua tốt hơn, mang lại nhiều ưu điểm hơn ở một góc độ nào đó trong nghiên cứu Cơ sở dữ liệu online có uy tín như:

IEEE, Elsevier, Springer,

- Xây dựng hướng nghiên cứu mới, thuật toán mới: khi những hướng nghiên cứu mới được hình thành, tác giả có thể phác thảo những thuật

toán mới mang tính khả dụng cao có thể áp dụng đề thay đổi, mang lại kết quả tốt hơn so với những kết quả đã có được ghi nhận tại các nguồn cơ sở

dữ liệu uy tín đã nêu

- _ Xây dựng công thúc toán: đây là bước phức tạp đòi hỏi một số lượng kiến

thức toán học cơ bản và nâng cao Công thức toán được xây dựng phải

đảm bảo tính chính xác của toán học, đồng thời cũng phải đảm bảo tích

logic để có thé dua vào chương trình máy tính chạy được

- Xây dựng chương trình mô phỏng: dựa trên các ý tưởng, từ thuật toán đến

phương trình toán học, mà các chương trình mô phỏng được xây dựng để

đáp ứng hai mục tiêu: (1) thu được kết quả đúng như thuật toán đã mô tả

(kết quả có thể tốt hơn hoặc kém hơn so với các kết quả đã công bổ); (ii)

so sách kết quả mô phỏng với kết quả thực hiện bởi các phương trình toán

12

Trang 12

- Dé xuất giải pháp, các thuật toán mới trong thu thập dữ liệu cảm biến, xử

lý tín hiệu, điều khiển, truyền thông, sử dụng năng lượng hiệu quả cho

mạng truyền thông không dây

- _ Tiến hành mô phỏng, chạy chương trình trên máy tính các nội dung theo

thuật toán mới

- Thu thập dữ liệu, so sánh kết quả, hiệu chỉnh chương trình, thuật toán và

kết luận về kết quả mới

-_ Viết các bài báo khoa học công bố trên các tạp chí quốc tế

} - Báo cáo các bài báo tiếng Anh tại hội thảo (seminar) của đơn vị

Tổng kết, đánh giá: viế ết báo cáo tóm tắt, báo cáo tổng kế,

14

Trang 13

|

|

1.1 Introduction

Recent advances in micro-electro-mechanical systems (MEMS) technology,

wireless communications, and digital electronics have enabled the development

of low-cost, low-power, multifunctional sensor nodes that are small in size and communicate untethered in short distances These tiny sensor nodes, which

= consist of sensing, data processing, and communicating components, leverage

the idea of sensor networks based on collaborative effort of a large number of -

sensors, which are deployed in the following two ways

Chapter 1:

Introduction to Wireless sensor networks (WSNs)

- Sensors can be positioned far from the actual phenomenon, i.e.,something =

| known by sense perception In this approach, large sensors that use some

, complex techniques to distinguish the targets from environmental noise

| - Several sensors that perform only sensing can be deployed The positions

of the sensors and communications topology are carefully engineered

Ì They transmit time series of the sensed phenomenon to the central nodes

where computations are performed and data are fused

A sensor network is composed of a large number of sensor nodes, which are densely deployed either inside the phenomenon or very close to it

The position of sensor nodes need not be engineered or pre-determined This

allows random deployment in inaccessible terrains or disaster relief operations

must—possess- self-organizing capabilities Another unique feature of sensor networks is the cooperative effort of sensor nodes Sensor nodes are fitted with

an on-board processor Instead of sending the raw data to the nodes responsible for the fusion, sensor nodes use their processing abilities to locally carry out

simple computations and transmit only the required and partially processed data

The above described features ensure a wide range of applications for sensor networks Some of the application areas are health, military, and security For

16

Trang 14

One of the most important constraints on sensor nodes is the low power

consumption requirement Sensor nodes carry limited, generally irreplaceable,

power sources Therefore, while traditional networks aim to achieve high quality

of service (QoS) provisions, sensor network protocols must focus primarily on

power conservation They must have inbuilt trade-off mechanisms that give the

end user the option of prolonging network lifetime at the cost of lower throughput or higher transmission delay

1.2 Sensor Network Applications

Sensor networks may consist of many different types of sensors such as seismic, low sampling rate magnetic, thermal, visual, infrared, acoustic and radar, which

* the presence or absence of certain kinds of objects,

¢ mechanical stress levels on attached objects, and

« the current characteristics such as speed, direction, and size of an object

Sensor nodes can be used for continuous sensing, event detection, event ID,

_Jocation-sensing, -and_local control of actuators The concept of micro-sensing

and wireless connection of these nodes promise many new application areas We

categorize the applications into military, environment, health, home and other commercial areas It is possible to expand this classification with more categories such as space exploration, chemical processing and disaster relief

1.2.1 Military applications Wireless sensor networks can be an integral part of military command, control, communications, computing, intelligence, surveillance, reconnaissance and

18

Trang 15

Nuclear, biological and chemical attack detection and reconnaissance: In

chemical and biological warfare, being close to ground zero is important for

timely and accurate detection of the agents Sensor networks deployed in the friendly region and used as a chemical or biological warning system can provide the friendly forces with critical reaction time, which drops casualties drastically

1.2.2 Environmental applications

Some environmental applications of sensor networks include tracking the

movements of birds, small animals, and insects; monitoring environmental

conditions that affect crops and livestock; irrigation; macroinstruments for large- scale Earth monitoring and planetary exploration; chemical/ biological

detection; precision agriculture; biological, Earth, and environmental monitoring

in marine, soil, and atmospheric contexts; forest fire detection; meteorological or

geophysical research; flood detection; bio-complexity mapping of the

environment; and pollution study

Forest fire detection: Since sensor nodes may be strategically, randomly, and densely deployed in a forest, sensor nodes can relay the exact origin of the fire

to the end users before the fire is spread uncontrollable Millions of sensor nodes

can be deployed and integrated using radio frequencies/ optical systems Also,

they may be equipped with effective power scavenging methods, such as solar cells, because the sensors may be left unattended for months and even years

The sensor nodes will collaborate with each other to perform distributed sensing and overcome obstacles, such as trees and rocks, that block wired sensors’ line

these advances, the sensor nodes also have the ability to connect with the Internet, which allows remote users to control, monitor and observe the

biocomplexity of the environment

Although satellite and airborne sensors are useful in observing large

biodiversity, e.g., spatial complexity of dominant plant species, they are not fine

20

Trang 16

Tracking and monitoring doctors and patients inside a hospital: Each patient has small and light weight sensor nodes attached to them Each sensor node has

its specific task For example, one sensor node may be detecting the heart rate while another is detecting the blood pressure Doctors may also carry a sensor node, which allows other doctors to locate them within the hospital

Drug administration in hospitals: 1f sensor nodes can be attached to

medications, the chance of getting and prescribing the wrong medication to patients can be minimized Because, patients will have sensor nodes that identify their allergies and required medications Computerized systems as described have shown that they can help minimize adverse drug events

1.2.4 Home applications = Home automation: As technology advances, smart sensor nodes and actuators

can be buried in appliances, such as vacuum cleaners, micro-wave ovens, refrigerators, and VCRs These sensor nodes inside the domestic devices can

interact with each other and with the external network via the Internet or

Satellite They allow end users to manage home devices locally and remotely more easily

Smart environment: The design of smart environment can have two different perspectives, i.e, human-centered and technology-centered For human-

centered, a smart environment has to adapt to the needs of the end users in terms

of input/ output capabilities For technology-centered, new hardware

technologies, networking solutions, and middleware services have to be developed A scenario of how sensor nodes can be used to create a smart environment is described in The sensor nodes can be embedded into furniture

and appliances, and they can communicate with each other and the room server

The room server can also communicate with other room servers tolearn-about——

the services they offered, e.g., printing, scanning, and faxing These room

servers and sensor nodes can be integrated with existing embedded devices to become self-organizing, selfregulated, and adaptive systems based on control

theory models Another example of smart environment is the ‘‘Residential Laboratory’? at Georgia Institute of Technology The computing and sensing in this environment has to be reliable, persistent, and transparent

1.2.5 Other commercial applications

22

Trang 17

number of items in the same category If the end users want to insert new inventories, all the users need to do is to attach the appropriate sensor nodes to the inventories The end users can track and locate where the inventories are at

all times

Vehicle tracking and detection: There are two approaches as described to track and detect the vehicle: first, the line of bearing of the vehicle is determined locally within the clusters and then it is forwarded to the base station, and

second, the raw data collected by the sensor nodes are forwarded to the base

station to determine the location of the vehicle

Trang 18

2.23 .Sensor Profocolfor Inƒformation via Negotiadtion (SPIN) — — ~

sleeping schedules and fault tolerance schemes that can prolong the network

lifetime

2.2.2 Flooding and Gossiping

Flooding and gossiping [40, 41] are two classical methods to relay data in WSNs In the flooding method, each sensor keeps sending broadcast messages

to its neighbors within a sensor transmission range until it receives data packets

or the maximum number of hops for the packet is reached On the other hand, gossiping is a slightly enhanced version of flooding where the receiving node sends the packet to a randomly selected neighbor This neighbor will pick another random neighbor to forward the data to, and so on

meta-data are exchanged among sensors via a data advertisement mechanism

Each sensor upon receiving new data, advertises it to its neighbors and interested neighbors Sensors which do not have data retrieve the data by

sending a request message

Sensor nodes negotiate with each other The negotiations ensure that nodes only transmit data when necessary and never waste energy on useless transmissions

SPIN’s meta-data negotiation solves the problems of flooding such as redundant

information passing, overlapping of sensing area and resource blindness

One of the advantages of SPIN is that topological changes are localized since

each node needs to know only its neighbors with single-hop communications

However, the data advertisement mechanism cannot guarantee delivery of data

For example, in considering the application of intrusion detection where data should be reported over periodic intervals, and assume that nodes interested in the data are located far away from the source node, etc such data would not be

delivered to the destination

26

Trang 19

as opposed to directed diffusion where data can be routed through multiple paths

at low rates

Rumor routing can only perform well when the number of events is small For a

large number of events, the cost for maintaining agents and event tables in each node becomes infeasible if there is not enough interest in these events from the

BS In addition, the overhead associated with rumor routing is controlled by

different parameters used in the algorithm such as time to live pertaining to

queries and agents

2.2.6 Minimum Cost Forwarding Algorithms (MCFA)

In this method [46], each sensor should know the least cost path estimated from

every sensor initiates its least cost to the BS to infinity Each sensor node, upon receiving the broadcast message originated at the BS, checks to see if the

estimate in the message plus the link on which it is received is less than the current estimate for updating In this case, the nodes far away from the BS get

more updates than the ones closer to the BS Once the cost field is established,

any sensor can deliver the data to the sink along the minimum cost path Each intermediate node forwards the message only if it finds itself on the optimal path

for this message based on the message’s cost states

2.2.7 Gradient-Based Routing (GBR)

In GBR [47, 48], each sensor calculates a parameter called the height of the

node, which is the minimum number of hops to reach the BS The difference

; between a sensor’s height and that of its neighbor is considered the gradient on

| that link A packet is forwarded on a link with the largest gradient GBR uses

auxiliary techniques such as data aggregation and traffic spreading in order to

= itself to the BS The BS broadcasts a message with the cost set to zero, while = -

uniformly divide the traffic over the network

In GBR, three different data dissemination techniques have been discussed

Stochastic scheme, where a sensor picks one gradient randomly when there is

more than one next hops that have the same gradient In energy-based scheme,

the sensor increases its height when its energy drops below a certain threshold

In the stream-based scheme, new streams are not routed through nodes that are

28

Trang 20

information from their neighbors within a look ahead of “ hops Once the query

is resolved completely, it is sent back through either the reverse or shortest path

to the BS Hence, ACQUIRE can deal with complex queries by allowing many

sensors to send responses

ACQUIRE selects the next node to forward a query that has two options, chooses randomly or selects based on maximum potential query satisfaction

2.2.10 Energy-Aware Routing

The goal of this method [52] is try to find the minimum energy path to optimize

: energy usage at a node to increase the network lifetime It maintains a set of

—— paths instead of maintaining or enforcing one optimal path at higher rates These

paths are maintained and chosen by means of a certain probability =ije — probability depends on how low the energy consumption is that each path can

achieve By having paths chosen at different times, the energy of any single path will not deplete quickly In addition, the energy is dissipated equally among all

sensors that balances the energy consumption in the network and prolonging the

network lifetime

2.2 Location-Based Routing

| There are many data collection methods for WSNs that require location

information for sensors to calculate the data transmission distances between two

| sensors or between sensors and the BS Based on that, the energy consumption

for data transmission can be estimated The local information of sensors can be used in routing in an energy-efficient manner For instance, the query can be

diffused only to a particular region that can reduce the number of transmissions

between sensors

2.2.1 MECN and SMECN

Minimum energy communication network [53] sets up and maintains a

minimum energy consumption for a WSN by utilizing low power GPS [54] The paper describes a distributed network protocol optimized for achieving the minimum energy for randomly deployed ad-hoc networks The network protocol

not only maintain a globally connected network in spite of possible module failure, but also defines the major power management strategy based on low-

30

Trang 21

GEAR [57] uses energy-aware and geographically informed neighbor selection heuristics to route a packet toward the destination region The key idea is to restrict the number of interest in directed diffusion by only considering a certain region rather than sending the interest to the whole network GEAR can

In GEAR, each sensor keeps an estimated cost and a learning cost of reaching

the destination through its neighbors The estimated cost is a combination of residual energy and distance to destination There are two phases: (1) Forwarding packets toward the target region: Upon receiving a packet, a node

checks its neighbors to see if there is one neighbor that is closer to the target

the next hop If they are all further than the node itself, one of the neighbors is picked to forward the packet based on the learning cost function (2)

Forwarding the packets within the region: If the packet has reached the region,

it can be diffused in that region by either recursive geographic forwarding or

restricted flooding

GEAR is compared to GPSR [58] in solving the problem of holes GEAR not

| only reduces energy consumption for the route setup but also outperforms GPSR

- conserve more energy than directed diffusion

in terms of packet delivery

2.2.4 MFR, DIR, and GEDIR

These protocols deal with basic distance, progress, and direction-based methods

| [59] The key ideas are forward and backward directions A source node or any

| intermediate node will select one of its neighbors according to a certain

criterion The routing methods that belong to this category are Most Forward within Radius (MFR), Geographic Distance Routing (GEDIR) including a

| method, and DIR (a compass routing method)

| GEDIR-is-a greedy algorithm that always moves the packet to the neighbor of

the current vertex whose distance to the destination is minimized The algorithm fails when the packet crosses the same edge twice in succession In most case, MER and greedy methods have the same path to the destination In DIR, the best neighbor has the closest direction toward the destination GEDIR and MFR are

32

Trang 22

Chapter 3:

Mobile Robots Support Collecting Data in Wireless Sensor Networks

3.1 Introduction

In recent years wireless sensor networks (WSNs) have become an

established technology for a large number of applications, ranging from

monitoring (e.g., pollution prevention, precision agriculture, structures and

buildings health), to event detection (e.g., intrusions, fire/flood emergencies) and target tracking (e.g., surveillance), WSNs usually consist of a large number of

~~~ sensor nodes, which are battery-powered tiny devices These devices perform ——-

assumed to be static, and mobility is not considered as an option More recently,

similarly to the research trends in mobile ad hoc networks (MANETs) and

delay-tolerant networks (DTNs), mobility has also been introduced to WSNs In

fact, mobility in WSNs is useful for several reasons, as discussed in the following

Connectivity: As nodes are mobile, a dense WSN architecture may be not

a requirement In fact, mobile elements can cope with isolated regions, so that the constraints on network connectivity can be relaxed, also in terms

of nodes (re)deployment Hence a sparse WSN architecture becomes a feasible option

- Cost: Since fewer nodes can be deployed, the network cost is reduced in a mobile WSN Although adding mobility features to the nodes might be

34

Trang 23

—— and the speed or sojourn time of mobile nodes have to be defined =

predicted with a certain accuracy, sensor nodes can be awake only when they expect the mobile element to be in their transmission range

- Reliable data transfer: As available contacts might be scarce and short, there is a need to maximize the number of messages correctly transferred

to the sink In addition, since nodes move during data transfer, message exchange must be mobility-aware

- Mobility control: When the motion of mobile elements can be controlled,

a policy for visiting nodes in the network has to be defined To this end,

in order to improve (maximize) the network performance

3.2 Wireless sensor network with mobile elements (ME) or Mobile robots

(MRs)

To better understand the specific features of wireless sensor networks with mobile elements (WSN-MEs), let us first introduce the reference network

architecture, which is detailed according to the role of the MEs The main

components of WSN-MEs are the following

- Regular sensor nodes (or just nodes, for short) are the sources of

information Such nodes perform sensing as their main task They may also forward or relay messages in the network, depending on the adopted

- Special support nodes perform a specific task, such as acting as

intermediate data collectors or mobile gateways They are not sources nor

36

Trang 24

3.2.1.1 Relocatable Nodes

These are mobile nodes which change their location to better characterize the sensing area, or to forward data from the source nodes to the sink In contrast with mobile data collectors (which are discussed in the next section), relocatable

nodes do not carry data as they move in the network In fact, they only change the topology of the network—which is assumed to be rather dense—for

connectivity or coverage purposes More specifically, after moving to the new

' location, they usually remain stationary and forward data along multihop paths

MEs (e.g., support nodes) are used

Although in theory ordinary nodes might be relocatable, in most cases special

A system with relocatable nodes targeted for topology management has been proposed to support WSNs In particular, special predefined, intelligent, lightweight topology management (PILOT) nodes are used to reestablish network connectivity for faulty links In detail, PILOT nodes move to regions

| where the connection between nodes is unstable or failing, and act as bridges

| As a consequence, they actively change the WSN topology in order to improve

| both communication reliability and energy efficiency Algorithms for placement

of relocatable nodes in the context of improving network connectivity have been investigated

Relocatable nodes can also be used to address the problem of sensing coverage In this case, the primary concern is not ensuring network connectivity,

but avoiding coverage holes—areas where the density of nodes is not adequate

to properly characterize a phenomenon or detect an event Approaches targeted

for sensing coverage can focus on sensor deployment, sensor relocation and dispatch, or both Relocatable nodes provide a mobility-assisted approach to WSNs, in the sense that MEs are not actively exploited for data collection

Therefore, in the following we will not discuss further solutions based on

38

Trang 25

architecture is depicted in Figure 4.2(b) MR-based data collection in WSNs has been proposed in the data-MULE system In detail, the data-MULE system consists of a three-tier architecture, where the middle tier is represented by relays, called mobile ubiquitous LAN extensions (MULEs)

Trang 26

Figure 3.3 Architecture of a WSN-ME with mobile peers

Mobile peers can also be used for opportunistic data collection in urban

sensing scenarios Sample applications include personal monitoring (¢.g.,

physical exercise tracking), civil defense (¢.g., hazards and hotspot reporting to police officers), and collaborative applications (e.g., information sharing for tourism purposes) In this context, sensors are not used mainly for monitoring the environment, but are rather exploited to characterize people in terms of both

interactions and context (or state) information An example is represented by

handheld mobiscopes where handhelds devices—such as cell phones or PDAs—

gather data from the surrounding environment and report them to servers, which

provide services to remote users Since most of the issues in the context of

WSN-MEs based on mobile peers are similar to classic DINs, we will not focus

on these topics

3.3 Overview of data collection in WSN with MEs or MRs assisted

In this section we will outline the different phases of the data collection

process and point out the main issues involved For convenience, without loss of

42

Trang 27

residual contact time, while minimizing the energy consumption ——————————]

exchange Finally, we indicate as routing the process of data forwarding toward

an ME, that is, the selection of the path or the sequence of pairwise message transmissions to the intended destination On the basis of the preceding _ discussion, three main phases associated with the data collection in WSN-MEs

emerge: discovery, data transfer, and routing to MEs Each phase has its own

issues and requirements which we briefly investigate in the following

- Discovery is the first step for collecting data in WSN-MEs, since the presence of the ME in the contact area is generally unknown at sensors

The goal of discovery protocols is to detect contacts as soon as they _

ene happen, and with a low energy expenditure In other words, discovery =

should try to maximize the number of detected contacts, and also the

- Data transfer immediately follows discovery The goal of data transfer protocols is to get the most out of the residual contact time, that is, to

maximize the throughput in terms of messages successfully transferred

per contact while minimizing the energy consumption

- Routing to MEs is actually possible only when the density of the network

is enough to allow (even partial) multihop routes This is true for dense WSN-MEs, where routing to ME is always possible Actually, this can

happen even with more sparse WSN-MEs, where nodes can organize as disconnected clusters In this case, routing is possible only when an ME is

in contact with at least one node in the cluster However, some nodes can

be elected as bridges and act as gateways between the cluster nodes and the ME In both cases, the goal of routing is to find the best multihop

paths in terms of both delivery ratio and low energy consumption toward

either the ME or a node

44

Trang 28

of one or more sensors to provide feedback to the commander [13], [17] If each

UAV contains a sensor, a system must be devised to assign the vehicles/sensors

to positions in space and in time, and to move efficiently within a predetermined

environment to ensure monitoring Monitoring is related to various problems

that have been studied in the past A particular case takes place when a group of mobile sensors can be used to cover an area This is the so-called coverage

problem [5]

In summary, the benefit of multi-UAV cooperation and control is twofold First,

multi-UAV cooperation significantly reduces the operating cost by transferring the operation mode from many-to-one (i.¢., many operators control one UAV) to

to some technical challenges of airborne optical devices using lasercom links

[12] Consequently, a fundamental but challenging problem to be addressed in multi-UAV cooperation and control is efficient networking of UAVs over the

wireless medium this is able to provide timely and reliable information flowing among the UAVs In this project, we refer to this problem as the UAV networking problem and focus on the networking issues with specific applications to UAV operation scenarios

4.2 Network Structure-Based Routing

In network structure-based routing, the way that nodes are connected and how

they exchange information depend on the network architecture Flat routing, a type of network structure-based routing, combines all the sensor nodes together

to perform sensing, and all nodes have the same role to play in the network On the other hand, hierarchical routing has sensor nodes that play different roles in

the network For example, some nodes may send data to the sink node, whereas others may perform the task of sensing only In tree-based routing, a routing tree

46

Trang 29

surveillance Owing to this concept, Laourira et al proposed a multilayer hybrid architecture to design a surveillance system for border monitoring by using cameras, scalar sensors, radars, and UAVs They also addressed an activation

scheduling strategy based on load balancing and energy saving The main

purpose and aim of the proposed scheme is to track and detect any border

intrusion in the possible human involvement There are three kinds of nodes

used in the network, They are scalar sensors, multimedia sensors, and UAVs

They collaborate with each other to build an efficient intrusion detection system

Scalar sensors form the first layer called the detection layer This layer is

responsible for intrusion detection Once the scalar sensors detect any kind of

“intrusion, an alert is sent to the multimedia sensor nodes which constitute the

second layer of the network Finally, UAVs are called upon to track the intruder after they receive necessary information from the multimedia sensor nodes The

lifetime Although the network is designed with three-layer hierarchy, data

transmission (i.e., routing) among the three layers is flat-based That is why

UAV-WSN is classified as flat-based routing

UAV-based automated sensor deployment for mobile sink (UAV-AS-MS):

Gomez et al proposed a new method that combines a heterogeneous WSN

based on a multi-agent system and a mobile agent (UAV) for data acquisition in

places that are inaccessible for a human being The goal is to automate the

network deployment and data acquisition The primary concern is to facilitate

data gathering beyond the communication range of sensor nodes in the network

An UAV is responsible for transporting and releasing sensors at a certain location that is considered dangerous to access through direct human

intervention The UAV collects data automatically, following an optimal route

Trang 30

————-UAV-based liner sensor network (ULSN): Routing the data in a multi-hop

fashion in LSNs that can extend even up to hundreds or thousands of kilometers can cause high-energy dissipation A UAV-based liner sensor network (ULSN) deals with such a problem using UAVs Four kinds of nodes are defined in the

system They are sensor nodes (SNs), relay nodes (RNs), UAVs, and sink nodes

SNs are basic sensor nodes assigned to gather data from the environment RNs

collect information from the nearest sink nodes, and UAVs move along the LSN

to collect data from the sink nodes Sink nodes are placed at both ends of the LSN SNs use a normal and non-complex algorithm to transmit data to the

TỶ nearest RN RNs act as CHs and transfer data to a moving UAV Finally, the —

UAV carries the data to the sink node This procedure of the ULSN decreases

the energy consumption significantly because of the reduction of transmission

ranges from the SN to the RN and the use of one-hop transmission from the RNs

————————— tothe UAV The ULSN can also reduce the interference among RNs caused by —————

| the hidden-terminal problem One drawback is that the total travel time that a

| UAV may take while traversing a big LSN was not considered

Cluster-Based Routing

In cluster-based networks, nodes are divided into several virtual groups In the

clustering schemes, nodes are allocated a different purpose such as CH, cluster gateway (CGW), and cluster member (CM)

The CH functions as a local coordinator for its cluster, performing inter-cluster communication and data forwarding CGW is a non-CH node with inter-cluster

links CGW is used to access neighboring clusters and exchange information between clusters Ordinary nodes are called as CMs It was shown that cluster

schemes perform better in a large area with a large number of nodes There are

tolerance, maximal network lifetime, and energy efficiency are the most

common objectives among them In a multi- UAV network, one ground station is used to control one or more UAVs The ground station controls the UAV directly without any air-to-air (A2A) communication links However, this

scheme does not perform well on a large scale A centralized-based scheme does

not scale well for large UAV networks In cluster-based schemes, deployed UAVs may be minimized, and area coverage may be maximized A cluster- 50

Trang 31

have the same capabilities of energy, communication resources, and computation power, and CHs are selected according to a random manner On the

other hand, in the heterogeneous network, nodes have unequal capabilities For

this reason, CH selection is important in heterogeneous networks Normally, the

node with more capabilities is selected as a CH in heterogeneous networks

UAV-assisted routing protocol (URP): URP is a crop health-monitoring system developed using a UAV-aided clustered WSN Collecting data from WSNs

deployed in farm fields is challenging because of extreme weather conditions,

# like high temperature, dry weather, sandstorms, and remote locations To

overcome these challenges, some authors proposed a dynamic data-collection

classifier In the routing phase, nodes are classified into three types, namely,

CMs, candidate clusters (CCs), and candidate CHs (CCHs) Finally, to nominate

a node as a CH, the UAV and CCHs participate in the CH selection process

parameters of the crops, soil, and environment The role of the UAV in the

system is to create a communication infrastructure between the end users and

52

Trang 32

Figure 4.10 UAV-aided data gathering system

Hybrid and energy-efficient distributed (rHEED): When a large number of sensor nodes are deployed in a geographical area, the energy-hole problem can

be an issue that can cause nodes closer to the static sink node to die faster A received signal-strength indication (RSSI)-based hybrid and energy-efficient

distributed (rHEED) protocol is a clustering scheme in WSNs that incorporates

UAV-based mobile sinks to overcome the energy-hole problem Its network

model consists of sensor nodes that collect data and transmit them to CHs Then, all the CHs forward their data to the mobile sink node, which is the UAV It is

assumed that the UAV can move in three dimensions with variable speeds The

protocol can successfully prevent unnecessary cluster formation using the UAV

path as a parameter to form the clusters rHEED does not consider wind effects

54

Trang 33

Figure 4 11 UAV and WSN communication

Projection-based comprehensive data gathering (PCDG): Ebrahimi et al

proposed the use of UAVs to collect data from extremely dense WSNs using

projection-based comprehensive data gathering (PCDG) Comprehensive data

gathering (CDG) is used to aggregate data from cluster members to their CHs

This can successfully reduce the number of transmissions that lead tothe reduction of energy consumption The UAV is responsible for data transfer to a

remote sink node, avoiding the need for long-range transmissions or multi-hop

communication among sensors After an optimized forwarding tree per cluster is constructed, the sensed data are gathered from selected CHs based on

rojection-based CDG with minimized UAV flight distance The joint problem —

| of optimized node clustering, forwarding tree construction, CH selection per

| cluster, and UAV trajectory planning for energy-efficient data collection was

mathematically modeled and analyzed According to the performance results,

the PCGD outperformed other approaches for small-, medium-, and large-size

| network scenarios Tree-Based Routing

56

Trang 34

Hybrid UAV-aided WSN routing (H-UAV-WSN): When a WSN is formed with

thousands of sensor nodes and a traditional immobile sink node, this may result

in inefficient area coverage and decreased network performance To deal with

this issue, some authors proposed a hybrid UAV-WSN (H-UAV-WSN) network that can be self-configured for the improvement of data gathering across large areas The routing scheme firstly establishes a decentralized multi-level architecture The UAV is fitted with a sink node that acts as a data collector In

addition, the UAV can behave as a relay to connect WSNs to a remote base

station depending on the application requirement Such a feature enhances the connection between ground WSNs and the base station Based on the trajectory, two stages are considered Firstly, a discovery trajectory is planned Secondly, a —

neighborhoods of CHs The trajectory is planned in a way that guarantees

between ground WSNs and UAVs is not taken into account in forming clusters

Topology-aware data aggregation (TADA): UAV-based data aggregation of WSNs was reported Traffic volume can be significantly reduced using

comprehensive sensing (CS) The existing approaches based on CS have

limitations such as excessive overhead in broadcasting and high errors in data reconstruction process Addressing these issues, Wang et al proposed a

topology-aware data aggregation (TADA) protocol that can sustain the

advantages of CS-based schemes while alleviating the previously mentioned

issues One of the main features of TADA is its ability to utilize the topology information to rebuild the raw data with higher precision The mechanism of

weight coding is identical to CS in TADA, but TADA can successfully achieve

a short weight vector which results in lower energy consumption The communication time and obstacle avoidance However, any collaboration —————-

energy efficiency of data aggregation, data reconstruction error rate, and storage requirement However, the protocol ignores the effect of link transmission

58

Trang 35

information and local timing compared to earlier algorithms One drawback of EEJLS-WSN-UAV is that it does not consider the time taken for a GPS-

equipped roaming UAV to empower other nodes in the sensor field Route

optimization of UAVs is necessary if huge numbers of sensor nodes are

= deployed In a future improvement of EEJLS-WSN-UAYV, it may be possible to

optimize the flight path to reduce the time required to cover the entire network

| Location-based UAV-aided WSN (LS-UAV-WSN): Event-based WSN requires

a faster response in data processing and offloading Location service in a UAV-

: based WSN (LS-UAV-WSN) is based on a distributed algorithm, which +

sensor nodes in a WSN for data acquisition Mobile sinks directly infer and compute the network trajectory In addition, all the nodes are assumed to be

position-aware When a node has data to transmit, it broadcasts a source

and exact position Nodes that receive the packet must check its ID and advertisement packet at a certain time interval that contains its identifier (ID)

broadcast it again after a certain timeout Mobile sinks also can send a sink advertisement after the expiration of a particular time interval The energy consumption is significantly reduced and, thus, the network lifetime is

prolonged

4.3 Protocol Operation-Based Routing

distinct categories: swarm intelligence routing and multi-path routing Network

L

|

As discussed earlier, protocol operation-based routing can be divided into two

management for UAV-based WSNs is gradually becoming more difficult

on swarm intelligenee This kind of algorithm depends on the interaction of a

multitude of simultaneously interacting agents Multi-path routing involves multiple alternative paths in a UAV-based network that can maximize the

benefit in terms of fault tolerance, bandwidth, and security

4.3.1 Swarm Intelligence Routing Particle swarm optimization (PSO)-based UAWSNs: In PSO-WSN-UAV, the issue of determining the network topology of a WSN and the use of UAVs for

60

Trang 36

This is done by using a priority-based frame-selection scheme Nodes within the

coverage of UAVs are classified into different frames based on their locations

The contention window value in IEEE 802.11 MAC is also adjusted for this purpose A lower contention window range is assigned to the frame with high priority in an urgent area, and a higher contention window range is assigned to frames with low priority in unimportant areas Based on this framework, FSRP aims to reduce the distance between senders and receivers to obtain better channel quality At least one CH is responsible for data communication with a

UAV This decreases the distance between sensors With a shorter distance, the

channel quality becomes better, thus saving energy

Activated sensor (ON)

The Ist path

Figure 4.14 General architecture of a UAWSN system

4.3.3 Shortest-Path Routing Energy efficient UAV routing for WSN (EFUR-WSN): In EFUR-WSN, the authors addressed the problem of energy consumption for data transmission in

UAV-enabled WSNs, where a UAV is dispatched to collect data from sensors

In EFUR-WSN, a Voronoi diagram-based algorithm is introduced tor efficient UAV routes in order to conserve the residual energy of sensors The optimization problem of data collection and UAV traveling distance is solved on the basis of two different methods Firstly, a feasible UAV routing path is

provided based on the Voronoi diagram, which provides UAV hovering locations with low computational complexity The Voronoi diagram is

extensively exploited by focusing on sensor energy information and UAV

hovering location in order to prolong network lifetime The shortest UAV route

62

Trang 37

decades, there has been tremendous progress on the development of UAV,

which enables multiple UAVs applications Cooperation of a UAVs group can

be considered as natural cooperation in which each member locally operates to reach a mutual mission for the group Cooperative UAVs can offer various benefits including shorter operating time [4], more energy-efficient [5], more

missiles As the defense mechanism becomes more modern, an attack by a

single missile is very complicated A group of cooperative missiles will increase the chance of successful attacks [9]

64

Trang 38

Cooperative | See EE súc) Desired actions

2 Local controller ————> UAV Dynamics controller

decision-making In object detection and tracking applications, feature detection, feature description, and matching methods are widely employed In this section,

we provided a brief introduction of these methods with several popular

algorithms

Feature detection methods are used to detect objecfs from images Interest objects are determined using features Features are roughly categorized into three main types which are edges, corners, and blobs Edge detection is widely exploited to detect lines and planes In [10], the authors discussed several classical edge detection methods such as Canny, Sobel, Scharr edge detectors

The advantages and disadvantages of these classical detectors were compared in [11] Canny detectors have the highest accuracy and have been exploited in

66

Trang 39

high-resolution remotely sensed images collected from UAVs to assess forest coverage area The overall accuracy of classification of this method is over 90%

This result has shown that the deep learning approach is quite efficient in the

“classification of images obtained using UAV and could outperform other machine learning algorithms in the process of classification of very high- resolution images However, one major disadvantage of deep learning is that it requires better computing facilities compared with traditional machine learning

algorithms

Graph theory and Consensus algorithm for target synchronization Each UAV in a group has distinct observations on the desired target Under these different observations, objects classification algorithms may result in - different predictions [23] For example, assume a correct classification of a

person is 100%, A UAV with a full view of a person may have a percentage

score of 90% while a UAV only seeing a part of a person may give a result of

60% Multiple UAVs may give varied classification results, in which case it will

be difficult to determine an exact target for a UAV group Therefore, a decision-

making mechanism is required to synchronize UAVs in a formation The mechanism should be designed in a distributed form for saving resources and

scaling abilities In order to reach a consensus for UAVs, we have utilized a

consensus algorithm based on a graph theory

The communication topology of a UAV group is described by a graph A graph G=(N,) has a set of N nodes (a node presenting a UAV) and a set of E edges

If there exists a communication link between node i and node j, an edge is defined as “= J) It is said that node j receive information from node i The

adjacency matrix is defined as 4=[%] wịti % “lị£ OP otherwise %EỐ, The degree matrix is obtained as D=diag(4) The laplacian matrix of a graph

prediction results of the j" UAVs at time step t is presented by a n-vector

Then, each UAV updates its result as follows:

68

Trang 40

is used to lead the group to desired targets

NY ={keVy: [Pu — Pi|< ñ›Va = 1.2 K} (4)

where '® is an obstacle detection range, /° is the set of K obstacles, ? represents positions of UAV ith projecting on obstacle k

Flocking consists of three terms: (1) a formation connection, (2) obstacle avoidance, and (3) a navigation term The first term is used to maintain a

formation by generating attractive and repulsive forces among UAVs in a group

It also contains a consensus component to synchronize the velocities of the UAVs group The second term prevents collision with external obstacles by creating repulsive force among UAVs and their virtual neighbors The third term

The formation connection is defined as:

where “°° are positive constant, 6, is the potential function, is a vector

connecting ”' and P/ with a constant £€(0.),

The obstacle avoidance term is defined as:

ý =đ jen} d, (IPs ~ Pi l) Hụ +€; jen? Bi Vin =i) (6)

where * is the repulsive function, "# is is a vector connecting ”: and ?:, The navigation term is defined as:

where ?:is the position of a target which is obtain in a visual sensing stage,

“and “are constants

5.3 Simulation Results

5.3.1 Consensus algorithm

70

Ngày đăng: 23/12/2024, 14:53

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
4. Gregor Klancar, Drago Matko, Saso Blazic, “Mobile Robot Control on a Reference Path,” Proceedings of the 13th Mediterranean Conference on Control and Automation, Limassol,weCyprus, June 27-29, 2005, pp. 1343-1348 Sách, tạp chí
Tiêu đề: Mobile Robot Control on a Reference Path
1. T.T. Hoang, P.M. Duong, N. T. T. Van, D. A. Viet and T. Q. Vinh.: Development of an EKF- based Localization Algorithm Using Compass Sensor and LRF. In: Proc. IEEE 12thInternational Conference on Control, Automation, Robotics &amp; Vision, ICARCV 2012, pp.341- 346 Khác
2. T.T. Hoang, P.M. Duong, N. T. T. Van, D. A. Viet and T. Q. Vinh.: Multi-Sensor Perceptual System for Mobile Robot and Sensor Fusion-based Localization. IEEE th International Conference on Control, Automation and Information Sciences (ICCAIS-2012), pp.259-264.T. T. Hoang, D. T. Hiep, P. M. Duong, N. T. T. Van, B. G. Duong and T. Q. Vinh, : In: Proc.IEEE 8th Conference on Industrial Electronics and Applications (ICIEA-2013), pp. 1308- 1313 Khác
5. Ryck, D.M., Mark, V., Debrouwere, F.: Automated guided vehicle systems, state-of-the-art control algorithms and techniques. Journal of Manufacturing Systems (54), 152-173 (2020) Khác
6, Moshayedi, A.J., Roy, A.S., Liao, L.: PID Tuning Method on AGV (automated guided vehicle) Industrial Robot, Journal of Simulation and Analysis of Novel Technologies in Mechanical Engineering 12(4), 53-66, (2020) Khác
7. Hasan, H.S., Abidin, M.S.Z, MSA, M.MFMS.: Automated guided vehicle routing: Static, dynamic and free range. Journal Int Eng Adv Technol 8(SC), 1-7, (2019) Khác

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN

w