scholarly journals Self-Similarity Superresolution for Resource-Constrained Image Sensor Node in Wireless Sensor Networks

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Yuehai Wang ◽  
Weidong Wang ◽  
Shiying Cao ◽  
Shiju Li ◽  
Li Xie ◽  
...  

Wireless sensor networks, in combination with image sensors, open up a grand sensing application field. It is a challenging problem to recover a high resolution(HR)image from its low resolution(LR)counterpart, especially for low-cost resource-constrained image sensors with limited resolution. Sparse representation-based techniques have been developed recently and increasingly to solve this ill-posed inverse problem. Most of these solutions are based on an external dictionary learned from huge image gallery, consequently needing tremendous iteration and long time to match. In this paper, we explore the self-similarity inside the image itself, and propose a new combined self-similarity superresolution(SR)solution, with low computation cost and high recover performance. In the self-similarity image super resolution model(SSIR), a small size sparse dictionary is learned from the image itself by the methods such asKSVD. The most similar patch is searched and specially combined during the sparse regulation iteration. Detailed information, such as edge sharpness, is preserved more faithfully and clearly. Experiment results confirm the effectiveness and efficiency of this double self-learning method in the image super resolution.

2014 ◽  
Vol 8 (1) ◽  
pp. 668-674
Author(s):  
Junguo Zhang ◽  
Yutong Lei ◽  
Fantao Lin ◽  
Chen Chen

Wireless sensor networks composed of camera enabled source nodes can provide visual information of an area of interest, potentially enriching monitoring applications. The node deployment is one of the key issues in the application of wireless sensor networks. In this paper, we take the effective coverage and connectivity as the evaluation indices to analyze the effect of the perceivable angle and the ratio of communication radius and sensing radius for the deterministic circular deployment. Experimental results demonstrate that the effective coverage area of the triangle deployment is the largest when using the same number of nodes. When the nodes are deployed in the same monitoring area in the premise of ensuring connectivity, rhombus deployment is optimal when √2 < rc / rs < √3 . The research results of this paper provide an important reference for the deployment of the image sensor networks with the given parameters.


2007 ◽  
Vol 3 (4) ◽  
pp. 20 ◽  
Author(s):  
Dan Wang ◽  
Qian Zhang ◽  
Jiangchuan Liu

Author(s):  
Maytham Safar ◽  
Hasan Al-Hamadi ◽  
Dariush Ebrahimi

Wireless sensor networks (WSN) have emerged in many applications as a platform to collect data and monitor a specified area with minimal human intervention. The initial deployment of WSN sensors forms a network that consists of randomly distributed devices/nodes in a known space. Advancements have been made in low-power micro-electronic circuits, which have allowed WSN to be a feasible platform for many applications. However, there are two major concerns that govern the efficiency, availability, and functionality of the network—power consumption and fault tolerance. This paper introduces a new algorithm called Power Efficient Cluster Algorithm (PECA). The proposed algorithm reduces the power consumption required to setup the network. This is accomplished by effectively reducing the total number of radio transmission required in the network setup (deployment) phase. As a fault tolerance approach, the algorithm stores information about each node for easier recovery of the network should any node fail. The proposed algorithm is compared with the Self Organizing Sensor (SOS) algorithm; results show that PECA consumes significantly less power than SOS.


Author(s):  
Teemu Laukkarinen ◽  
Lasse Määttä ◽  
Jukka Suhonen ◽  
Timo D. Hämäläinen ◽  
Marko Hännikäinen

Resource constrained Wireless Sensor Networks (WSNs) require an automated firmware updating protocol for adding new features or error fixes. Reprogramming nodes manually is often impractical or even impossible. Current update protocols require a large external memory or external WSN transport protocol. This paper presents the design, implementation, and experiments of a Program Image Dissemination Protocol (PIDP) for autonomous WSNs. It is reliable, lightweight and it supports multi-hopping. PIDP does not require external memory, is independent of the WSN implementation, transfers firmware, and reprograms the whole program image. It was implemented on a node platform with an 8-bit microcontroller and a 2.4 GHz radio. Implementation requires 22 bytes of data memory and less than 7 kilobytes of program memory. PIDP updates 178 nodes within 5 hours. One update consumes under 1‰ of the energy of two AA batteries.


2014 ◽  
Vol 977 ◽  
pp. 484-490
Author(s):  
Run Zeng

Wireless Sensor Networks (WSNs) are used in many applications in military and commercial areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. However, due to the highly resource constrained in sensor nodes, traditional security strategies always can do few with attacks on WSNs. In this Paper, we proposes a study of attacks and security mechanisms in WSNs. First, we summarize the attacks to WSNs and the security requirements based on the TCP\IP networking model, then we present the security solutions to each attack. Along the way we highlight the advantages and disadvantages of various WSN solutions and further compare and evaluate these solutions.


Sign in / Sign up

Export Citation Format

Share Document