scispace - formally typeset
Search or ask a question

Showing papers on "Sensor hub published in 2017"


Proceedings ArticleDOI
01 May 2017
TL;DR: A recent study of the Low Energy Adaptive Clustering Hierarchy abbreviated as LEACH and its various routing protocols with pros as well as cons is done.
Abstract: A WSN (Wireless Sensor Network) is made out of various number of hubs each of which comprise of detecting gadgets or sensing device to gather information from environment. These detecting gadgets are given processing unit to perform operations on information. These gadgets are conveyed arbitrarily in remote environment, because of which battery charging or substitution is not viewed as down to earth. Because of the progression in wireless environment, WSN is being utilized as a part of various zones like: military, civilian, and modern applications. A Wireless Sensor Network is a type of network which is shaped by expansive number of various sensor hubs which are arbitrarily a locale conveyed. An issue of constrained wellspring of energy as the source of power in the hub and due to the fact battery of hub cannot be supplanted or displaced. Lifespan of the WSN is especially subject to the battery life of every sensor hub. As hub does the detection and sends the information to the sink node from surrounding environment, thus in the WSN routing plans which is used for information sending needs to be productive as well as effectively use the force in battery of sensor hub that should be used to build the system lifespan. An energy optimistic routing protocol is the real worry in field of WSN. In this paper, a recent study of the Low Energy Adaptive Clustering Hierarchy abbreviated as LEACH and its various routing protocols with pros as well as cons. Researchers and Specialists have been attempting in create routing systems which improves the lifetime of WSN. Furthermore, correlation of these routing protocols on different assumptions is done.

11 citations


Patent
Fabien Papleux1
08 Mar 2017
TL;DR: In this paper, the authors present a prototype program defining functionality of a proposed Internet of Things (loT) device configured to communicate with a plurality of sensors and one or more actuators, wherein the prototype program includes commands configured to cause the prototyping system to make one-or more requests to a prototyping API to register devices, obtain a status of a sensor, and execute an action by an actuator.
Abstract: A system including a prototyping system including one or more computers, wherein the prototyping system is configured to receive a prototype program defining functionality of a proposed Internet of Things (loT) device configured to communicate with a plurality of sensors and one or more actuators, wherein the prototype program includes commands configured to cause the prototyping system to make one or more requests to a prototyping API to register devices, obtain a status of a sensor, and execute an action by an actuator, and a sensor hub that is connected locally, by wired or wireless connection, to a plurality of connected physical sensors and one or more connected physical actuators that correspond respectively to the plurality of sensors and the one or more actuators of the proposed loT device, the sensor hub communicating with the plurality of sensors and one or more actuators using non-routed Layer 2-type protocols, wherein the sensor hub is configured to receive a registration request through the prototyping API for each of the connected sensors and the one or more connected actuators and to initialize each of the connected sensors and the one or more actuators in response to receiving the registration request, wherein the sensor hub is configured to automatically obtain, in real-time, a status of each registered sensor, and to provide, in real-time, a last-obtained status to the prototyping system through the prototyping API on a routine, continuous or periodic basis, and wherein the sensor hub is configured to automatically receive, from the prototyping system through the prototyping API, requested actions corresponding to the functionality specified in the prototype program and to execute each of the requested actions on a corresponding connected actuator and provide a result of each executed action to the prototyping system, including whether each action succeeded or failed. FIG. 1 O 100 Prototyping Platform Prototype Driver Prototyping API 122 120 Status Actions Registration Engine Engine Engine 125 126 Status Repository Actions Queue Sensor Hub Registration Status Actions Module Module Module 131 137 132 Registration Status Actions 130 API API API 133 134 135 Sensor Sensor Sensor Actuator Actuator Module 1 Module 2 Module N Module 1 Module N 136a 136b 136n 138a 1An Sensor 1 Sensor 2 -.-. Sensor N Actuator 1 Actuator N 140a 140b 140n 150a 150n

8 citations


Patent
29 Mar 2017
TL;DR: In this paper, the authors present a smart watch that includes a sensor hub, a screen and a gyroscope, which is used for acquiring the spatial position value of the smart watch, and the sensor hub is used to determine whether the position value conforms to a preset threshold value.
Abstract: The present invention belongs to the communication terminal field and relates to a terminal and a power saving method thereof, in particular, a smart watch and a display screen highlighting method thereof The smart watch includes a sensor hub, a screen and a gyroscope; the gyroscope is used for acquiring the spatial position value of the smart watch; the sensor hub is used for determining whether the spatial position value conforms to a preset threshold value; and the sensor hub highlights the screen when the spatial position value conforms to the preset threshold value The smart watch is convenient to use and is more energy efficient

8 citations


Proceedings ArticleDOI
01 Feb 2017
TL;DR: In this paper, the authors presented a vitality proficient grouping calculation for sensor systems in view of the LEACH convention, which is one of prominent group based structures, which has been broadly proposed in remote sensor systems.
Abstract: Wireless Sensor Networks (WSN) offers one remote medium for transmitting information bundles, and it has a constrained asset with regards to the vitality. Hence, there is a need for vitality proficient convention for getting to the medium. “Sensor-Medium Access Control” (S-MAC) is considered vitality proficient convention since it diminishes the vitality utilizations of the sensors hubs. Vitality effective is the most critical issue that must be explained in planning a qualified steering convention for remote sensor systems is the manner by which to spare sensor hub vitality while addressing the requirements of utilizations/clients as the sensor hubs are battery restricted. There are number of different directing conventions have been proposed to advance the proficiency of WSNs. From these conventions, bunch based directing calculations have accomplished more huge and expanding the life time of the WSN even the hubs are in portable state. In this paper, we present a vitality proficient grouping calculation for sensor systems in view of the LEACH convention. Filter — “Low Energy Adaptive Clustering Hierarchy” is one of prominent group based structures, which has been broadly proposed in remote sensor systems. Filter utilizes a TDMA based MAC convention, and keeping in mind the end goal to keep up adjusted vitality utilization. This paper for the most part looks at the bunching conventions; specifically LEACH, LEACH-C, MTE and Stats-Clustering utilizing NS2 instrument for investigate the execution of the reproduction results with various measurements like Network Life time, got bundle and Energy Consumption. What's more, aside from this in this broadsheet, we display S-MAC is examined and broke down by utilizing Network Simulator NS2.

7 citations



Patent
24 May 2017
TL;DR: In this paper, a sensor hub and a data synchronizing method between application processors is described. But the method comprises the steps of generating and adding a plurality of absolute timestamps to a sensing data flow; generating a time point interval between every two adjacent absolute timstamps; generating and added a plurality and a relative time stamp associated with each sensing data to the data flow.
Abstract: The embodiments of the invention provide a sensor hub and a data synchronizing method between application processors. The method comprises the steps of generating and adding a plurality of absolute timestamps to a sensing data flow; generating a time point interval between every two adjacent absolute timestamps; generating and adding a plurality of sensing data and a relative time stamp associated with each sensing data to the sensing data flow.

2 citations


Patent
30 Nov 2017
TL;DR: In this paper, a bit packer is used to compress the sensor data by removing the sensor ID and/or the time stamp in the data and the bit packed sensor data is stored in batching memory.
Abstract: A sensor hub includes a bit packer that receives sensor data from a plurality of sensors and bit packs the sensor data so that the sensor ID, time stamp and each axis of the measured data is stored contiguously. The bit packer may compress the sensor data by removing the sensor ID and/or the time stamp in the sensor data. The bit packed sensor data is stored in batching memory. A bit unpacker receives the sensor data from the batching memory and unpacks the sensor data, e.g., so that the sensor ID, time stamp and each axis of the measured data is stored in its own word. Additionally, the bit unpacker may decompress the bit packed sensor data by reinserting the sensor ID and/or time stamp in the sensor data.

1 citations


Proceedings ArticleDOI
Minkwan Kee1, Seungjin Lee1, Hyun-su Seon, Jongsung Lee, Gi-Ho Park1 
19 Apr 2017
TL;DR: The IBE is designed to have both efficiency and flexibility to support various emerging applications for future sensor hub SoCs in addition to the sensor fusion and machine learning algorithm (SVM) which are the target applications of the SLH200.
Abstract: This paper proposes a hardware accelerator, named IBE (Intelligence Boost Engine), to process both sensor fusion and machine learning algorithms for the Standing-egg SLH200 sensor hub SoC. The IBE is designed to have both efficiency and flexibility to support various emerging applications for future sensor hub SoCs in addition to the sensor fusion and machine learning algorithm (SVM) which are the target applications of the SLH200. With regard to the SLH200 SoC, the IBE was fabricated in the Global Foundry 55nm process, and the performance and power evaluation with IBE have been performed with the evaluation board of the SLH200 SoC. The evaluation results show that the proposed IBE can achieve up to 31.3× faster speed for target kernel operation and 4× faster speed for the target application (SVM polynomial). It reduces the energy consumption up to 75% as well.

1 citations


Patent
23 Mar 2017
TL;DR: In this paper, a sensor hub coupled with one or more sensors and an application processor of a communications apparatus includes a sensing module and a micro-processor, which constructs an adaptive model according to a plurality of parameters and identifies user activity based on the adaptive model.
Abstract: A sensor hub coupled to one or more sensors and an application processor of a communications apparatus includes a sensing module and a micro-processor. The sensing module receives raw data from the sensors. The raw data is generated by the sensors when sensing one or more events. The micro-processor constructs an adaptive model according to a plurality of parameters and identifies user activity according to the raw data based on the adaptive model. The sensor hub is an always-on sub-system for assisting the application processor to identify user activity according to the raw data. The micro-processor further receives updated parameters and updates the adaptive model according to the updated parameters.

1 citations


Journal ArticleDOI
30 Aug 2017
TL;DR: A novel strategy has been proposed to recognize and disengage malicious nodes from the network which are in charge of triggering the attack, based on blacklist technique and clustering technique and will enhance network effectiveness as far as bundle misfortune, defer and expand throughput of the network.
Abstract: A wireless sensor network comprises of countless spread over a particular territory where we need to take care of at the progressions going ahead there A sensor hub, for the most part, comprises of sensors, actuators, memory, a processor and they do have correspondence capacity These sorts of networks are much powerless against security attacks Many kinds of active and passive attacks are conceivable in the sensor network Among all the conceivable active attacks, sinkhole attack is the most widely recognized and destructive attack This attack debases network execution and prompts denial of service attack The attack is triggered by the malicious hub which is available in the network In this work, a novel strategy has been proposed to recognize and disengage malicious nodes from the network which are in charge of triggering the attack The novel procedure is based on blacklist technique and clustering technique The exploratory results will demonstrate that proposed strategy detects and separate the malicious nodes from the network proficiently It will enhance network effectiveness as far as bundle misfortune, defer and expand throughput of the network NS2 simulator instrument will be utilized as a part of it

1 citations


21 Oct 2017
TL;DR: Provenance administration for sensor systems presents a few testing necessities, for example, low vitality and transfer speed utilization, effective capacity and secure transmission.
Abstract: Sensor networks are utilized as a part of various application spaces, for example, digital physical framework frameworks, natural checking, control lattices, and so on. Information are created at an extensive number of sensor hub sources and handled in-organize at middle of the road jumps on their way to a Base Station (BS) that performs basic leadership. The assorted variety of information sources makes the need to guarantee the reliability of information, to such an extent that lone dependable data is considered in the choice procedure. Information provenance is a successful strategy to evaluate information reliability, since it outlines the historical backdrop of proprietorship and the activities performed on the information. Information provenance speaks to a key factor in assessing the reliability of sensor information. Provenance administration for sensor systems presents a few testing necessities, for example, low vitality and transfer speed utilization, effective capacity and secure transmission. In this paper particular commitments are:

Proceedings ArticleDOI
01 Jan 2017
TL;DR: In this article, S-MAC convention diminishes the listen time by releasing hub into occasional rest mode, which takes after virtual transporter sense, physical bearer sense and RTS/CTS system.
Abstract: In WSN organize, we have huge number of sensor hubs. The fundamental errand of a sensor hub in a sensor system is to recognize occasions, perform information preparing inside the system, and afterward transmit the information. WSN hub has restricted power source and the substitution of force source may be unimaginable. Vitality effectiveness is one of the vital issues in remote sensor systems. We can build the vitality productivity by utilizing MAC conventions. S-MAC convention diminishes the listen time by releasing hub into occasional rest mode. For impact shirking S-MAC takes after virtual transporter sense, physical bearer sense and RTS/CTS system. S-MAC utilizes (Network Allocation Vector) NAV vector in virtual transporter sense. Upkeep of NAV vector all through the transmission is troublesome. In this paper, source hub communicates transmission time to the neighboring hubs, to release the neighboring hubs to rest mode. It can diminish the impacts and catching.

Patent
11 May 2017
TL;DR: In this article, the sensor hub detects a specified value on a timer, and adjusts a count associated with each client by the specified value, either to increment or decrement, depending on the implementation.
Abstract: A hub can service data requests for various different clients having different periodic fix intervals. The sensor hub detects a specified value on a timer, and adjusts a count associated with each client by the specified value. The adjustment can be either to increment or decrement, depending on the implementation. If the adjustment to any count causes the count associated with the client to reach the periodic fixed interval associated with the client, the sensor hub notifies the client. For counts that have not reached the respective fixed periodic request interval, the sensor hub iterates for the next specified value for the timer.

Patent
14 Dec 2017
TL;DR: In this paper, a sensor hub is defined as a body with a plurality of apertures disposed on the sensor hub body at substantially equal distances to each other, oriented towards the plurality of directions.
Abstract: Apparatuses, methods and a storage medium associated with a sensor hub are disclosed herein. In embodiments, a sensor hub may include a body with a plurality of apertures disposed on the sensor hub body at substantially equal distances to each other, oriented towards a plurality of directions, and a plurality of sensors disposed inside the sensor hub body to interface respective apertures, to sense ambient conditions in the plurality of directions via the apertures. The sensor hub may further include one or more communication interfaces to transmit the sensor data or results from processing the sensor data to an external recipient. Other embodiments may be described and claimed.

Patent
14 Sep 2017
TL;DR: In this paper, the authors present a method, systems and computer program products for analyzing and controlling a cold chain system, which includes collecting sensor data using a plurality of sensors provided at a plurality-of-stages of the cold-chain system, loading sensor hub analysis network software onto one of the plurality of sensor modules, where at least one sensor module is provided for each of the stages.
Abstract: Embodiments include method, systems and computer program products for analyzing and controlling a cold chain system. Aspects include collecting sensor data using a plurality of sensors provided at a plurality of stages of the cold chain system, loading sensor hub analysis network software onto one of a plurality of sensor modules, wherein at least one of the plurality of sensor modules is provided for each of the plurality of stages, receiving the sensor data at the plurality of sensor modules from the plurality of sensors, receiving the sensor data at a sensor hub analysis network from the plurality of sensor modules, analyzing the sensor data at the sensor hub analysis network, generating, using the sensor hub analysis network, a control recommendation signal based on the sensor data, and receiving the control recommendation signal in at least one of the plurality of sensor modules using the sensor hub analysis network software.

Book ChapterDOI
01 Jan 2017
TL;DR: This chapter provides information on power management states and architecture in sensors and the sensor hub.
Abstract: This chapter provides information on power management states and architecture in sensors and the sensor hub.

Journal ArticleDOI
TL;DR: The proposed Fault Hub Replacement (FHR) algorithm is based review Grade diffusion algorithm joined with Genetic algorithm use to decrease the information loss and improved the life-span of WSN by supplanting some non-working hub.
Abstract: A wireless sensor network comprises of various number of sensor hubs, which is utilized to gather and exchange information from source hub to sink hub at customary time interims. The power of each sensor hub in WSN is generally constrained. So the power consumption issue is major concern of WSN. Amid transmission, the sensor hub will lose their battery control and progress toward becoming flaw hub when it is utilized drawn out stretch of time. The fault may likewise happen because of sudden drop of battery control in sensor hubs or because of some other cataclysmic event. Therefore, the non-working hub recuperation is fundamental undertaking for expanding the lifetime of WSN. The proposed Fault Hub Replacement (FHR) algorithm is based review Grade diffusion (GD) algorithm joined with Genetic algorithm use to decrease the information loss and improved the life-span of WSN by supplanting some non-working hub.

Journal ArticleDOI
TL;DR: The proposed architecture provide convenient management with devices since all the information of devices are stored into database in the cloud, making it enough time for user to settle the network problem with no affecting on the environment monitoring.
Abstract: Different from the traditional embedded system or the real-time system, Cyber-Physical System (CPS) integrates computation with physical entities, making it easy for people to interact with the world that we live. With the development of CPS, more devices will be integrated into the internet, especially in the field of Environment Monitoring. Thus, the management and remote control of devices cause issues for CPSs. Towards this end, we develop a CPS by proposing a scalable, flexible architecture in Environment monitoring. The environment monitoring system (EMS) consists of three layer: physical sensing layer, data transport layer, data management layer. Generally, sensors and sensor hub which collects sensor data and transfer them to the upper layer make up of physical sensing layer. And the main function for data transport layer is to forward sensor data to the specified destination. The last layer is in the cloud, composed of a data processor and a knowledge base. Data from physical sensing layer can be analyzed due to the strong computation ability of cloud computing. Also, there are abundant restful API (application programming interfaces) are provided by management layer based on users’ demand. The proposed architecture provide convenient management with devices since all the information of devices are stored into database in the cloud. Even under the poor condition of network, data produced by sensors can be saved in local storage, making it enough time for user to settle the network problem with no affecting on the environment monitoring.

Proceedings ArticleDOI
01 Apr 2017
TL;DR: Diverse existing information digging procedures for WSN are studied and some research challenges related to the adoption of traditional data mining techniques are listed out.
Abstract: The fast development of wireless sensor networks has made a chance to accumulate and remove enormous measure of data from Wireless Sensor Networks. WSN is efficient instrument that empowers its clients to nearly screen, comprehend and control application handle. WSN consist of huge number of heterogeneous sensor hub spread over the extensive territory and help for wireless sensing and data processing. Information administration and handling for wireless sensor networks (WSNs) has turned into a theme of dynamic research in few fields of software engineering, for example, the dispersed frameworks, the database frameworks, and the information mining. A wireless sensor network is made out of countless and sensors and hubs. These sensors hubs have a few limitations like data is highly resource constraints, huge in volume. Because of their asset limitations, traditional information mining strategies are not reasonable to WSN. This inspires to outline a novel and proficient information digging procedures for WSN. In this paper diverse existing information digging procedures for WSN are studied and some research challenges related to the adoption of traditional data mining techniques are listed out.