Deployment Model of an Underwater Sensor Network in a Swimming Pool Environment with a suitable Localization Scheme

نویسندگان

  • M.Caroline Joyce
  • K. Vanitha
چکیده

Swimming Pool is one of the places where most of the children wish to be. But mostly the swimming pools do not have proper security measures to be done, in case of any emergency. In the world, in totality the reason for death of children is due to drowning while swimming in the pools. To overcome such mortality due to drowning, a new system has been devised to prevent such occurrences using mobile underwater sensors. The system is designed for children who weigh below 10 kilograms. In a specified swimming pool, a number of mobile underwater sensors are deployed. For every child a mobile sensor node is allocated and it is designed to move along with the child. The mobile sensor which is moving along with the child monitors the movement of the child. Researchers have identified the time a normal child can hold its breath is 35 seconds. If a child lies below the water surface for more than 35 seconds, the sensor identifies the child as drowning. So in the starting of the 30 second the sensor passes the message to an alarm and the alarm is activated. The alarm will ring with 100 decibel sound. Here in this real time deployment, PSO algorithm is used to localize the mobile sensor nodes in the swimming pool environment. Thus the proposed work would help saving a child from drowning in a swimming pool. Index Terms — Underwater Sensor Networks, USN Applications, Localization, PSO Algorithm, Acoustic Signals. Swimming Pool Safety ——————————  ——————————

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimizing the Event-based Method of Localization in Wireless Sensor Networks

A Wireless Sensor Network (WSN) is a wireless decentralized structure network consists of many nodes. Nodes can be fixed or mobile. WSN applications typically observe some physical phenomenon through sampling of the environment so determine the location of events is an important issue in WSN. Wireless Localization used to determine the position of nodes. The precise localization in WSNs is a co...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Deployment algorithms in Underwater Acoustic Wireless Sensor Networks: A Review

Deployment of sensors in the underwater acoustic sensor network is a very challenging task due to the complex 3d environment in underwater sensor networks because acoustic signal is affected by salinity, temperature, and pressure. The main objective of deployment algorithm is to achieve maximum coverage with a minimum number of underwater acoustic sensor nodes or surface gateways in underwater ...

متن کامل

Wireless sensor network design through genetic algorithm

In this paper, we study WSN design, as a multi-objective optimization problem using GA technique. We study the effects of GA parameters including population size, selection and crossover method and mutation probability on the design. Choosing suitable parameters is a trade-off between different network criteria and characteristics. Type of deployment, effect of network size, radio communication...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014