Wireless Sensor Networks by Rastko R. Selmic Vir V. Phoha & Abdul Serwadda
Author:Rastko R. Selmic, Vir V. Phoha & Abdul Serwadda
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
(4.1)
where individual sensors on a node are identified as , . The model considers each node with an equal number of sensors, N, with output values at time instance k given by (i-th sensor on j-th node at time k). A true value of a measured physical variable is and a faulty measurement of the i-th sensor on the j-th node at time instance k is .
Fig. 4.8Model of a WSN that is used in the fault analysis
There are two general categories for fault detection techniques: data-centric and system-centric [37]. Data-centric techniques focus on a single data stream to identify faults, while system-centric techniques consider the whole system to detect faults. The two types of techniques need not be used exclusively. A computationally inexpensive data-centric technique may be used to identify abnormal behavior on a sensor stream, at which point a more expensive system-centric technique can be implemented that compares the sensor data to related neighboring nodes, verifying whether the abnormal data reflects an abnormal environment or a faulty sensor reading.
If a model for the behavior of a measured phenomenon is known, the model can be compared to the readings of a sensor, and the error between the two used for identification of faults. If a model is not known, then other techniques listed in Table 4.2 can be applied to identify faults.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25284)
Hello! Python by Anthony Briggs(24338)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23431)
Kotlin in Action by Dmitry Jemerov(22510)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21972)
Dependency Injection in .NET by Mark Seemann(21842)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20709)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19522)
Grails in Action by Glen Smith Peter Ledbrook(18605)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17032)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11853)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9198)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8360)