Search In this Thesis
   Search In this Thesis  
العنوان
Design of Radiation Detection System
with Wireless Sensor Network /
المؤلف
Kishk, Amr Muhammed Abdel-Wahed.
هيئة الاعداد
باحث / عمرو محمد عبد الواحد كشك
مشرف / ناجي وديع مسيحه
مناقش / نوال أحمد الفيشاوي
مناقش / عبد الرحمن عبد الرحمن القفص
الموضوع
Sensor networks.
تاريخ النشر
2017.
عدد الصفحات
196 p. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
2/4/2017
مكان الإجازة
جامعة المنوفية - كلية الهندسة الإلكترونية - الهندسة الالكترونية والكهربائية
الفهرس
Only 14 pages are availabe for public view

from 196

from 196

Abstract

The fire in some building damages the building itself partly or entirely while
the radiation leakage can damage the country partly or entirely. Therefore, the
security should be built carefully in the countries. The objective of this thesis is
the design of Wireless Sensor Network (WSN) having the ability to monitor the
radiation leakage. The first problem discussed in this work deals with routing
problem. A proposed routing protocol named by Long Lifetime Hierarchical
Routing Protocol (LL-HRP) is presented to enhance WSN lifetime. LL-HRP is
compared with the other routing protocols using some metrics which are Network
clustering, energy consumption, number of lived nodes, number of lost sensed
data, and the throughput. The comparison shows that LL-HRP succeeds in
remedying the routing protocols drawbacks and enhancing both WSN lifetime and
performance in comparison with the other protocols.
WSN is composed of huge numbers of sensor nodes. These sensor nodes are
deployed randomly around a Base Station (BS). Therefore, the localization of
these sensor nodes in WSN is very important in the nuclear plants to locate the
radiation leakage problem accurately. This thesis introduces a proposed sensor
nodes localization method named by Free-Cost Localization Method (FCLM).
FCLM ignores the use of anchor nodes in comparison with the other methods. The
use of anchor nodes increases WSN cost due to installation of additional modules
in some of the sensor nodes. In addition, FCLM specifies the coordinates of the
sensor nodes in WSN area depending on distances estimation only in comparison
with the other methods which require the angel estimation beside distance
estimation.
The active hacker of WSN in the nuclear plants means that this hacker is the
devil himself or no mind person because of radiation leakage dangerous. The
V
data security is discussed by analyzing the different forms of the hackers. The
analysis shows that the hackers can be faced by two approaches which are the
key-updating and the frequency modulation. The key-updating approach is used
in the authentication stage and the data transfer stage. The modulation technique
approach is used to face the jamming threat. The proposed key management
scheme is named by Key-Updating Authentication Protocol (KUAP). The
proposed image encryption algorithm is named by New Image Encryption
Algorithm for WSN (NEA-WSN). Moreover, this thesis introduces a proposed
audio encryption algorithm named by Proposed Audio Encryption Algorithm
(PAEA). The two proposed jamming defensive techniques are named by
Inhomogeneous Carriers Modulation Technique (ICMT) and Hybrid Frequency
Modulation with Amplitude Modulation (FM-AM), respectively. The jamming
threat problem guides us to introduce an enhanced detection technique, named
by Enhanced Jamming Detection Technique (EJDT), and a proposed jamming
localization method named by Disturber Localization Method (DLM). In
addition, the thesis introduces two merging techniques used to merge the audio
samples and the image pixels in one signal. The merging techniques enhance the
performance of the communication systems from many directions such as
bandwidth utilization. The two merging techniques are named by Image and
Audio Interpenetration Technique (IAIT) and Image and Audio Merging
Technique (IAMT). Finally, the comparative study between the proposed
techniques with the other techniques shows the success of the proposed
techniques in the achievement of security requirements of each discussed threats
type in the nuclear plants.
The last objective of the thesis is the data compression. The image is used as
data. Thus, the thesis introduces five proposed image compression algorithms in
comparison with the other image compression algorithms. These proposed
algorithms are named by Zonal-DCT Image Compression Algorithm (Z-ICA) Enhanced Joint Photographic Experts group 2000 (En-JPEG2000), Hybrid
DWT with Zonal-DCT (DWT-Zonal) Image Compression Algorithm, Haar
Wavelet Image Compression Algorithm (HW-JPEG2000), and Low Energy
Image Compression Algorithm (LE-LICA). These proposed algorithms are
enhancements in the quantization stage which has been shown in JPEG and
JPEG2000. The tradeoff between the reconstructed image quality and the energy
consumption is the main point of image algorithm design in WSN. The
comparison results differentiate between the algorithms performance using some
metrics such as energy consumption and Peak Signal-to-Noise Ratio (PSNR).
The simulation results show the superiority of LE-LICA than the others. And
also, the results show that LE-LICA is a proposed lossless image compression
algorithm.