Search results for " sensor"

showing 10 items of 1714 documents

Simulation of laser-generated ultrasonic wave propagation in solid media and air with application to NDE

2009

Ultrasonic methods are well known as powerful and reliable tool for defect detection. In the previous decades focus and interest have been directed to non-contact sensors and methods, showing many advantages over contact techniques where inspection depends on contact conditions (pressure, coupling medium, contact area). The non-contact hybrid ultrasonic method described here is of interest for many applications, requiring periodic inspection in service or after manufacturing. Despite the potential impact of laser-generated ultrasound in many areas of industry, robust tools for studying the phenomenon are lacking and thus limit the design and optimization of non-destructive testing and evalu…

business.industryComputer scienceAcousticsUltrasonic testingGeneral ChemistryAcoustic waveFinite element methodSettore ING-IND/14 - Progettazione Meccanica E Costruzione Di MacchineOpticsTransducerNondestructive testingReflection (physics)General Materials ScienceUltrasonic sensorBoundary value problembusinessNDE Finite element Laser UltrasoundApplied Physics A
researchProduct

Current characterisation for ultra low power wireless body area networks

2010

The emerging area of body area networks (BAN) imposes challenging requirements on hardware and software to achieve the desired lifetimes for certain devices such as long term medical implants. In this paper, we propose a novel approach to the measurement and characterisation of the energy consumption of BAN devices. The approach uses a low cost energy auditing circuit and addresses the problem of accurately measuring low-level current consumption. This new technique will allow precise and analytical measurements of systems and components in terms of energy. This will help circuit designers minimise power consumption in BAN devices. Software engineers might use this approach to validate and …

business.industryComputer scienceBody area networks Body sensor networks Circuits Costs Current measurement Energy consumption Energy measurement Hardware Implants Power engineering and energy Body Area Networks Current characterization Embedded system design Energy efficiency Power Consumption Wireless Network softwareEnergy consumptionPower (physics)SoftwareEmbedded systemCode (cryptography)Electronic engineeringWirelessbusinessEnergy (signal processing)Electronic circuitEfficient energy use2010 8th Workshop on Intelligent Solutions in Embedded Systems
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct

Joint routing and per-flow fairness in wireless multihop networks

2008

In wireless multihop networks communication between two end-nodes is carried out by hopping over multiple short wireless links. Traditional CSMA/CA based media access control does not work satisfactory in a multihop scenario, since an intended target of a communication may be subject to mutual interference imposed by concurrent transmissions from nodes which cannot directly sense each other, causing unfair throughput allocation. Although TDMA seems to be a more promising solution, careful transmission scheduling is needed in order to achieve error-free communication and fairness. In our previous work, a TDMA scheduling algorithm has been proposed that schedules the transmissions in a fair m…

business.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessData_CODINGANDINFORMATIONTHEORYLoad balancing (computing)Network topologyScheduling (computing)WLANroutingMedia access controlWirelessMaximum throughput schedulingbusinessWireless sensor networkComputer network
researchProduct

Measuring the Spatial and Spectral Performance of WorldView-3

2015

The new WorldView-3 satellite provides a unique combination of very high spatial resolution and super-spectral capabilities. This presentation explores the practical and theoretical usefulness of this platform as compared against other hyperspectral and multispectral sensors.

business.industryComputer scienceMultispectral imageHigh spatial resolutionHyperspectral imagingSatelliteComputer visionArtificial intelligenceEarth remote sensingImage sensorbusinessImage resolutionRemote sensingFourier Transform Spectroscopy and Hyperspectral Imaging and Sounding of the Environment
researchProduct

DTMC modeling for performance evaluation of DW-MAC in wireless sensor networks

2016

Synchronized duty cycling (DC) aligns sensor nodes to wake up at the same time in order to reduce idle listening for medium access control (MAC) in wireless sensor networks (WSNs). Demand wakeup MAC (DW-MAC) is a popular synchronous DC MAC protocol which allows nodes to compete and transmit multiple packets in one operational cycle. This multiple packet transmission (MPT) feature makes DW-MAC more energy efficient when comparing with other existing single time competition based protocols such as sensor MAC (S-MAC). In the literature, no analytical model exists to evaluate the performance of DW-MAC. In this paper, we develop two associated discrete time Markov chain (DTMC) models and incorpo…

business.industryComputer scienceNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunications02 engineering and technologyEnergy consumption01 natural sciencesSynchronization0104 chemical sciencesComputer Science::PerformanceKey distribution in wireless sensor networksComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringMobile wireless sensor networkMultiple Access with Collision Avoidance for WirelessbusinessWireless sensor networkComputer Science::Information TheoryEfficient energy useComputer network2016 IEEE Wireless Communications and Networking Conference
researchProduct

A Self-Powered Long-range Wireless IoT Device based on LoRaWAN

2020

In this article, we propose a self-powered long-range wireless Internet-of-Things (IoT) device based on Long Range Wide Area Network (LoRaWAN) with various sensing capabilities. The nodes are designed based on ambient energy harvesting in such a way that these are self-sustainable throughout the components’ lifespan. Also, these nodes can be deployed on a large scale and are maintenance-free. In addition, these nodes can be deployed in remote places where the accessibility is limited, and maintenance is difficult. The wireless sensor nodes can be deployed both in indoor and outdoor environments with sufficient light levels for the solar panel, such as indoor lights in the indoor environment…

business.industryComputer scienceNode (networking)Range (aeronautics)Real-time computingWirelessbusinessInternet of ThingsEnergy harvestingAir quality indexWireless sensor networkPower (physics)2020 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)
researchProduct

Face Processing on Low-Power Devices

2009

The research on embedded vision-based techniques is considered nowadays as one of the most interesting matters of computer vision. In this work we address the scenario in which a real-time face processing system is needed to monitor people walking through some locations. Some face detection (e.g., Viola-Jones face detector) and face recognition (e.g., eigenfaces) approaches have reached a certain level of maturity, so we focused on the development of such techniques on embedded systems taking into account both hardware and software constraints. Our goal is to detect the presence of some known individuals inside some sensitive areas producing a compact description of the observed people. Cap…

business.industryComputer scienceNode (networking)Real-time computingFacial recognition systemSoftwareEigenfaceEmbedded systemScalabilityResource allocation (computer)businessFace detectionWireless sensor networkface recognition embedded devices
researchProduct

FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs

2012

Body Area Network (BAN) consists of various types of small physiological sensors, transmission modules and low computational components and can thus form an E-health solution for continuous all-day and any-place health monitoring. To protect confidentiality of collected data, a shared group key is usually deployed in a BAN, and consequently a secure communication group is generated. In this paper, we propose a bi-directional security and collusion resilience key management scheme for BAN, referred to as FoSBaS. Detailed analysis shows that the scheme can provide both forward security and backward security and resist against collusion attacks. Furthermore, the FoSBaS is implemented on a Sun …

business.industryComputer scienceNode (networking)TestbedCryptographyEnergy consumptionSun SPOTComputer securitycomputer.software_genreSecure communicationForward secrecyBody area networkSecrecyResilience (network)businessKey managementcomputerWireless sensor networkGroup keyComputer network2012 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct