In Telematics and ITS research fields, magnetic sensornetworks are being an important research and development topic since it can be important infrastructure connecting roads with moving vehicles, therefore, making m...
详细信息
ISBN:
(纸本)9781424415014
In Telematics and ITS research fields, magnetic sensornetworks are being an important research and development topic since it can be important infrastructure connecting roads with moving vehicles, therefore, making more various applications possible. In this paper, as an important service using the magnetic sensor network in Telematics and ITS, we design and implement safety control system at non-signalized intersection. Through this paper, we extract some critical requirements to be satisfied for successful design, propose some solutions for the requirements, and conduct some experiments to show effectiveness of the designed and implemented system.
To satisfy application information Quality (IQ) constraints in a sensor network, the efficient way is to choose the most appropriate sensor nodes and sensor modalities which would provide a required IQ for the current...
详细信息
ISBN:
(纸本)9781424415014
To satisfy application information Quality (IQ) constraints in a sensor network, the efficient way is to choose the most appropriate sensor nodes and sensor modalities which would provide a required IQ for the current state of the system. In this paper, two formulations of an activity recognition application are considered - the first based on static Bayesian Network (BN), and the second on Dynamic Bayesian Network (DBN) which allows temporal changes to the conditional probabilities of the system states. It is shown that for similar results, in the certainty of state estimation, the formulation based on DBN uses much less resources, because it relies significantly on the readings obtained in the past. Also DBN model is more robust since it greatly reduces the likelihood of selecting unnaturally drastic state changes.
We describe a novel concept for an intrusion sensor network. The concept features two components. The first is a simple tone-based inter-node signaling system for autonomous interactive cueing, exhibiting a swarming b...
详细信息
ISBN:
(纸本)9781424415014
We describe a novel concept for an intrusion sensor network. The concept features two components. The first is a simple tone-based inter-node signaling system for autonomous interactive cueing, exhibiting a swarming behavior. The second component is a means to detect an intruder by measuring the reduction in a microwave illumination signal by a receiver as that signal is blocked by the intruder. Preliminary calculations indicate the feasibility of the simple signaling system.
The aim of this paper is to compare the accuracy of a range of advanced density models for gas identification from sensor array signals. Density estimation is applied in the construction of classifiers through the use...
详细信息
Emerging applications such as network monitoring and sensor network data processing are requiring stream data processing technology. Due to the performance and storage constraints, we will not be able to Store the com...
详细信息
ISBN:
(纸本)9789806560468
Emerging applications such as network monitoring and sensor network data processing are requiring stream data processing technology. Due to the performance and storage constraints, we will not be able to Store the complete stream in main memory and as such processing the complete stream at one time will be impractical. For this reason, a succinct summarized data structure (e.g., histogram) is very essential to handle such a huge stream of data. Furthermore, a time based query or a sliding window query will be important for most stream applications. In this paper, we propose a histogram construction strategy which can overcome limited memory constraints for a continuous data stream and also effectively handle time information of stream data through the histogram merge technique. Several experiments show that the proposed method yields relatively low approximation errors for processing time based window queries in a limited memory environment.
This paper presents a prototype of a sensor device including heart rate, EDA and accelerometer sensors to investigate learners39; internal state. Through experiments, sensor data were collected, visualized and corre...
详细信息
ISBN:
(纸本)9781509043170
This paper presents a prototype of a sensor device including heart rate, EDA and accelerometer sensors to investigate learners' internal state. Through experiments, sensor data were collected, visualized and correlated with information on learner's' emotional state derived from a self-report questionnaire. The results can be used to improve signal processing, and help find appropriate indicators from physiological data for learning environment design.
Wireless sensor and actuator network applications require several levels of testing during their development. Although software algorithms can be tested through simulations and syntax checking, it is difficult to pred...
详细信息
ISBN:
(纸本)9781424443093
Wireless sensor and actuator network applications require several levels of testing during their development. Although software algorithms can be tested through simulations and syntax checking, it is difficult to predict or test for problems that may occur once the wireless sensor and actuator has been deployed. The requirement for testing is not however limited to the development phase. During the lifecycle of the system, faults, upgrades, retasking, etc. lead to further needs for system validation. In this paper we review the state-of-the-art techniques for testing wireless sensor and actuator applications and propose the Integrity-Checking Framework. The framework provides in-situ full lifecycle testing and validation of wireless sensor and actuator applications by performing an "Integrity Check", during which the sensor inputs and actuator responses are emulated within the physical wireless sensor and actuator. This enables application-level testing by feeding controlled information to the sensor inputs, while data processing, communication, aggregation and decision making continue as normal across the physical wireless sensor and actuator.
Wireless sensornetworks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be consi...
详细信息
ISBN:
(纸本)9781424415014
Wireless sensornetworks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey and the location of their members. The security models and protocols used in wired and other networks are not suited to WSNs because of their severe resource constraints, especially concerning energy. In this article, we propose a centralized intrusion detection scheme based on Support Vector Machines (SVMs) and sliding windows. We find that our system can detect black hole attacks and selective forwarding attacks with high accuracy without depleting the nodes of their energy.
Wireless sensor Network (WSN) has set of wireless sensor nodes that are used to generate or sense the high volume of raw data from the environment, transmits the data to its respective sink node. The processing of raw...
详细信息
This paper describes an adaptive error recovery mechanism for sink-to-sensors reliable data dissemination in multi hop wireless sensornetworks. The proposed error recovery mechanism(ONE) uses a cross layer variant of...
详细信息
ISBN:
(纸本)9781424415014
This paper describes an adaptive error recovery mechanism for sink-to-sensors reliable data dissemination in multi hop wireless sensornetworks. The proposed error recovery mechanism(ONE) uses a cross layer variant of the negative acknowledgement(NACK) based Selective Repeat scheme for retransmissions. The mechanism is further extended to multi hop topologies by adjusting the window parameters and applying an efficient buffer management strategy. We have shown that the adaptive behavior of the scheme enables optimization of system parameters that affect the total number of packets sent in a reliable session. The analysis of the proposed scheme is given and the effect of buffer size, density and loss ratio parameters on the overall performance is shown.
暂无评论