Low-power operation of power-hungry MOX sensors is usually achieved by duty cycling them periodically. However, a difficulty arises if a sensor is operated at irregular time intervals due to intermittent energy availa...
详细信息
ISBN:
(纸本)9781665439299
Low-power operation of power-hungry MOX sensors is usually achieved by duty cycling them periodically. However, a difficulty arises if a sensor is operated at irregular time intervals due to intermittent energy availability in energy-neutral or batteryless applications. In this work, we propose a compensation method which re-maps on-demand measurements to virtually duty-cycled readings in the value domain by taking the duration of the last off-time into account. We evaluate our compensation algorithm based on Sensirion's SGP30 sensor and achieve up to 79% accuracy improvement compared to uncompensated measurements.
Item identification is an important issue in modern supply chains where product items are traced by means of electronic tags that, despite the advantages they bring in terms of automation, are still subject to counter...
详细信息
In this paper, we propose a new approach where drones attain accurate localization by fusing information from artificial lighting and their embedded inertial and barometer sensors. Our system is able to provide accura...
详细信息
Flexible capacitive sensors are pervasive across multiple sectors, from healthcare to robotics. Although they offer better linearity and lower hysteresis, they require a large surface area to provide suitable sensitiv...
详细信息
the application of blockchain in the Internet of things (IoT) solves the problem of centralization, enables data interaction of IoT nodes in untrusted environments. However, most of the blockchain consensus protocols ...
详细信息
the big data platform based on cloud computing realizes the storage, analysis and processing of massive data, and provides users with more efficient, accurate and intelligent Internet services. Combined withthe chara...
详细信息
ISBN:
(数字)9781665408370
ISBN:
(纸本)9781665408387;9781665408370
the big data platform based on cloud computing realizes the storage, analysis and processing of massive data, and provides users with more efficient, accurate and intelligent Internet services. Combined withthe characteristics of college teaching resource sharing platform based on cloud computing mode, the multi-faceted security defense strategy of the platform is studied from security management, security inspection and technical means. In the detection module, the optimization of the support vector machine is realized, the detection period is determined, the DDoS data traffic characteristics are extracted, and the source ID blacklist is established;the triggering of the defense mechanism in the defense module, the construction of the forwarder forwarding queue and the forwarder forwarding capability are realized. Reallocation.
In smart grid, the internet of things (IoT) plays a crucial role, where wide band based wireless sensor networks (WSNs) are used to monitor the power lines. Different from traditional WSN, there exists serious interfe...
详细信息
Inkjet-printing of electrochemical sensors is a rapidly developing fabrication method. Careful selection of pre-processing methods, inkjet-printing parameters, and post-processing methods is crucial for the features o...
详细信息
Wireless power transfer (WPT) system-based charging for an electric vehicle (EV) is becoming popular among EV industries and researchers because of its attractive features. However, the WPT technology has many problem...
详细信息
During the combustion of natural gas, methane is released as a primary component, which can be used as a source for heating and electricity generation. Currently, industrial growth is causing a dramatic increase in me...
详细信息
暂无评论