A micro diaphragm-based Extrinsic Fabry-Perot Interferometric (EFPI) pressure sensor with high temperature immunity is described. the EFPI pressure sensor consists of a single mode silica glass optical fiber, a glass ...
详细信息
ISBN:
(纸本)9781424443451
A micro diaphragm-based Extrinsic Fabry-Perot Interferometric (EFPI) pressure sensor with high temperature immunity is described. the EFPI pressure sensor consists of a single mode silica glass optical fiber, a glass capillary and a glass diaphragm, which are fused together using a conventional fusion splicer. this eliminates the need for the use of other joining materials, e.g. epoxy, allows any thermal mismatch between different materials to be almost completely eliminated and hence the sensor is capable of high temperature operation. In addition, the EFPI pressure sensor is cheap and relatively easy to produce as only splicing, polishing and wet etching are necessary. Moreover, due to its small size, a frequency response of several MHz can be achieved
We propose Risk Information Delivery (RID) System for natural hazard mitigation. A system design of the RID and result of experiment using a prototype of the RID are described. 69;2009 ieee.
the proceedings contain 28 papers. the topics discussed include: distributedcomputing in opportunistic environments;web of things as a framework for ubiquitous intelligence and computing;context-aware activity recogn...
ISBN:
(纸本)3642028292
the proceedings contain 28 papers. the topics discussed include: distributedcomputing in opportunistic environments;web of things as a framework for ubiquitous intelligence and computing;context-aware activity recognition through a combination of ontological and statistical reasoning;context-aware path planning in ubiquitous network;a framework to calibrate a MEMS sensor network;application domain driven data visualization framework for wireless sensor networks;hybrid Bluetooth scatter net routing;self-estimation of neighborhood density for mobile wireless nodes;NavTag: an inter-working framework based on tags for symbolic location coordinates for smart spaces;conflicting-set-based wormhole attack resistant localization in wireless sensor networks;novel and efficient identity-based authenticated key agreement protocols from weil pairings;implicit user re-authentication for mobile devices;lattice based privacy negotiation rule generation for context-aware service;and anticipative wrap-around inquiry method towards efficient RFID tag identification.
Fat content of liver is an essential parameter to decide whether a liver is suitable for transplantationor not. the determination of fat content is often challenging and usually there ist not enough time to bring a sp...
详细信息
ISBN:
(纸本)9781424443451
Fat content of liver is an essential parameter to decide whether a liver is suitable for transplantationor not. the determination of fat content is often challenging and usually there ist not enough time to bring a specimen to a pathologic laboratory. that is why transplantation clinics need a technique to measure the fat content of a graft. In this paper the theoretical basics and an existing laboratory setup are presented.
We consider dual classes of geometric coverage problems, in which disks, corresponding to coverage regions of sensors, are used to cover a region or set of points in the plane. the first class of problems involve assi...
详细信息
ISBN:
(纸本)9783642020841
We consider dual classes of geometric coverage problems, in which disks, corresponding to coverage regions of sensors, are used to cover a region or set of points in the plane. the first class of problems involve assigning radii to already-positioned sensors (being cheap). the second class of problems are motivated by the fact that the sensors may, because of practical difficulties, be positioned with only approximate accuracy (being flexible). this changes the character of some coverage problems that solve for optimal disk positions or disk sizes, ordinarily assuming the disks can be placed precisely in their chosen positions, and motivates new problems. Given a set of disk sensor locations, we show for most settings how to assign either (near-)optimal radius values or allowable amounts of placement error. Our primary results are 1) in the 1-d setting we give a faster dynamic programming algorithm for the (linear) sensor radius problem;and 2) we find a max-min fair set of radii for the 2-d continuous problems in polynomial time. We also give results for other settings, including fast approximation algorithms for the 1-d continuous case.
Certain popular wireless sensor network applications, including disaster recovery, battlefield communication and athlete monitoring, are characterized by extensive node mobility, intermittent contact between nodes and...
详细信息
ISBN:
(纸本)9781424451142
Certain popular wireless sensor network applications, including disaster recovery, battlefield communication and athlete monitoring, are characterized by extensive node mobility, intermittent contact between nodes and a highly dynamic network topology. Traditional routing protocols and security schemes are designed for essentially static networks and do not perform well in this case. this has given rise to a new multi-hop routing paradigm, that of "mobility-assisted" routing in which nodes make strategic data store-and-forward decisions on a per-hop basis. In this paper we discuss the security challenges relevant to mobility-assisted routing and propose a scheme to secure data communication between nodes in highly mobile sensor networks. Our solution utilizes symmetric-key encryption to ensure data confidentiality and varies encryption key in a verifiable, non-forgeable manner to allow easy authentication. this scheme also provides data freshness, semantic security and per-hop encryption to enable secure data aggregation. To validate our basic assumptions and fine-tune our scheme, we collect and analyze link connectivity statistics from a dynamic sensor network application, athlete monitoring during a first-division university soccer club match. We show that our scheme is well-suited for certain dynamic environments and serves as an effective first step towards securing communications for mobile sensor networks.
the ongoing advance in micro technologies gives rise to increasingly versatile and capable sensors as well as unprecedented computational power and communication options in diminishing scale. the notion of smart dust ...
详细信息
ISBN:
(纸本)9783642030390
the ongoing advance in micro technologies gives rise to increasingly versatile and capable sensors as well as unprecedented computational power and communication options in diminishing scale. the notion of smart dust summarizes ubiquitous computing and sensing application systems, which can serve for local as well as global information acquisition and decision making. For off-the-shelf-nodes, and even more for dedicated physical designs, the system design process becomes increasingly challenging and potentially intractable. Automated design methods emerging for intelligent systems are introduced as a remedy. these considerations will be extended to variations, that multiple system instances have to face in real-world applications and potential compensation by incorporation of self-x properties. these concepts are elucidated for the case of reconfigurable and evolvable sensor electronics. Finally, an application perspective of the presented approach for integrated distributed sensing in home automation, assisted living, and in particular, smart kitchen applications, denoted as culinary assistance systems will be presented.
Emulation sits between simulation and experimentation to complete the set of tools available for software designers to evaluate their software and predict behavior under conditions usually unachievable in a laboratory...
详细信息
ISBN:
(纸本)9781605584133
Emulation sits between simulation and experimentation to complete the set of tools available for software designers to evaluate their software and predict behavior under conditions usually unachievable in a laboratory experiment. It consists in running the real application in an emulated environment. thus, it behaves more realistically than a simulation, but under a, controlled and reproducible environment, more suitable for behavior analysis. In this paper, we propose an emulation platform for parallel and distributedsystems where boththe machines and the network are virtualized at a low level. We demonstrate that the use of virtual machines allows its to test highly accurate failure injection by "destroying" virtual machines. Failure accuracy is a criteria that demonstrates how realistic a fault is. the platform accuracy is evaluated using Pastry, a fault-tolerant distributed hash-table.
the ability to update or exchange the program code running on sensor nodes is a core requirement in many wireless sensor network scenarios. Such code update mechanisms must take the specific resource limitations of wi...
详细信息
Most previous localization and tracking systems in wireless sensor networks are based on RF signals, ultrasounds, and UWB. However, systems using RF signals suffer accuracy fluctuations and systems using ultrasound or...
详细信息
ISBN:
(纸本)9781424451142
Most previous localization and tracking systems in wireless sensor networks are based on RF signals, ultrasounds, and UWB. However, systems using RF signals suffer accuracy fluctuations and systems using ultrasound or UWB need extra hardware. In our paper, we propose to utilize light, an easily accessible and pervasive resource in our daily life, and off-the-shelf TelosB Motes to achieve the goal of stability and high accuracy in localization and tracking. the iTracking(1) system is a mobile light source location-tracking system based on light intensity. Our main contribution is the first demonstration to track mobile light sources based on light intensity with high accuracy, which may provide an alternative method for localization and tracking or inspire game designers. We examine point light based tracking and flashlight based tracking in our demonstrations, which proves these two main sources of light in our daily life can achieve centimeter-level location-tracking requirements. Our future work will focus on enabling the iTracking system to writing Chinese characters in flashlight.
暂无评论