The application of intelligent systems composed by smart cameras is continuously spreading in a wide range of applications, playing a key role in public, military and commercial scenarios. As well, in the last years, ...
详细信息
ISBN:
(纸本)9781424447558
The application of intelligent systems composed by smart cameras is continuously spreading in a wide range of applications, playing a key role in public, military and commercial scenarios. As well, in the last years, the capability of Wireless sensor Networks to collect information from the environment in a distributed manner has been successfully applied in both civilian and military applications. In this paper, basing on recent studies on autonomous cognitive systems, we explore the concepts for designing interactive, adaptable and intelligent multi-sensor surveillance systems able to react to situations in a preventive way by using actuators placed in the monitored environment. To this end, taking inspiration from Ambient Intelligence (AmI) and Cognitive Radio (CR) paradigms, fusion of information provided by heterogeneous sensors is used to improve awareness regarding surrounding environment.
This Wireless sensor Network is a network of devices that communicates the information gathered from a monitored field through wireless links. Small size sensor nodes constitute wireless sensor networks. A sensor is a...
详细信息
ISBN:
(纸本)9781538695333
This Wireless sensor Network is a network of devices that communicates the information gathered from a monitored field through wireless links. Small size sensor nodes constitute wireless sensor networks. A sensor is a device that responds and detects some type of input from both the physical or environmental conditions, such as pressure, heat, light, etc. applications of wireless sensor networks include home automation, street lighting, military, healthcare and industrial process monitoring. As wireless sensor networks are distributed across large geographical area, these are vulnerable to various security threats. This affects the performance of the wireless sensor networks. The impact of security issues will become more critical if the network is used for mission-critical applications like tactical battlefield. In real life deployment scenarios, the probability of failure of nodes is more. As a result of resource constraints in the sensor nodes, traditional methods which involve large overhead computation and communication are not feasible in WSNs. Hence, design and deployment of secured WSNs is a challenging task. Attacks on WSNs include attack on confidentiality, integrity and availability. There are various types of architectures that are used to deploy WSNs. Some of them are data centric, hierarchical, location based, mobility based etc. This work discusses the security issue of hierarchical architecture and proposes a solution. In hierarchical architectures, sensor nodes are grouped to form clusters. Intra-cluster communication happens through cluster heads. Cluster heads also facilitate inter-cluster communication with other cluster heads. Aggregation of data generated by sensor nodes is done by cluster heads. Aggregated data also get transferred to base through multi-hop approach in most cases. Cluster heads are vulnerable to various malicious attacks and this greatly affects the performance of the wireless sensor network. The proposed solution identifies a
As technology advances, and component and system costs drop, fiber optic and other sensor system applications are expected to proliferate, expanding from niche uses focused on high-value assets to increasing employmen...
详细信息
ISBN:
(纸本)9781479904648
As technology advances, and component and system costs drop, fiber optic and other sensor system applications are expected to proliferate, expanding from niche uses focused on high-value assets to increasing employment in consumer products and everyday life.
As sensor networks grow the amount of sensor measurements increases. This large amount of data is crucial for monitoring systems but useless if it is not trustworthy. In this paper different approaches for the validat...
详细信息
ISBN:
(纸本)9780769539515
As sensor networks grow the amount of sensor measurements increases. This large amount of data is crucial for monitoring systems but useless if it is not trustworthy. In this paper different approaches for the validation of sensor measurements using standardized encodings and services specified by the Open Geospatial Consortium (OGC) are discussed. Approaches based on current OGC specifications for sensor Web Enablement (SWE) are discussed and their drawbacks are identified. Based on these drawbacks a new architecture for in-stream validation of sensor measurements is introduced. This new approach uses event processing techniques and is based on encodings and services proposed in an OGC SWE discussion paper.
The paper presents a model for the virtualization of a wireless sensor network in a smart home application for energy consumption monitoring. By correlating physical sensor data with information on home's design, ...
详细信息
ISBN:
(纸本)9781728140681
The paper presents a model for the virtualization of a wireless sensor network in a smart home application for energy consumption monitoring. By correlating physical sensor data with information on home's design, sunrise and sunset time according to day of year, time of day and weather data, novel services for consumed power statistics and efficiency of use of natural light were developed in the virtualized environment. Based on this model, distributed applications were developed to implement analysis of energy consumption over large scale areas. We detail the solution implementation based on the OpenSHS simulator and NodeRed.
The development of modern driver assistance systems in the automotive domain requires extensive testing, for safety as well as for legal reasons. This is especially the case for sensor-based systems that provide suppo...
详细信息
ISBN:
(纸本)9781509028191
The development of modern driver assistance systems in the automotive domain requires extensive testing, for safety as well as for legal reasons. This is especially the case for sensor-based systems that provide support for autonomous driving: if they fail, an accident may occur with fatal consequences. In the majority of cases, the required test effort is roughly estimated by means of previous project data, expert knowledge or based on economical factors. As an alternative, a general mathematical approach is presented in this paper, which is focused on black box systems with sensor data fusion. It enables new projects related with sensor data fusion to estimate the required test effort for a given scenario.
For practical automated diagnostic systems to continue functioning after failure, they must not only be able to diagnose sensor failures but also be able to tolerate the absence of data from the faulty sensors. We sho...
详细信息
For practical automated diagnostic systems to continue functioning after failure, they must not only be able to diagnose sensor failures but also be able to tolerate the absence of data from the faulty sensors. We show that conventional (associational) diagnostic methods will have combinatoric problems when trying to isolate faulty sensors, even if they adequately diagnose other components. Moreover, attempts to extend the operation of diagnostic capability past sensor failure will necessarily compound those difficulties. By contrast, the algorithmic methods of model-based reasoning have no special problems diagnosing faulty sensors and can operate gracefully when sensor data is missing.
EyePod is a compact survey and inspection day/night imaging sensor suite for small unmanned aircraft systems (UAS). EyePod generates georeferenced image products in real-time from visible near infrared (VNIR) and long...
详细信息
ISBN:
(纸本)9780819481320
EyePod is a compact survey and inspection day/night imaging sensor suite for small unmanned aircraft systems (UAS). EyePod generates georeferenced image products in real-time from visible near infrared (VNIR) and long wave infrared (LWIR) imaging sensors and was developed under the ONR funded FEATHAR (Fusion, Exploitation, Algorithms, and Targeting for High-Altitude Reconnaissance) program. FEATHAR is being directed and executed by the Naval Research Laboratory (NRL) in conjunction with the Space Dynamics Laboratory (SDL) and FEATHAR's goal is to develop and test new tactical sensorsystems specifically designed for small manned and unmanned platforms (payload weight < 50 lbs). The EyePod suite consists of two VNIR/LWIR (day/night) gimbaled sensors that, combined, provide broad area survey and focused inspection capabilities. Each EyePod sensor pairs an HD visible EO sensor with a LWIR bolometric imager providing precision geo-referenced and fully digital EO/IR NITFS output imagery. The LWIR sensor is mounted to a patent-pending jitter-reduction stage to correct for the high-frequency motion typically found on small aircraft and unmanned systems. Details will be presented on both the wide-area and inspection EyePod sensorsystems, their modes of operation, and results from recent flight demonstrations.
In a previous paper we had described a novel concept on ultra-small, ultra-compact, unattended multiphenomenological sensorsystems for rapid deployment, with integrated classification-and-decision-information extract...
详细信息
ISBN:
(纸本)0819457817
In a previous paper we had described a novel concept on ultra-small, ultra-compact, unattended multiphenomenological sensorsystems for rapid deployment, with integrated classification-and-decision-information extraction capability from the sensed environment. Specifically, we had proposed placing such integrated capability on a 3-D Heterogeneous System on a Chip (HSoC). This paper amplifies two key aspects of that future sensor technology. These are the creation of inter-layer vias by high aspect ratio MPS (Macro Porous Silicon) process, and the adaptation of the TESH (Tori connected mESHes) network to bind the diverse leaf nodes on multiple layers of the 3-D structure. Interesting also is the inter-relationship between these two aspects. In particular, the issue of overcoming via failures, catastrophic as well as high-resistance failures, through the existence of alternative paths in the TESH network and corresponding routing strategies is discussed. A probabilistic model for via failures is proposed and the testing of the vias between the sensor layer and the adjacent processing layer is discussed.
Research into the development of advanced RF electronics and devices having high-Temperature Superconducting (HTS) circuitry is being carried out in the Cryogenic Exploitation of RF (CERF) laboratory at SPAWAR systems...
详细信息
ISBN:
(纸本)9781628415834
Research into the development of advanced RF electronics and devices having high-Temperature Superconducting (HTS) circuitry is being carried out in the Cryogenic Exploitation of RF (CERF) laboratory at SPAWAR systems Center (SSC) - Pacific. Recently, we have developed a novel annealing process wherein a film of YBa2Cu3Ox is produced having a gradient of oxygen composition along a given direction which we refer to as YBa2Cu3O del x. Such samples are intended for rapid experimental investigation of the evolution of electronic properties within the compound and in combination with structurally compatible functional oxide materials as integrated sensor devices. We present here an investigation as to the extent to which local oxygen content affects the ion milling process in the formation of Josephson junctions in the HTS compound YBa2Cu3O del x. We find an abrupt transition in the profile and depth of ion milled trenches at oxygen concentrations at and below the well ordered oxygen level, O-6:72. The method described here shows good potential for use in the fabrication of large numbers of uniform Josephson junctions in films of YBa2Cu3Ox, as either a complementary processing tool for grain boundary, step edge, or ion damaged formed JJs, or as a stand alone method for producing nano-bridge JJ's.
暂无评论