In typical settings for Wireless Sensor networks (WSNs), a potentially large set of nodes operates under strict requirements concerning energy consumption and packet delivery success. If non-reliable or even malicious...
详细信息
In typical settings for Wireless Sensor networks (WSNs), a potentially large set of nodes operates under strict requirements concerning energy consumption and packet delivery success. If non-reliable or even malicious nodes participate, standard protocols can suffer in performance which may result in a limited functionality of the whole network. This paper addresses this issue by establishing end-to-end trust relationships among nodes with the goal to isolate malicious nodes. In order to increase the scalability towards large-scale system sizes, we extend the mechanism with an adaptive signature mechanism as basis for the trust value distribution technique. Evaluations cover a theoretical discussion and a simulation-based setting. The results show that malicious nodes can be quickly isolated. Thereby, the already low additional effort for trust can be reduced significantly compared to reference solutions.
Advances in autonomous driving and the introduction of automated valet parking allow the optimization of parking space. A future concept is high density valet parking with the potential to either reduce the extensive ...
详细信息
ISBN:
(纸本)9781509048052
Advances in autonomous driving and the introduction of automated valet parking allow the optimization of parking space. A future concept is high density valet parking with the potential to either reduce the extensive land use for parking or increase the capacity of existing parking facilities. This paper presents a novel approach that integrates high density parking into an existing parking lot, by explicitly making use of parking in the driving lane and reducing the shunting operations per vehicle. The proposed parking scheme allows vehicles to park either perpendicular to the driveway or in double-ended queues with k parking spots (k-deque) on the side of the driving lane. Leveraging the potential of such a layout increases the capacity of a parking lot by up to 25%, while keeping the maximum number of shunts per car below [k/2]+1 between entry and exit. A dynamic simulation verifies the theoretical analysis and compares the performance of different deque lengths with respect to the distances traveled and the number of shunts per vehicle.
Heating, ventilation and air conditioning (HVAC) systems in a production environment ensure safe and comfortable environmental conditions and require a significant amount of final energy in the industry. In this paper...
详细信息
The fault-tolerant character of WSN protocols and applications that do not assume completely reliable systems legitimize undervolting - a highly efficient energy management technique where the supply voltage is set be...
详细信息
ISBN:
(纸本)9781509014613
The fault-tolerant character of WSN protocols and applications that do not assume completely reliable systems legitimize undervolting - a highly efficient energy management technique where the supply voltage is set below the minimum specifications. As has been shown in earlier work, by using thereliable IdealVolting undervolting scheme the lifetime of WSN applications can be increased significantly while keeping the node in a safe state even under rough environmental conditions. To show the usability of undervolting in a real world WSN deployment, we performed a long-term study of IdealVolting in a Smart Farming application. All measurements were performed on a generic outdoor testbed for WSNs (PotatoNet) which is also presented within this paper. We collected a long-term dataset of a WSN running for one farming season on a potato fieldto compare the reliability and performance characteristics of IdealVolting against a regular powered WSN.
This paper shows that the genetic algorithm can be used to solve the delay-constrained least-cost least-inter-destination-delay-variation multicast problem efficiently. The proposed genetic algorithm performs well whe...
This paper shows that the genetic algorithm can be used to solve the delay-constrained least-cost least-inter-destination-delay-variation multicast problem efficiently. The proposed genetic algorithm performs well when the number of destination nodes is small relative to the size of the network.
Heating, ventilation and air conditioning (HVAC) systems in a production environment ensure safe and comfortable environmental conditions and require a significant amount of final energy in the industry. In this paper...
详细信息
Heating, ventilation and air conditioning (HVAC) systems in a production environment ensure safe and comfortable environmental conditions and require a significant amount of final energy in the industry. In this paper a complete cyber-physical HVAC system is presented, which is implemented in an incremental production environment to ensure these conditions. Incremental manufacturing is a concept for a flexible production system that combines additive manufacturing, subtractive manufacturing processes and other production technologies. With the cyber-physical HVAC system, energy efficiency, air quality and thermal conditions can be improved in the incremental production environment, by providing decision support, greater transparency and enabling model-predictive control in real time.
With the ongoing growth of the Internet, a reliable communications infrastructure becomes more and more important. To monitor large networks, asynchronous notifications are needed to inform management systems about cr...
详细信息
With the ongoing growth of the Internet, a reliable communications infrastructure becomes more and more important. To monitor large networks, asynchronous notifications are needed to inform management systems about critical events. The SNMP framework provides Traps which have been used for monitoring successfully for many years. However, due to shortcomings of SNMP, XML and Web services get more and more attention from the network management community. If the new technologies should replace the existing ones, they must also provide asynchronous notifications. In this paper, we describe notification solutions in traditional as well as in new management frameworks. Moreover, we compare them with a simple approach based on Web services we have implemented.
Age-related falls are a widespreaded and expensive issue of society and with this a big challenge of gerontological research. Hence we present INBED - an inexpensive, modular and body-worn (medio-femoral) fall prevent...
Age-related falls are a widespreaded and expensive issue of society and with this a big challenge of gerontological research. Hence we present INBED - an inexpensive, modular and body-worn (medio-femoral) fall prevention system. Compared to existing solutions, INBED offers a more proper solution to prevent falls in clinical and elderly care environments.
The INBED detects several events such as getting up from a sitting or lying position. These events are broadcasted wirelessly to notify the nursing stuff, so that they can assist the respective care recipient accordingly. In further consequence, highly critical fall events can be avoided due to the early alert of the nursing staff. The INBED can replace the commonly used belt or bed rail systems for high risk fall patients. Thus, the personal range of movement and the self-determination of the patient will be supported without reducing the sense of protection. INBED itself is a approx. 2x2cm wearable device that contains several sensors, a microcontroller unit and a wireless radio transceiver.
Development objectives were:
- development of a reliable and cost-effective solution for a sensor-based uprise-detection for fall prevention established by first research results with different sensor prototypes.
- apart from the function of immediate uprise-detection, the system can also recognize states of restlessness occurring in advance of patient’s rising, so that the caregiver can intervene before the first uprise.
- in addition to above-mentioned functions, the system can be used to implement a virtual fence. Patients can be protected from risk areas, e.g. stairs, by sending a dedicated event.
暂无评论