The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last two decades, the increased production and installation of photovoltaic (PV) plants worldwide has asked for efficient low-cost methods for PV plant inspection to monitor their functionality and guaranteed their performance. To lower maintenance costs new systems have been thought to substitute human workers inspecting the PV plants. The employment of Unmanned Aerial Vehicles (UAVs) has...
This paper presents the beaconless multi-hop Decentralised Dissemination of Warnings (DDW) mechanism for micro-scale monitoring applications in urban environments. It is designed for a Vehicular Sensor Network (VSN) based on mobile nodes with limited resources. Mobile nodes sense and generate high pollution levels early warnings in near real-time. The warning messages are disseminated toward Static...
This article concern to systems that support the manage economical use of electricity. An advisory and monitoring system equipped with artificial intelligence for non-invasive on-line identification of electrical devices was proposed. Research has been done on the basic element of the system, which is the classifier module. As data describing the objects, the electrical quantities obtained from the...
We analyze the problem of secure communication over a wiretap channel with an active adversary, in which the legitimate transmitter has the opportunity to sense and learn the adversary's actions. Specifically, the adversary has the ability to switch between two channels and to observe the corresponding output at every channel use; the encoder, however, has causal access to observations impacted by...
This paper presents a wakeup receiver for latency-critical IoT applications in 90nm CMOS, which is fully compliant to many popular IoT wireless standards with constant envelope modulations, such as Bluetooth Low Energy and IEEE802.15.4. Paired with a standard-compliant transmitter, the proposed wakeup receiver method minimizes the overhead in system power, area and complexity. The proposed 2-dimensional...
Car drivers' sudden illness cause serious traffic accident. In Japan, it is reported by a medical doctor that the most of the illness causing serious traffic accident is induced by heart abnormalities. This situation is concerned along with coming aging society. Non-contact monitoring using a Doppler sensor is one of the attractive solutions for this matter since there is no need to put sensors on...
Vital signs, such as respiration and heartbeat, are useful to health monitoring since such signals provide important clues of medical conditions. Effective solutions are needed to provide contact-free, easy deployment, low-cost, and long-term vital sign monitoring. In this paper, we present PhaseBeat to exploit channel state information (CSI) phase difference data to monitor breathing and heartbeat...
As more knowledge is vastly added to the devices fuelling the Internet of Things (IoT) energy efficiency and real-time data processing are great challenges that must be tackled. In this paper, we introduce ADMin, a low-cost IoT framework that reduces on device energy consumption and the volume of data disseminated across the network. This is achieved by efficiently adapting the rate at which IoT devices...
Although the protection of ownership and the prevention of unauthorized manipulation of digital images becomes an important concern, there is also a big issue of image source origin authentication. This paper proposes a procedure for the identification of the image source and content by using the Public Key Cryptography Signature (PKCS). The procedure is based on the PKCS watermarking of the images...
Due to the partition/aggregate nature of many distributed cloud-based applications, incast traffic carried by TCP abounds in data center networks. TCP, being agnostic to such applications' traffic patterns and their delay-sensitivity, cannot cope with the resulting congestion events, leading to severe performance degradation. The co-existence of such incast traffic with other throughput-demanding...
An interference monitoring station is presented which detects, characterises and logs interference events. The system operates autonomously and continuously over multiple global navigation satellite system (GNSS) bands. With a bandwidth of up to 80 MHz, input resolution of 8 bit an overall data rate of approximately 1.3 Gbit/s can be supported. The interference detection is carried out in real-time,...
This paper presents an inductive power transfer system for implantable medical devices. The system features a DC/DC converter in transmitting side, and a load voltage monitoring circuit in receiving side, plus a communication mechanism that utilizes the power coils. The load voltage monitoring circuit detects the voltage on the load and once it is out of nominal range, an alert is sent to the transmitter...
Accurate and safe train position determination is of great importance for railway systems. Additionally, it has become one of the biggest challenges for the Safety-of-Life (SoL) services in railway transport systems using GNSS techniques. The critical performance requirements of these services promote the users to develop safe Train Positioning Systems (TPSs), in which integrity has to be highly concerned...
The article deals with method of spectral analysis of radio, which can be useful for receiving signals by undirected antenna. The main problem of this analysis is to find the central frequency of a sinusoidal oscillation when observed object is hidden in noise. Typically this problem is solved by estimation of unknown frequency by least square error method. In this paper, iterative technique that...
This paper describes a cloud based architecture which has been designed for the monitoring of Cultural Heritage buildings. The architecture has been deployed in museums and basements proving its capabilities. The solution is composed of small sensing nodes with volume lower than 8 cm3 and dimensions of 2.5 cm × 1.5 cm which are capable of acquiring temperature and relative humidity for interval in...
The capability of counting targets (people or things) in a monitored area is important for emerging wireless applications. To this aim, passive systems that rely on signals of opportunity and device-free targets are preferred to active systems that rely on dedicated or personal devices for preserving privacy and reducing implementation costs. This paper develops a framework for design and analysis...
One of the main challenges in mechatronics is to manage large amount of information data. This information is used to control the process, manage critical errors or perform maintenance actions. The traditional communication buses are wired buses which have great reliability. But with the revolution of industry 4.0, industry and mechatronic systems increased sensor and data acquisition nodes, from...
This paper presents details about the theoretical background as well as implementation of a GNSS interference monitoring system that can be used to continually monitor the GNSS frequency bands and thus alert users depending on the reliability of GNSS measurements. As shown in the results section, events of intentional GNSS interference are successfully detected and the system can also be used to classify...
Archived GPS ephemeris data for years 2000–2016 is investigated by cleansing and precision measures. The goal of this work was twofold: (1) to reveal and remove incorrect ephemeris data so that the cleansed data is as close to the real broadcasted data as possible, and (2) to analyse the quality of the cleansed data by comparing ephemeris based satellite locations to true locations. Our findings show...
To address the ever-increasing demand for highseed interconnectivity between VLSI systems, the emerging IEEE 802.3bs and CEI-56G standards support a maximum data rate of 400Gb/s. A significant challenge at these data rates is overcoming the bit errors caused by intersymbol interference (ISI) in bandwidth-limited legacy channels. To reduce the bandwidth limitation by half, 4-level pulse amplitude modulation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.