The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a novel, industry-first approach to the deployment of a practical, edge analytics framework and describe the instantiation of a framework under challenging constraints within heterogeneous environments. We propose an approach for industry deployment where knowledge graphs are used to capture domain knowledge for reusability, maintainability, and data stream communication normalization for...
Smart materials are of growing interest in research as well as industry due to its wide range of possible applications. Combined with a mass production enabled manufacturing of these materials, its application is further increased. A current research project addresses the integration of piezo ceramic elements into metal sheets to develop a smart touch-alike input device. The aim is to develop a low-cost...
To conduct studies related to our planet and its atmosphere at high altitudes above 100 km from the ground requires to overcome great challenges. These studies can include meteorological, geographical and astrophysical missions. In this paper, we designed a high altitude unmanned semi-autonomous probe with helium gas balloon for general purpose near Earth space studies. Also hardware architecture...
Portable devices are nowadays largely used among people. These devices have a lot of potential in aiding visually impaired people on a daily basis. This paper presents an android application for smartphone, especially made to assist these persons. The application uses MEMS sensors from a smartphone and also the information received from a few external sensorial modules. The hardware modules form together...
Complex systems design requires a time-consuming verification process in support of the safety and maintenance requirements. In this paper, we describe an integrated verification flow of system requirements as well as system fault behaviors and fault-tolerant properties. The process converts XML-based architectural descriptions into SystemC simulation modules tied to predefined libraries. Flexible...
Small unmanned aircraft are being used in an increasing number of applications requiring cooperation between multiple heterogeneous vehicles. Multi-agent control algorithms can be implemented to control such systems but often require an underlying communications framework with integrated payloads. This paper presents a modular heterogeneous multi-agent control framework with payload integration. This...
WiFi networks are vulnerable to rogue AP attacks in which an attacker sets up an imposter AP to lure mobile users to connect. The attacker can eavesdrop on the communication, severely threatening users' privacy. Existing rogue AP detection solutions are confined to some specific attack scenarios (e.g., by relaying the traffic to a target AP) or require additional hardware. In this paper, we propose...
The article describes a low-cost and open IoT platform for rural applications in developing countries. Using the latest low-power, long-range radio technologies and off-the-shelves components, the platform can be quickly deployed and customized for a large variery of rural applications. We present in the article how a low-cost IoT collar device especially addressing the cattle rustling issues can...
Indoor positioning systems provide location information without the ability to use GPS. Indoor positioning faces challenges of accuracies and pervasiveness. In this paper, we present SilentWhistle, a mobile system that incorporates acoustic information and motion traces on smart phones to locate users. SilentWhistle does not expose the identity of a mobile device as does Bluetooth or Wi-Fi communications...
Internet of Things is the new revolution that is going to impact every facet of our lives. Internet of Things (IoT) is the new technology which includes the collection of Sensors, Actuators, processors and other development boards (eg. Raspberry pi, Arduino etc) to collect the data from different sources depending upon domain of application, process the acquired data before sending to distant cloud...
Wirelessly networked systems of implantable medical devices endowed with sensors and actuators will be the basis of many innovative, sometimes revolutionary therapies. The biggest obstacle in realizing this vision of networked implantable devices is posed by the dielectric nature of the human body, which strongly attenuates radio-frequency (RF) electromagnetic waves. In this paper we present the first...
This paper will discuss an embedded system for Structural Health Monitoring (SHM). The system designed is a working proof of concept prototype made for an SHM system using Piezoelectronic transducers as the sensors. The system uses pulse-echo and pitch-catch techniques to find the location of damage and the width of the damage. If damage is present, the system will generate an email and send to the...
Owing to charger noise, inaccurate touch points and fake touch points may happen so that a device has a wrong behavior. The intensity of charger noise could be much larger than that of original touch signals. Besides, the frequency of charger noise varies for each different charger. Therefore, industry identifies charger noise as the most difficult problem in capacitive touch applications. The solution...
TinyLink is a holistic system for rapid development of IoT applications. It adopts a top down approach for both hardware and software designs of IoT applications. Taking the application code as input, TinyLink automatically generates the hardware configuration as well as the software binary code executable on the targeted hardware platform. Objective of this demo is to present how the the hardware...
Deploying composite applications to Fog nodes in a QoS-and context-aware manner is challenging due to the heterogeneity and scale of Fog infrastructures. Application components must be provided with the software and hardware capabilities they need. Communication links that support interactions between components must meet certain QoS (latency and bandwidth). On the other hand, different Fog and Cloud...
An existing psycholinguistics experiment is extended with EEG measurement to analyze the spatiotemporal distribution of activities during a bilingual lexical access task. A low-cost custom trigger hardware was developed to provide event timestamps of the experiment stimulus and response to the EEG apparatus. The experiment was repeated on a subject group of 20 students, and our processing software...
In this paper we present the work in progress of WireMe IoT development platform, a simple way to deploy IoT systems in an intuitive approach. WireMe platforms' simplified software and hardware modules enables users to deploy personalized web interface and program their hardware modules to achieve their home automation tasks without having deep technical knowledge in either of the above domains, with...
The number of connected Internet of Things (IoT) devices was about 8.9 billion in 2012 and it is statistically estimated to grow up to 50 billion devices in the beginning of 2020. The security of the IoT plays an important role in the correct and advantageous functionality of the interconnected devices. For efficiency considerations, some of the IoT data processing is optimal to be implemented in...
The paper presents an example Sensor-cloud architecture that integrates security as its native ingredient. It is based on the multi-layer client-server model with separation of physical and virtual instances of sensors, gateways, application servers and data storage. It proposes the application of virtualised sensor nodes as a prerequisite for increasing security, privacy, reliability and data protection...
Exposure to safety-critical thinking grows in importance as society increasingly depends upon software to control physical devices with potential safety impacts. In this unique graduate capstone experience we engaged graduate Software Engineering students in the specification, design, implementation, validation, and assurance of potentially safety-critical software-intensive products involving physical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.