• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 285
  • 88
  • 46
  • 37
  • 27
  • 13
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 592
  • 592
  • 470
  • 104
  • 87
  • 82
  • 81
  • 81
  • 79
  • 64
  • 63
  • 61
  • 55
  • 49
  • 49
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Ubiquitous healthcare system based on a wireless sensor network

Chung, W.-Y. (Wan-Young) 17 November 2009 (has links)
Abstract This dissertation aimed at developing a multi-modal sensing u-healthcare system (MSUS), which reflects the unique properties of a healthcare application in a wireless sensor network. Together with health parameters, such as ECG, SpO2 and blood pressure, the system also transfers context-aware data, including activity, position and tracking data, in a wireless sensor network environment at home or in a hospital. Since packet loss may have fatal consequences for patients, health-related data are more critical than most other types of monitoring data. Thus, compared to environmental, agricultural or industrial monitoring, healthcare monitoring in a wireless environment imposes different requirements and priorities. These include heavy data traffic with wavelike parameters in wireless sensor network and fatal data loss due to the traffic. To ensure reliable data transfer in a wireless sensor network, this research placed special emphasis on the optimization of sampling rate, packet length and transmission rate, and on the traffic reduction method. To improve the reliability and accuracy of diagnosis, the u-healthcare system also collects context-aware information on the user’s activity and location and provides real-time tracking. Waveform health parameters, such as ECG, are normally sampled in the 100 to 400 Hz range according to the monitoring purpose. This type of waveform data may incur a heavy burden in wireless communication. To reduce wireless traffic between the sensor nodes and the gateway node, the system utilizes on-site ECG analysis implemented on the sensor nodes as well as query architecture. A 3D VRML viewer was also developed for the realistic monitoring of the user’s moving path and location. Two communication methods, an 802.15.4-based wireless sensor network and a CDMA cellular network are used by sensors placed on the users’ bodies to gather medical data, which is then transmitted to a server PC at home or in the hospital, depending on whether the sensor is within or outside the range of the wireless sensor network.
232

A trust-based adaptive access control model for wireless sensor networks

Maw, Htoo Aung January 2015 (has links)
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, fitting patients with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and others to continuously monitor the state of those in their care. In the healthcare industry, patients are expected to be treated in reasonable time and any loss in data availability can result in further decline in the patient's condition or can even lead to death. Therefore, the availability of data is more important than security concerns. The overwhelming priority is to take care of the patient, but the privacy and confidentiality of that patient's medical records cannot be neglected. In current healthcare applications, there are many problems concerning security policy violations such as unauthorised denial of use, unauthorised information modification and unauthorised information release of medical data in the real world environment. Current WSN access control models used the traditional Role-Based Access Control (RBAC) or cryptographic methods for data access control but the systems still need to predefine attributes, roles and policies before deployment. It is, however, difficult to determine in advance all the possible needs for access in real world applications because there may be unanticipated situations at any time. This research proceeds to study possible approaches to address the above issues and to develop a new access control model to fill the gaps in work done by the WSN research community. Firstly, the adaptive access control model is proposed and developed based on the concept of discretionary overriding to address the data availability issue. In the healthcare industry, there are many problems concerning unauthorised information release. So, we extended the adaptive access control model with a prevention and detection mechanism to detect security policy violations, and added the concept of obligation to take a course of action when a restricted access is granted or denied. However, this approach does not consider privacy of patients' information because data availability is prioritised. To address the conflict between data availability and data privacy, this research proposed the Trust-based Adaptive Access Control (TBA2C) model that integrates the concept of trust into the previous model. A simple user behaviour trust model is developed to calculate the behaviour trust value which measures the trustworthiness of the users and that is used as one of the defined thresholds to override access policy for data availability purpose, but the framework of the TBA2C model can be adapted with other trust models in the research community. The trust model can also protect data privacy because only a user who satisfies the relevant trust threshold can get restricted access in emergency and unanticipated situations. Moreover, the introduction of trust values in the enforcement of authorisation decisions can detect abnormal data access even from authorised users. Ponder2 is used to develop the TBA2C model gradually, starting from a simple access control model to the full TBA2C. In Ponder2, a Self-Managed Cell (SMC) simulates a sensor node with the TBA2C engine inside it. Additionally, to enable a full comparison with the proposed TBA2C model, the Break-The-Glass Role Based Access Control (BTGRBAC) model is redesigned and developed in the same platform (Ponder2). The proposed TBA2C model is the first to realise a flexible access control engine and to address the conflict between data availability and data privacy by combining the concepts of discretionary overriding, the user behaviour trust model, and the prevention and detection mechanism.
233

Smart renewable energy : architectures, dimensioning and monitoring

Erasmus, Zenville January 2017 (has links)
>Magister Scientiae - MSc / The Smart Renewable Energy project at the University of The Western Cape, under the guidance of the Intelligent Systems and Advanced Telecommunication (ISAT) group, aims at developing a dynamic system that enables users to (1) design smart architectures for next generation wind and solar systems to meet African power challenges (2) use these architectures to dimension the underlying solar and wind power systems and (3) simulate, implement and evaluate the performance of such power systems. The project's existing web and mobile monitoring system will undergo a much needed upgrade to cater for monitoring of the existing system's environmental and battery bank parameters. This will be implemented by allowing users to monitor input, storage and output trends over various time frames. These time frames would include hourly, daily, weekly and monthly readings. The visual evaluation of the system will be generated by mathematical, statistical and machine learning techniques. Trends will be discovered that will allow users to optimize the system's efficiency and their usage patterns. The accompanied dimensioning system will allow users to cater for their needs in a two way fashion. Users will be able to specify the number of devices that they want to run from a solar or wind based system and their power needs will be generated. They will also be able to determine what a given system is capable of producing and the number of devices that can be used simultaneously, as a result. / National Research Foundation (NRF) and Namibia Students Financial Assistance Fund (NSFAF)
234

Structural Data Acquisition Using Sensor Network

Chidambar Munavalli, Sainath 16 April 2013 (has links)
The development cost of any civil infrastructure is very high; during its life span, the civil structure undergoes a lot of physical loads and environmental effects which damage the structure. Failing to identify this damage at an early stage may result in severe property loss and may become a potential threat to people and the environment. Thus, there is a need to develop effective damage detection techniques to ensure the safety and integrity of the structure. One of the Structural Health Monitoring methods to evaluate a structure is by using statistical analysis. In this study, a civil structure measuring 8 feet in length, 3 feet in diameter, embedded with thermocouple sensors at 4 different levels is analyzed under controlled and variable conditions. With the help of statistical analysis, possible damage to the structure was analyzed. The analysis could detect the structural defects at various levels of the structure.
235

Mining Dynamic Recurrences in Nonlinear and Nonstationary Systems for Feature Extraction, Process Monitoring and Fault Diagnosis

Chen, Yun 07 April 2016 (has links)
Real-time sensing brings the proliferation of big data that contains rich information of complex systems. It is well known that real-world systems show high levels of nonlinear and nonstationary behaviors in the presence of extraneous noise. This brings significant challenges for human experts to visually inspect the integrity and performance of complex systems from the collected data. My research goal is to develop innovative methodologies for modeling and optimizing complex systems, and create enabling technologies for real-world applications. Specifically, my research focuses on Mining Dynamic Recurrences in Nonlinear and Nonstationary Systems for Feature Extraction, Process Monitoring and Fault Diagnosis. This research will enable and assist in (i) sensor-driven modeling, monitoring and optimization of complex systems; (ii) integrating product design with system design of nonlinear dynamic processes; and (iii) creating better prediction/diagnostic tools for real-world complex processes. My research accomplishments include the following. (1) Feature Extraction and Analysis: I proposed a novel multiscale recurrence analysis to not only delineate recurrence dynamics in complex systems, but also resolve the computational issues for the large-scale datasets. It was utilized to identify heart failure subjects from the 24-hour heart rate variability (HRV) time series and control the quality of mobile-phone-based electrocardiogram (ECG) signals. (2) Modeling and Prediction: I proposed the design of stochastic sensor network to allow a subset of sensors at varying locations within the network to transmit dynamic information intermittently, and a new approach of sparse particle filtering to model spatiotemporal dynamics of big data in the stochastic sensor network. It may be noted that the proposed algorithm is very general and can be potentially applicable for stochastic sensor networks in a variety of disciplines, e.g., environmental sensor network and battlefield surveillance network. (3) Monitoring and Control: Process monitoring of dynamic transitions in complex systems is more concerned with aperiodic recurrences and heterogeneous types of recurrence variations. However, traditional recurrence analysis treats all recurrence states homogeneously, thereby failing to delineate heterogeneous recurrence patterns. I developed a new approach of heterogeneous recurrence analysis for complex systems informatics, process monitoring and anomaly detection. (4) Simulation and Optimization: Another research focuses on fractal-based simulation to study spatiotemporal dynamics on fractal surfaces of high-dimensional complex systems, and further optimize spatiotemporal patterns. This proposed algorithm is applied to study the reaction-diffusion modeling on fractal surfaces and real-world 3D heart surfaces.
236

Data Security in Unattended Wireless Sensor Networks

Vepanjeri Lokanadha Reddy, Sasi Kiran January 2013 (has links)
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deployed in environments where it is not practical for the sink to be online all the time. Saving data in the memory of the nodes for a long time causes security problems due to the lack of tamper-resistant hardware. Data collected by the nodes has to be secured until the next visit of the sink. Securing the data from an adversary in UWSN is a challenging task. We present two non-cryptographic algorithms (DS-PADV and DS-RADV) to ensure data survivability in mobile UWSN. The DS-PADV protects against proactive adversary which compromises nodes before identifying its target. DS-RADV makes the network secure against reactive adversary which compromises nodes after identifying the target. We also propose a data authentication scheme against a mobile adversary trying to modify the data. The proposed data authentication scheme uses inexpensive cryptographic primitives and few message exchanges. The proposed solutions are analyzed both mathematically and using simulations proving that the proposed solutions are better than the previous ones in terms of security and communication overhead.
237

A Proactive Risk-Aware Robotic Sensor Network for Critical Infrastructure Protection

McCausland, Jamieson January 2014 (has links)
In this thesis a Proactive Risk-Aware Robotic Sensor Network (RSN) is proposed for the application of Critical Infrastructure Protection (CIP). Each robotic member of the RSN is granted a perception of risk by means of a Risk Management Framework (RMF). A fuzzy-risk model is used to extract distress-based risk features and potential intrusion-based risk features for CIP. Detected high-risk events invoke a fuzzy-auction Multi-Robot Task Allocation (MRTA) algorithm to create a response group for each detected risk. Through Evolutionary Multi-Objective (EMO) optimization, a Pareto set of optimal robot configurations for a response group will be generated using the Non-Dominating Sorting Genetic Algorithm II (NSGA-II). The optimization objectives are to maximize sensor coverage of essential spatial regions and minimize the amount of energy exerted by the response group. A set of non-dominated solutions are produced from EMO optimization for a decision maker to select a single response. The RSN response group will re-organize based on the specifications of the selected response.
238

Localized Ant Colony of Robots for Redeployment in Wireless Sensor Networks

Wang, Yuan January 2014 (has links)
Sensor failures or oversupply in wireless sensor networks (WSNs), especially initial random deployment, create both spare sensors (whose area is fully covered by other sensors) and sensing holes. We envision a team of robots to relocate sensors and improve their area coverage. Existing algorithms, including centralized ones and the only localized G-R3S2, move only spare sensors and have limited improvement because non-spare sensors, with area coverage mostly overlapped by neighbour sensors, are not moved, and additional sensors are deployed to fill existing holes. We propose a localized algorithm, called Localized Ant-based Sensor Relocation Algorithm with Greedy Walk (LASR-G), where each robot may carry at most one sensor and makes decision that depends only on locally detected information. In LASR-G, each robot calculates corresponding pickup or dropping probability, and relocates sensor with currently low coverage contribution to another location where sensing hole would be significantly reduced. The basic algorithm optimizes only area coverage, while modified algorithm includes also the cost of robot movement. We compare LASR-G with G-R3S2, and examine both single robot and multi robots scenarios. The simulation results show the advantages of LASR-G over G-R3S2.
239

Distributed spatial analysis in wireless sensor networks

Jabeen, Farhana January 2011 (has links)
Wireless sensor networks (WSNs) allow us to instrument the physical world in novel ways, providing detailed insight that has not been possible hitherto. Since WSNs provide an interface to the physical world, each sensor node has a location in physical space, thereby enabling us to associate spatial properties with data. Since WSNs can perform periodic sensing tasks, we can also associate temporal markers with data. In the environmental sciences, in particular, WSNs are on the way to becoming an important tool for the modelling of spatially and temporally extended physical phenomena. However, support for high-level and expressive spatial-analytic tasks that can be executed inside WSNs is still incipient. By spatial analysis we mean the ability to explore relationships between spatially-referenced entities (e.g., a vineyard, or a weather front) and to derive representations grounded on such relationships (e.g., the geometrical extent of that part of a vineyard that is covered by mist as the intersection of the geometries that characterize the vineyard and the weather front, respectively). The motivation for this endeavour stems primarily from applications where important decisions hinge on the detection of an event of interest (e.g., the presence, and spatio-temporal progression, of mist over a cultivated field may trigger a particular action) that can be characterized by an event-defining predicate (e.g., humidity greater than 98 and temperature less than 10). At present, in-network spatial analysis in WSN is not catered for by a comprehensive, expressive, well-founded framework. While there has been work on WSN event boundary detection and, in particular, on detecting topological change of WSN-represented spatial entities, this work has tended to be comparatively narrow in scope and aims. The contributions made in this research are constrained to WSNs where every node is tethered to one location in physical space. The research contributions reported here include (a) the definition of a framework for representing geometries; (b) the detailed characterization of an algebra of spatial operators closely inspired, in its scope and structure, by the Schneider-Guting ROSE algebra (i.e., one that is based on a discrete underlying geometry) over the geometries representable by the framework above; (c) distributed in-network algorithms for the operations in the spatial algebra over the representable geometries, thereby enabling (i) new geometries to be derived from induced and asserted ones, and (ii)topological relationships between geometries to be identified; (d) an algorithmic strategy for the evaluation of complex algebraic expressions that is divided into logically-cohesive components; (e) the development of a task processing system that each node is equipped with, thereby with allowing users to evaluate tasks on nodes; and (f) an empirical performance study of the resulting system.
240

Analisador de redes wirelesshart

Lorençato, Alexandre de Andrade January 2013 (has links)
A segurança da informação, a diversidade de rotas entre os dispositivos da rede, o acesso ao meio de modo determinístico e isento de colisões e a mudança de canal frequente tornam a comunicação no protocolo WirelessHART robusta e confiável para utilização em meio industrial. Entretanto, para adoção crescente dessa tecnologia, é necessário que os fabricantes de sensores e atuadores industriais desenvolvam dispositivos WirelessHART. Disto surge a necessidade de criação de ferramentas capazes de auxiliar o desenvolvimento e depuração destes novos dispositivos de rede. O Analisador de rede WirelessHART é, sem dúvida, uma delas. Diversas abordagens são propostas para a análise de redes WirelessHART. Entretanto, em todas elas a utilização de um microcomputador como elemento do sistema inviabiliza sua utilização em campo. A presença de cabos, armazenamento local dos dados e exigência de baterias são alguns dos aspectos relevantes que devem ser levados em consideração quando o sistema precisa ser utilizado em campo. O presente trabalho propõe alternativas aos sistemas de análise de redes atuais apresentando duas propostas conceitualmente diferentes mas que cumprem os requisitos básicos para sua utilização em campo. Uma destas abordagens, baseada na proposta de integração entre um dispositivo de campo e o método inovador de captura de mensagens utilizando apenas um transceptor, é implementado como prova do conceito. / WirelessHART is a robust and reliable protocol for industrial environment usage because of its secure mechanism, the ability of programming several communication routes between network devices, and deterministic, free of collisions channel hopping medium access controller. However, in order to increase the adoption of this technology, it is necessary to increase the amount of WirelessHART manufacturers to develop industrial sensors and actuators devices. This leads to the necessity of create tools that will assist the development and debugging of new network compliant devices. The WirelessHART network analyzer is undoubtedly one of these tools. Various approaches are being proposed for the analysis of WirelessHART networks. However, all of them make use of a microcomputer as an element of the whole system and this difficults their use in real field applications. The presence of wires, lack of local data storage and other aspects such as batteries limitations must be considered when the users intend to use analysis systems in field. This work proposes alternatives to current analysis networks systems by presenting two conceptually different proposals that meet the basic requirements for the use in the field. One of them is based on the proposed integration between a field device and an innovative method of capturing messages using only one transceiver, which is implemented as proof of concept.

Page generated in 0.0323 seconds