Pub Date : 2011-03-28DOI: 10.1109/SAS.2011.5739765
N. H. Lu
Many radio applications require a Signal-to-Noise Ratio (SNR) Enhancer to combat the radio channel impairments. In this paper, we are particularly interested in combating the radio channel impairments resulted from long-term and short-term channel variations. The SNR Enhancer pre-conditions the received signal strength (RSS) of the signal such that the SNR of the signal is increased; hence the system performance may be improved. This paper derives the achievable performance of possible approaches, and compares the performance characteristics of the approaches. The results indicate the Maximum RSS approach outperforms the Average RSS approach for the applications intended‥
{"title":"A Signal-to-Noise Ratio Enhancer","authors":"N. H. Lu","doi":"10.1109/SAS.2011.5739765","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739765","url":null,"abstract":"Many radio applications require a Signal-to-Noise Ratio (SNR) Enhancer to combat the radio channel impairments. In this paper, we are particularly interested in combating the radio channel impairments resulted from long-term and short-term channel variations. The SNR Enhancer pre-conditions the received signal strength (RSS) of the signal such that the SNR of the signal is increased; hence the system performance may be improved. This paper derives the achievable performance of possible approaches, and compares the performance characteristics of the approaches. The results indicate the Maximum RSS approach outperforms the Average RSS approach for the applications intended‥","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132551395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-28DOI: 10.1109/SAS.2011.5739794
Benjamin Peiffer, A. Kruger
Researchers at The University of Iowa have encountered the need for an efficient 1-wire communication protocol for use in embedded systems and distributed wired sensors. One possible solution for this problem is the use of a Wired Code Division Multiple Access (CDMA). Although this approach has been investigated before, a key simplification can made with the use of a binary wired-OR channel. This paper develops the theory for such a protocol, including a mathematical formulation of the Bit Error Rate, and describes experiments that are being conducted to determine the validity of this approach, including a software simulation to calculate expected Bit Error Rate and prototype hardware to verify the practicality of this design.
{"title":"Physical layer architecture for 1-wire sensor communication bus: Binary channel Code Division Multiple Access","authors":"Benjamin Peiffer, A. Kruger","doi":"10.1109/SAS.2011.5739794","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739794","url":null,"abstract":"Researchers at The University of Iowa have encountered the need for an efficient 1-wire communication protocol for use in embedded systems and distributed wired sensors. One possible solution for this problem is the use of a Wired Code Division Multiple Access (CDMA). Although this approach has been investigated before, a key simplification can made with the use of a binary wired-OR channel. This paper develops the theory for such a protocol, including a mathematical formulation of the Bit Error Rate, and describes experiments that are being conducted to determine the validity of this approach, including a software simulation to calculate expected Bit Error Rate and prototype hardware to verify the practicality of this design.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-28DOI: 10.1109/SAS.2011.5739802
Jongwoo Jun, Youngmin Park, Jinyi Lee
Coincidence measurement system of concentricity and horizontality is proposed in this paper. The measurement system can be used in the assembly of large structures, such as aircrafts, because it can quantitatively display the concentricity and horizontality in real time without any contact between the system and the structure by using a laser system. The system consists of only optical components on one side of the measurement system, i.e., the target. The other side of the measurement system consists of optical and electrical components. Therefore, the measurement system can be used in the assembly of anti-electrical shock structures. The standard deviation of concentricity and horizontality were 31.85µm and 0.001036° at a distance of 0.985m, respectively. The quantitatively measured data could be indicated at 3frames/s of displayed speed.
{"title":"Coincidence measurement system of concentricity and horizontality using a polarizing laser","authors":"Jongwoo Jun, Youngmin Park, Jinyi Lee","doi":"10.1109/SAS.2011.5739802","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739802","url":null,"abstract":"Coincidence measurement system of concentricity and horizontality is proposed in this paper. The measurement system can be used in the assembly of large structures, such as aircrafts, because it can quantitatively display the concentricity and horizontality in real time without any contact between the system and the structure by using a laser system. The system consists of only optical components on one side of the measurement system, i.e., the target. The other side of the measurement system consists of optical and electrical components. Therefore, the measurement system can be used in the assembly of anti-electrical shock structures. The standard deviation of concentricity and horizontality were 31.85µm and 0.001036° at a distance of 0.985m, respectively. The quantitatively measured data could be indicated at 3frames/s of displayed speed.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133957595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-28DOI: 10.1109/SAS.2011.5739778
A. H. K. Deva Sarma, B. A. Kar, C. Mall
In this paper, a novel secure routing protocol is proposed for wireless sensor networks in which sensor nodes as well as the base station are mobile. The protocol achieves security property through symmetric key cryptography and threshold key cryptography. An analysis of the security strengths of the protocol is presented. Simulation results show the throughput of the proposed protocol and a comparison with LEACH regarding its throughput.
{"title":"Secure Routing Protocol for Mobile Wireless Sensor Network","authors":"A. H. K. Deva Sarma, B. A. Kar, C. Mall","doi":"10.1109/SAS.2011.5739778","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739778","url":null,"abstract":"In this paper, a novel secure routing protocol is proposed for wireless sensor networks in which sensor nodes as well as the base station are mobile. The protocol achieves security property through symmetric key cryptography and threshold key cryptography. An analysis of the security strengths of the protocol is presented. Simulation results show the throughput of the proposed protocol and a comparison with LEACH regarding its throughput.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131901857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-28DOI: 10.1109/SAS.2011.5739790
Jungmin Kim, Myoungki Choi, Jinyi Lee
An NDT method for detecting cracks in a rotor bore is proposed. A linearly integrated Hall sensor array (LIHaS) with a small yoke-type magnetizer measures the distribution of a magnetic field (DMF) in a rotor bore. The crack information is then extracted by analyzing the DMF. In the sample test, an axis-directional crack and an arc-directional crack with the length of 0.9mm was detected with the width of the crack at 0.1mm. The cracks had depths of 0.2mm and 0.5mm, respectively.
{"title":"Employing magnetic sensor array for inspecting cracks in a pipeline","authors":"Jungmin Kim, Myoungki Choi, Jinyi Lee","doi":"10.1109/SAS.2011.5739790","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739790","url":null,"abstract":"An NDT method for detecting cracks in a rotor bore is proposed. A linearly integrated Hall sensor array (LIHaS) with a small yoke-type magnetizer measures the distribution of a magnetic field (DMF) in a rotor bore. The crack information is then extracted by analyzing the DMF. In the sample test, an axis-directional crack and an arc-directional crack with the length of 0.9mm was detected with the width of the crack at 0.1mm. The cracks had depths of 0.2mm and 0.5mm, respectively.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-28DOI: 10.1109/SAS.2011.5739776
Zamshed Iqbal Chowdhury, M. Imtiaz, M. M. Azam, M. Sumi, M. Rahman, Farzana Alam, Ishtiak Hussain, Naeemul Hassan
This paper evaluates an automated river level monitoring network. This network contains multiple nodes on which measuring modules are installed. These modules collect raw data and transmit them periodically to a central monitoring system. This monitoring system contains a database that processes the raw data and extracts information. Based on this information, various approximations are made such as water level rise rate, time remaining to exceed the critical level etc. The whole network is implemented as a prototype which yielded satisfactory result.
{"title":"Design and deployment of a robust remote river level sensor network","authors":"Zamshed Iqbal Chowdhury, M. Imtiaz, M. M. Azam, M. Sumi, M. Rahman, Farzana Alam, Ishtiak Hussain, Naeemul Hassan","doi":"10.1109/SAS.2011.5739776","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739776","url":null,"abstract":"This paper evaluates an automated river level monitoring network. This network contains multiple nodes on which measuring modules are installed. These modules collect raw data and transmit them periodically to a central monitoring system. This monitoring system contains a database that processes the raw data and extracts information. Based on this information, various approximations are made such as water level rise rate, time remaining to exceed the critical level etc. The whole network is implemented as a prototype which yielded satisfactory result.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132785582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-28DOI: 10.1109/SAS.2011.5739798
B. Carter, R. Ragade
Games are often used as a tool for teaching the elements and strategies of a problem. The objective of this paper is to define the sensor deployment problem as a game. The rules, game mechanics, and attributes are defined to abstract real life deployment situations while lowering the learning time to allow study of complex scenarios. This paper defines the fundamentals of the game and challenges the reader to study, solve, and define new strategies for sensor deployment problems. It is a fun and simple game, which has an element of entertainment, yet provides a foundation and framework for studying sensor deployment problems.
{"title":"The game of deployment: Defining a game for studying sensor deployment problems.","authors":"B. Carter, R. Ragade","doi":"10.1109/SAS.2011.5739798","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739798","url":null,"abstract":"Games are often used as a tool for teaching the elements and strategies of a problem. The objective of this paper is to define the sensor deployment problem as a game. The rules, game mechanics, and attributes are defined to abstract real life deployment situations while lowering the learning time to allow study of complex scenarios. This paper defines the fundamentals of the game and challenges the reader to study, solve, and define new strategies for sensor deployment problems. It is a fun and simple game, which has an element of entertainment, yet provides a foundation and framework for studying sensor deployment problems.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"866 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132738643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-03-28DOI: 10.1109/SAS.2011.5739811
Michael E. Okaro, M. Abdelrahman, J. Graves
Lost foam casting (LFC) is one of the most important casting methods used in the production of complex metal castings. Several casting defects may result due to an improper metal fill process during LFC; hence, monitoring the metal fill profile is important so that failures in the process can be quickly discovered. This paper presents a monitoring process based on capacitive sensors developed by the research team. In this application, an array of metallic electrodes is mounted around a target area and a set of capacitance measuring circuits are used to measure the mutual capacitances between these electrodes. Measuring the change in capacitance as grounded molten metal displaces the foam pattern provide a simple nondestructive method of acquiring metal fill information. An iterative algorithm for the estimation of metal fill time is also presented. This estimation utilizes better filtration and outlier detection techniques to provide a good prediction of the filling time. The proposed system also makes use of a wireless sensor network for transmitting data between the sensor boards and a computer running our metal fill monitoring application software; thus making this system suitable for the harsh foundry environment.
{"title":"Monitoring metal fill profile in lost foam casting process using capacitive sensors and metal fill time estimation","authors":"Michael E. Okaro, M. Abdelrahman, J. Graves","doi":"10.1109/SAS.2011.5739811","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739811","url":null,"abstract":"Lost foam casting (LFC) is one of the most important casting methods used in the production of complex metal castings. Several casting defects may result due to an improper metal fill process during LFC; hence, monitoring the metal fill profile is important so that failures in the process can be quickly discovered. This paper presents a monitoring process based on capacitive sensors developed by the research team. In this application, an array of metallic electrodes is mounted around a target area and a set of capacitance measuring circuits are used to measure the mutual capacitances between these electrodes. Measuring the change in capacitance as grounded molten metal displaces the foam pattern provide a simple nondestructive method of acquiring metal fill information. An iterative algorithm for the estimation of metal fill time is also presented. This estimation utilizes better filtration and outlier detection techniques to provide a good prediction of the filling time. The proposed system also makes use of a wireless sensor network for transmitting data between the sensor boards and a computer running our metal fill monitoring application software; thus making this system suitable for the harsh foundry environment.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132563456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-02-01DOI: 10.1109/SAS.2011.5739805
E. Yuksel, H. R. Nielson, F. Nielson, Matthias Fruth, M. Kwiatkowska
Sensor networks offer the advantages of simple and low-resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which restrict the amount of data that may be exposed when a key is compromised. In this paper, we propose novel key update methods, and benefiting from stochastic model checking we propose a novel method for determining optimal key update strategies for custom network scenarios. We also present a case study where an application in commercial building automation is considered.
{"title":"Optimizing key updates in sensor networks","authors":"E. Yuksel, H. R. Nielson, F. Nielson, Matthias Fruth, M. Kwiatkowska","doi":"10.1109/SAS.2011.5739805","DOIUrl":"https://doi.org/10.1109/SAS.2011.5739805","url":null,"abstract":"Sensor networks offer the advantages of simple and low-resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which restrict the amount of data that may be exposed when a key is compromised. In this paper, we propose novel key update methods, and benefiting from stochastic model checking we propose a novel method for determining optimal key update strategies for custom network scenarios. We also present a case study where an application in commercial building automation is considered.","PeriodicalId":401849,"journal":{"name":"2011 IEEE Sensors Applications Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}