SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WAKA:kon ;pers:(Voigt Thiemo)"

Sökning: WAKA:kon > Voigt Thiemo

  • Resultat 1-10 av 344
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Ahmed, Mobyen Uddin, 1976-, et al. (författare)
  • Run-Time Assurance for the E-care@home System
  • 2018
  • Ingår i: Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 225). - Cham : Springer International Publishing. - 9783319762128 - 9783319762135 ; , s. 107-110
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents the design and implementation of the software for a run-time assurance infrastructure in the E-care@home system. An experimental evaluation is conducted to verify that the run-time assurance infrastructure is functioning correctly, and to enable detecting performance degradation in experimental IoT network deployments within the context of E-care@home. © 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
  •  
2.
  • Akbari, Saba, et al. (författare)
  • Capacitance Modelling of Conductive Cotton Knit Fabric for Sensor Node Communication
  • 2024
  • Ingår i: 2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024. - : IEEE. - 9798350387568 - 9798350387575 ; , s. 398-402
  • Konferensbidrag (refereegranskat)abstract
    • Applications of sensor nodes in our daily lives are increasing. Sensor nodes can be embedded in textiles to monitor various environmental parameters or to measure biomarkers. Embedded nodes in fabrics can use wires as means of communication. This approach, however, has drawbacks in terms of reliability, e.g. wire breaks, and discomfort that can arise in a large fabric network with multitudes of cables. Power-line communication (PLC) can mitigate these problems by using conductive planes instead of wires. However, the capacitance formed as a result of using two parallel plates and fabric in between attenuates the signal transmission between sensor nodes. Therefore, in order to compensate the attenuation effect of the conductive fabric which can be achieved by optimizing the hardware, we need to know the capacitance model of the conductive fabric. In our case it is necessary to know the capacitance model as a result of placing a cotton knit fabric between conductive meshes. In this work, we demonstrate that one can use the parallel plate capacitance model for estimating the capacitance of a cotton knit fabric placed between two conductive meshes.
  •  
3.
  •  
4.
  • Akbari, Saba, et al. (författare)
  • Development of Energy Autonomous Wearable Sensor Node for Oxygen Monitoring in Underground Tunnels
  • 2024
  • Ingår i: 2024 13TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING, MECO 2024. - : IEEE. - 9798350387568 - 9798350387575 ; , s. 394-397
  • Konferensbidrag (refereegranskat)abstract
    • Underground tunnels contain toxic, hazardous gases or lack oxygen. Therefore, providing the safety of personnel working in underground tunnels by monitoring oxygen, combustible or toxic gases is important. Wearable sensor networks are used in various applications such as oxygen monitoring. Some wearable sensor networks for gas monitoring are powered by batteries. Given the finite lifetime of batteries and the long term stay of underground personnel in these places, e.g. as a result of incidents, having a wearable sensor node with a stable power supply is crucial to conducting oxygen monitoring and notifying the emergency conditions. In order to provide a battery-less operation of the wearable sensor node, one approach is to use ambient energy sources. Considering the fact that the human body can survive only a few minutes without oxygen, the goal of our work is to investigate whether the power generated as a result of temperature difference between the body and ambient air is sufficient to power a sensor node for conducting oxygen detection every 20 seconds. Therefore, we present the development of a wearable sensor node for oxygen detection. The platform consists of a thermoelectric generator (TEG) converter, a sensing circuit for an electrochemical gas sensor and a power management circuit. Our experimental results with our platform indicate that a temperature difference of 6 degrees C between the body and the ambient air and storing the harvested energy in a capacitor ensure the autonomous operation of the wearable sensor node for measurements and alarm actuation conducted every 15 seconds. The period between the measurements could even become less than 15 seconds in underground tunnels as the temperature difference increases.
  •  
5.
  •  
6.
  • Al Nahas, Beshr, 1985, et al. (författare)
  • Low-power listening goes multi-channel
  • 2014
  • Ingår i: Proceedings - IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2014. ; , s. 2-9
  • Konferensbidrag (refereegranskat)abstract
    • Exploiting multiple radio channels for communication has been long known as a practical way to mitigate interference in wireless settings. In Wireless Sensor Networks, however, multi-channel solutions have not reached their full potential: the MAC layers included in TinyOS or the Contiki OS for example are mostly single-channel. The literature offers a number of interesting solutions, but experimental results were often too few to build confidence. We propose a practical extension of low-power listening, MiCMAC, that performs channel hopping, operates in a distributed way, and is independent of upper layers of the protocol stack. The above properties make it easy to deploy in a variety of scenarios, without any extra configuration/scheduling/channel selection hassle. We implement our solution in Contiki and evaluate it in a 97-node~testbed while running a complete, out-of-the-box low-power IPv6 communication stack (UDP/RPL/6LoWPAN). Our experimental results demonstrate increased resilience to emulated WiFi interference (e.g., data yield kept above 90% when Contiki MAC drops in the 40% range). In noiseless environments, MiCMAC keeps the overhead low in comparison to Contiki MAC, achieving performance as high as 99% data yield along with sub-percent duty cycle and sub-second latency for a 1-minute inter-packet interval data collection. © 2014 IEEE.
  •  
7.
  •  
8.
  •  
9.
  •  
10.
  • Asad, H. A., et al. (författare)
  • On Securing Persistent State in Intermittent Computing
  • 2020
  • Ingår i: ENSsys 2020 - Proceedings of the 8th International Workshop on Energy Harvesting and Energy-Neutral Sensing Systems. - New York, NY, USA : Association for Computing Machinery, Inc. ; , s. 8-14, s. 8-14, s. 8-14
  • Konferensbidrag (refereegranskat)abstract
    • We present the experimental evaluation of different security mechanisms applied to persistent state in intermittent computing. Whenever executions become intermittent because of energy scarcity, systems employ persistent state on non-volatile memories (NVMs) to ensure forward progress of applications. Persistent state spans operating system and network stack, as well as applications. While a device is off recharging energy buffers, persistent state on NVMs may be subject to security threats such as stealing sensitive information or tampering with configuration data, which may ultimately corrupt the device state and render the system unusable. Based on modern platforms of the Cortex M*series, we experimentally investigate the impact on typical intermittent computing workloads of different means to protect persistent state, including software and hardware implementations of staple encryption algorithms and the use of ARM TrustZone protection mechanisms. Our results indicate that i) software implementations bear a significant overhead in energy and time, sometimes harming forward progress, but also retaining the advantage of modularity and easier updates; ii) hardware implementations offer much lower overhead compared to their software counterparts, but require a deeper understanding of their internals to gauge their applicability in given application scenarios; and iii) TrustZone shows almost negligible overhead, yet it requires a different memory management and is only effective as long as attackers cannot directly access the NVMs.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 344
Typ av publikation
konferensbidrag (344)
Typ av innehåll
refereegranskat (334)
övrigt vetenskapligt/konstnärligt (9)
populärvet., debatt m.m. (1)
Författare/redaktör
Dunkels, Adam (55)
Tsiftes, Nicolas (44)
Eriksson, Joakim (43)
Österlind, Fredrik (35)
Finne, Niclas (34)
visa fler...
Mottola, Luca (33)
Varshney, Ambuj (31)
Raza, Shahid (31)
He, Zhitao (27)
Rohner, Christian (24)
Duquennoy, Simon (19)
Pérez-Penichet, Carl ... (19)
Hewage, Kasun (19)
Boano, Carlo Alberto (18)
Roedig, Utz (18)
Augustine, Robin, 19 ... (16)
Wirström, Niklas (16)
Römer, Kay (15)
Hermans, Frederik (15)
Ritter, Hartmut (12)
Alonso, Juan (11)
Mottola, Luca, 1980- (10)
Schiller, Jochen (10)
Misra, Prasant (10)
Asan, Noor Badariah, ... (9)
Keppitiyagama, Chama ... (9)
Rohner, Christian, P ... (9)
Wolisz, Adam (8)
Perez, Mauricio D. (8)
Noda, Claro (8)
Zuniga, Marco (8)
Lemic, Filip (8)
De Zoysa, Kasun (8)
Hylamia, Sam (8)
Gunningberg, Per (7)
Handziski, Vlado (7)
Sreenan, Cormac J. (7)
Iyer, Venkatraman (6)
Behboodi, Arash (6)
Hazra, Saptarshi (6)
Soleiman, Andreas (6)
Brown, James (5)
Landsiedel, Olaf, 19 ... (5)
Hassan, Emadeldeen (5)
Redzwan, Syaiful (5)
Joseph, Laya (5)
Rensfelt, Olof (5)
Yan, Wenqing, 1994- (5)
O'Donovan, Tony (5)
visa färre...
Lärosäte
Uppsala universitet (213)
RISE (211)
Kungliga Tekniska Högskolan (10)
Mälardalens universitet (10)
Chalmers tekniska högskola (7)
Umeå universitet (5)
visa fler...
Mittuniversitetet (5)
Örebro universitet (2)
Luleå tekniska universitet (1)
Linköpings universitet (1)
visa färre...
Språk
Engelska (344)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (228)
Teknik (120)
Medicin och hälsovetenskap (1)
Lantbruksvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy