156 research outputs found

    Wireless body area network revisited

    Get PDF
    Rapid growth of wireless body area networks (WBANs) technology allowed the fast and secured acquisition as well as exchange of vast amount of data information in diversified fields. WBANs intend to simplify and improve the speed, accuracy, and reliability of communica-tions from sensors (interior motors) placed on and/or close to the human body, reducing the healthcare cost remarkably. However, the secu-rity of sensitive data transfer using WBANs and subsequent protection from adversaries attack is a major issue. Depending on the types of applications, small and high sensitive sensors having several nodes obtained from invasive/non-invasive micro- and nano- technology can be installed on the human body to capture useful information. Lately, the use of micro-electro-mechanical systems (MEMS) and integrated circuits in wireless communications (WCs) became widespread because of their low-power operation, intelligence, accuracy, and miniaturi-zation. IEEE 802.15.6 and 802.15.4j standards have already been set to specifically regulate the medical networks and WBANs. In this view, present communication provides an all-inclusive overview of the past development, recent progress, challenges and future trends of security technology related to WBANs

    An Event-Driven Multiple Objects Surveillance System

    Get PDF
    Traditional surveillance systems are constrained because of a fixed and preset pattern of monitoring. It can reduce the reliability of the system and cause an increased generation of false alarms. It results in an increased processing activity of the system, which causes an augmented consumption of system resources and power. Within this framework, a human surveillance system is proposed based on the event-driven awakening and self-organization principle. The proposed system overcomes these downsides up to a certain level. It is achieved by intelligently merging an assembly of sensors with two cameras, actuators, a lighting module and cost-effective embedded processors. With the exception of low-power event detectors, all other system modules remain in the sleep mode. These modules are activated only upon detection of an event and as a function of the sensing environment condition. It reduces power consumption and processing activity of the proposed system. An effective combination of a sensor assembly and a robust classifier suppresses generation of false alarms and improves system reliability. An experimental setup is realized in order to verify the functionality of the proposed system. Results confirm proper functionality of the implemented system. A 62.3-fold system memory utilization and bandwidth consumption reduction compared to traditional counterparts is achieved, i.e. a result of the proposed system self-organization and event-driven awakening features. It confirms that the proposed system outperforms its classical counterparts in terms of processing activity, power consumption and usage of resources

    State of the art of cyber-physical systems security: An automatic control perspective

    Get PDF
    Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia

    On the use of context information for an improved application of data-based algorithms in condition monitoring

    Get PDF
    xi, 124 p.En el campo de la monitorización de la condición, los algoritmos basados en datos cuentan con un amplio recorrido. Desde el uso de los gráficos de control de calidad que se llevan empleando durante casi un siglo a técnicas de mayor complejidad como las redes neuronales o máquinas de soporte vectorial que se emplean para detección, diagnóstico y estimación de vida remanente de los equipos. Sin embargo, la puesta en producción de los algoritmos de monitorización requiere de un estudio exhaustivo de un factor que es a menudo obviado por otros trabajos de la literatura: el contexto. El contexto, que en este trabajo es considerado como el conjunto de factores que influencian la monitorización de un bien, tiene un gran impacto en la algoritmia de monitorización y su aplicación final. Por este motivo, es el objeto de estudio de esta tesis en la que se han analizado tres casos de uso. Se ha profundizado en sus respectivos contextos, tratando de generalizar a la problemática habitual en la monitorización de maquinaria industrial, y se ha abordado dicha problemática de monitorización de forma que solucionen el contexto en lugar de cada caso de uso. Así, el conocimiento adquirido durante el desarrollo de las soluciones puede ser transferido a otros casos de uso que cuenten con contextos similares

    Industrial engineering methods and techniques in Industry 4.0

    Get PDF
    The paper analyzes the importance of the application of methods and techniques of industrial engineering in the business environment of Industry 4.0. Survey done indicates that in the new business environment, the methods and techniques of industrial engineering come to full expression because cyberphysical systems give a complete insight into the nature of production processes. Accordingly, an example of an IE method application and ways of its integration in I4.0 environment is given and discussed

    Volume 3 – Conference

    Get PDF
    We are pleased to present the conference proceedings for the 12th edition of the International Fluid Power Conference (IFK). The IFK is one of the world’s most significant scientific conferences on fluid power control technology and systems. It offers a common platform for the presentation and discussion of trends and innovations to manufacturers, users and scientists. The Chair of Fluid-Mechatronic Systems at the TU Dresden is organizing and hosting the IFK for the sixth time. Supporting hosts are the Fluid Power Association of the German Engineering Federation (VDMA), Dresdner Verein zur Förderung der Fluidtechnik e. V. (DVF) and GWT-TUD GmbH. The organization and the conference location alternates every two years between the Chair of Fluid-Mechatronic Systems in Dresden and the Institute for Fluid Power Drives and Systems in Aachen. The symposium on the first day is dedicated to presentations focused on methodology and fundamental research. The two following conference days offer a wide variety of application and technology orientated papers about the latest state of the art in fluid power. It is this combination that makes the IFK a unique and excellent forum for the exchange of academic research and industrial application experience. A simultaneously ongoing exhibition offers the possibility to get product information and to have individual talks with manufacturers. The theme of the 12th IFK is “Fluid Power – Future Technology”, covering topics that enable the development of 5G-ready, cost-efficient and demand-driven structures, as well as individual decentralized drives. Another topic is the real-time data exchange that allows the application of numerous predictive maintenance strategies, which will significantly increase the availability of fluid power systems and their elements and ensure their improved lifetime performance. We create an atmosphere for casual exchange by offering a vast frame and cultural program. This includes a get-together, a conference banquet, laboratory festivities and some physical activities such as jogging in Dresden’s old town.:Group 8: Pneumatics Group 9 | 11: Mobile applications Group 10: Special domains Group 12: Novel system architectures Group 13 | 15: Actuators & sensors Group 14: Safety & reliabilit
    corecore