48,892 research outputs found

    Detecting fish aggregations from reef habitats mapped with high resolution side scan sonar imagery

    Get PDF
    As part of a multibeam and side scan sonar (SSS) benthic survey of the Marine Conservation District (MCD) south of St. Thomas, USVI and the seasonal closed areas in St. Croix—Lang Bank (LB) for red hind (Epinephelus guttatus) and the Mutton Snapper (MS) (Lutjanus analis) area—we extracted signals from water column targets that represent individual and aggregated fish over various benthic habitats encountered in the SSS imagery. The survey covered a total of 18 km2 throughout the federal jurisdiction fishery management areas. The complementary set of 28 habitat classification digital maps covered a total of 5,462.3 ha; MCDW (West) accounted for 45% of that area, and MCDE (East) 26%, LB 17%, and MS the remaining 13%. With the exception of MS, corals and gorgonians on consolidated habitats were significantly more abundant than submerged aquatic vegetation (SAV) on unconsolidated sediments or unconsolidated sediments. Continuous coral habitat was the most abundant consolidated habitat for both MCDW and MCDE (41% and 43% respectively). Consolidated habitats in LB and MS predominantly consisted of gorgonian plain habitat with 95% and 83% respectively. Coral limestone habitat was more abundant than coral patch habitat; it was found near the shelf break in MS, MCDW, and MCDE. Coral limestone and coral patch habitats only covered LB minimally. The high spatial resolution (0.15 m) of the acquired imagery allowed the detection of differing fish aggregation (FA) types. The largest FA densities were located at MCDW and MCDE over coral communities that occupy up to 70% of the bottom cover. Counts of unidentified swimming objects (USOs), likely representing individual fish, were similar among locations and occurred primarily over sand and shelf edge areas. Fish aggregation school sizes were significantly smaller at MS than the other three locations (MCDW, MCDE, and LB). This study shows the advantages of utilizing SSS in determining fish distributions and density

    Data Transmission with Reduced Delay for Distributed Acoustic Sensors

    Full text link
    This paper proposes a channel access control scheme fit to dense acoustic sensor nodes in a sensor network. In the considered scenario, multiple acoustic sensor nodes within communication range of a cluster head are grouped into clusters. Acoustic sensor nodes in a cluster detect acoustic signals and convert them into electric signals (packets). Detection by acoustic sensors can be executed periodically or randomly and random detection by acoustic sensors is event driven. As a result, each acoustic sensor generates their packets (50bytes each) periodically or randomly over short time intervals (400ms~4seconds) and transmits directly to a cluster head (coordinator node). Our approach proposes to use a slotted carrier sense multiple access. All acoustic sensor nodes in a cluster are allocated to time slots and the number of allocated sensor nodes to each time slot is uniform. All sensor nodes allocated to a time slot listen for packet transmission from the beginning of the time slot for a duration proportional to their priority. The first node that detect the channel to be free for its whole window is allowed to transmit. The order of packet transmissions with the acoustic sensor nodes in the time slot is autonomously adjusted according to the history of packet transmissions in the time slot. In simulations, performances of the proposed scheme are demonstrated by the comparisons with other low rate wireless channel access schemes.Comment: Accepted to IJDSN, final preprinted versio

    A survey of localization in wireless sensor network

    Get PDF
    Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network

    Listening for Sirens: Locating and Classifying Acoustic Alarms in City Scenes

    Get PDF
    This paper is about alerting acoustic event detection and sound source localisation in an urban scenario. Specifically, we are interested in spotting the presence of horns, and sirens of emergency vehicles. In order to obtain a reliable system able to operate robustly despite the presence of traffic noise, which can be copious, unstructured and unpredictable, we propose to treat the spectrograms of incoming stereo signals as images, and apply semantic segmentation, based on a Unet architecture, to extract the target sound from the background noise. In a multi-task learning scheme, together with signal denoising, we perform acoustic event classification to identify the nature of the alerting sound. Lastly, we use the denoised signals to localise the acoustic source on the horizon plane, by regressing the direction of arrival of the sound through a CNN architecture. Our experimental evaluation shows an average classification rate of 94%, and a median absolute error on the localisation of 7.5{\deg} when operating on audio frames of 0.5s, and of 2.5{\deg} when operating on frames of 2.5s. The system offers excellent performance in particularly challenging scenarios, where the noise level is remarkably high.Comment: 6 pages, 9 figure

    Cooperative Authentication in Underwater Acoustic Sensor Networks

    Full text link
    With the growing use of underwater acoustic communications (UWAC) for both industrial and military operations, there is a need to ensure communication security. A particular challenge is represented by underwater acoustic networks (UWANs), which are often left unattended over long periods of time. Currently, due to physical and performance limitations, UWAC packets rarely include encryption, leaving the UWAN exposed to external attacks faking legitimate messages. In this paper, we propose a new algorithm for message authentication in a UWAN setting. We begin by observing that, due to the strong spatial dependency of the underwater acoustic channel, an attacker can attempt to mimic the channel associated with the legitimate transmitter only for a small set of receivers, typically just for a single one. Taking this into account, our scheme relies on trusted nodes that independently help a sink node in the authentication process. For each incoming packet, the sink fuses beliefs evaluated by the trusted nodes to reach an authentication decision. These beliefs are based on estimated statistical channel parameters, chosen to be the most sensitive to the transmitter-receiver displacement. Our simulation results show accurate identification of an attacker's packet. We also report results from a sea experiment demonstrating the effectiveness of our approach.Comment: Author version of paper accepted for publication in the IEEE Transactions on Wireless Communication

    Seagrass and Aquatic Habitat Assessment Workshop Summary

    Get PDF
    Seagrass communities are among the richest and most productive, photoautotrophic coastal systems in the world. They protect and improve water quality, provide shoreline stabilization, and are important habitats for an array of fish, birds, and other wildlife. Hence, much can be gained by protecting and restoring these important living resources. Human’s impact on these vital resources from population growth, pollution, and physical damage from boating and other activities can disrupt the growth of these seagrasses communities and have devastating effects on their health and vitality. Inventory and monitoring are required to determine the dynamics of seagrasses and devise better protection and restoration for these rich resources. The purpose of this seagrass workshop, sponsored by NOAA’s CSC , USGS, and FMRI, was to move toward greater objectivity and accuracy in seagrass mapping and monitoring. This workshop helped foster interaction and communication among seagrass professionals. In order to begin the process of determining the best uniform mapping process for the biological research community. Increasing such awareness among the seagrass and management communities, it is hoped that an improved understanding of the monitoring and mapping process will lead to more effective and efficient preservation os submerged aquatic vegetation. (PDF contains 20 pages

    The Building Information Model and the IFC standard: analysis of the characteristics necessary for the acoustic and energy simulation of buildings

    Get PDF
    The new European Directive 2014/24 / EU requires for all member States the use of BIM procedures in the construction of public buildings. The countries belonging to the European Union shall be obliged to transpose the Directive and adapt their procedures to that effect. The paper analyzes the IFC format, the only recognized by the European Directive Standards for BIM procedures, in order to assess its use for simulations of buildings. IFC, described by the ISO 16739 (2013), is today a standard that describes the topology of the constructive elements of the building and what belongs to it overall. The format includes geometrical information on the room and on all building components, including details of the type for performance (transmittance, fire resistance, sound insulation), in other words it is an independent object file for the software producers to which, according to the European Directive, it will be compulsory to refer in the near future, during the different stages of the life of a building from the design phase, to management and possible demolition at the end of life. The IFC initiative began in 1994, when an industry consortium invested in the development of a set of C ++ classes that can support the development of integrated applications. Twelve US companies joined the consortium: these companies that were included initially are called the consortium "Industry Alliance for Interoperability". In September 1995 the Alliance opened up membership to all interested parties, and in 1997 changed its name to "International Alliance for Interoperability". The new alliance was reconstituted as a non-profit organization, with the aim of developing and promoting the '' Industry Foundation Class "(IFC) as a neutral data model for the building product that were useful to gather information throughout the life cycle of a building facility. Since 2005 the Alliance has been carrying out its activities through its national chapters called SMART building. The present study aims at evaluating the IFC, comparing the information and data contained in it, with other formats already used for energy simulations of buildings such as the gbXML (Green Building XML), highlighting the missing required information and proposing the inclusion of new ones to issue the energy and acoustic simulation. More generally the attention is focused to building physics simulation software devoted to exploit the BIM model potential enabling interoperability

    Survey and Systematization of Secure Device Pairing

    Full text link
    Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices. Comparison and assessment of SDP schemes is troublesome, because each scheme makes different assumptions about out-of-band channels and adversary models, and are driven by their particular use-cases. A conceptual model that facilitates meaningful comparison among SDP schemes is missing. We provide such a model. In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards. A system model and consistent terminology for SDP schemes are built on the foundation of this survey, which are then used to classify existing SDP schemes into a taxonomy that, for the first time, enables their meaningful comparison and analysis.The existing SDP schemes are analyzed using this model, revealing common systemic security weaknesses among the surveyed SDP schemes that should become priority areas for future SDP research, such as improving the integration of privacy requirements into the design of SDP schemes. Our results allow SDP scheme designers to create schemes that are more easily comparable with one another, and to assist the prevention of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications Surveys & Tutorials 2017 (Volume: PP, Issue: 99

    Damage identification in structural health monitoring: a brief review from its implementation to the Use of data-driven applications

    Get PDF
    The damage identification process provides relevant information about the current state of a structure under inspection, and it can be approached from two different points of view. The first approach uses data-driven algorithms, which are usually associated with the collection of data using sensors. Data are subsequently processed and analyzed. The second approach uses models to analyze information about the structure. In the latter case, the overall performance of the approach is associated with the accuracy of the model and the information that is used to define it. Although both approaches are widely used, data-driven algorithms are preferred in most cases because they afford the ability to analyze data acquired from sensors and to provide a real-time solution for decision making; however, these approaches involve high-performance processors due to the high computational cost. As a contribution to the researchers working with data-driven algorithms and applications, this work presents a brief review of data-driven algorithms for damage identification in structural health-monitoring applications. This review covers damage detection, localization, classification, extension, and prognosis, as well as the development of smart structures. The literature is systematically reviewed according to the natural steps of a structural health-monitoring system. This review also includes information on the types of sensors used as well as on the development of data-driven algorithms for damage identification.Peer ReviewedPostprint (published version
    corecore