1,845 research outputs found

    Dense and long-term monitoring of Earth surface processes with passive RFID -- a review

    Full text link
    Billions of Radio-Frequency Identification (RFID) passive tags are produced yearly to identify goods remotely. New research and business applications are continuously arising, including recently localization and sensing to monitor earth surface processes. Indeed, passive tags can cost 10 to 100 times less than wireless sensors networks and require little maintenance, facilitating years-long monitoring with ten's to thousands of tags. This study reviews the existing and potential applications of RFID in geosciences. The most mature application today is the study of coarse sediment transport in rivers or coastal environments, using tags placed into pebbles. More recently, tag localization was used to monitor landslide displacement, with a centimetric accuracy. Sensing tags were used to detect a displacement threshold on unstable rocks, to monitor the soil moisture or temperature, and to monitor the snowpack temperature and snow water equivalent. RFID sensors, available today, could monitor other parameters, such as the vibration of structures, the tilt of unstable boulders, the strain of a material, or the salinity of water. Key challenges for using RFID monitoring more broadly in geosciences include the use of ground and aerial vehicles to collect data or localize tags, the increase in reading range and duration, the ability to use tags placed under ground, snow, water or vegetation, and the optimization of economical and environmental cost. As a pattern, passive RFID could fill a gap between wireless sensor networks and manual measurements, to collect data efficiently over large areas, during several years, at high spatial density and moderate cost.Comment: Invited paper for Earth Science Reviews. 50 pages without references. 31 figures. 8 table

    2020 NASA Technology Taxonomy

    Get PDF
    This document is an update (new photos used) of the PDF version of the 2020 NASA Technology Taxonomy that will be available to download on the OCT Public Website. The updated 2020 NASA Technology Taxonomy, or "technology dictionary", uses a technology discipline based approach that realigns like-technologies independent of their application within the NASA mission portfolio. This tool is meant to serve as a common technology discipline-based communication tool across the agency and with its partners in other government agencies, academia, industry, and across the world

    A robot swarm assisting a human fire-fighter

    Get PDF
    Emergencies in industrial warehouses are a major concern for fire-fighters. The large dimensions, together with the development of dense smoke that drastically reduces visibility, represent major challenges. The GUARDIANS robot swarm is designed to assist fire-fighters in searching a large warehouse. In this paper we discuss the technology developed for a swarm of robots assisting fire-fighters. We explain the swarming algorithms that provide the functionality by which the robots react to and follow humans while no communication is required. Next we discuss the wireless communication system, which is a so-called mobile ad-hoc network. The communication network provides also the means to locate the robots and humans. Thus, the robot swarm is able to provide guidance information to the humans. Together with the fire-fighters we explored how the robot swarm should feed information back to the human fire-fighter. We have designed and experimented with interfaces for presenting swarm-based information to human beings

    GUARDIANS final report

    Get PDF
    Emergencies in industrial warehouses are a major concern for firefghters. The large dimensions together with the development of dense smoke that drastically reduces visibility, represent major challenges. The Guardians robot swarm is designed to assist fire fighters in searching a large warehouse. In this report we discuss the technology developed for a swarm of robots searching and assisting fire fighters. We explain the swarming algorithms which provide the functionality by which the robots react to and follow humans while no communication is required. Next we discuss the wireless communication system, which is a so-called mobile ad-hoc network. The communication network provides also one of the means to locate the robots and humans. Thus the robot swarm is able to locate itself and provide guidance information to the humans. Together with the re ghters we explored how the robot swarm should feed information back to the human fire fighter. We have designed and experimented with interfaces for presenting swarm based information to human beings

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    A Real-Time Measurement System for Long-Life Flood Monitoring and Warning Applications

    Get PDF
    A flood warning system incorporates telemetered rainfall and flow/water level data measured at various locations in the catchment area. Real-time accurate data collection is required for this use, and sensor networks improve the system capabilities. However, existing sensor nodes struggle to satisfy the hydrological requirements in terms of autonomy, sensor hardware compatibility, reliability and long-range communication. We describe the design and development of a real-time measurement system for flood monitoring, and its deployment in a flash-flood prone 650 km2 semiarid watershed in Southern Spain. A developed low-power and long-range communication device, so-called DatalogV1, provides automatic data gathering and reliable transmission. DatalogV1 incorporates self-monitoring for adapting measurement schedules for consumption management and to capture events of interest. Two tests are used to assess the success of the development. The results show an autonomous and robust monitoring system for long-term collection of water level data in many sparse locations during flood events

    AUTOMATED SCOUR DETECTION ARRAYS USING BIO-INSPIRED MAGNETOSTRICTIVE FLOW SENSORS

    Get PDF
    Scour is the most common cause of catastrophic bridge failures worldwide. Approximately over 60% of bridge failures reported in the United States from 1966 to 2005 are scour related. To ensure the continued safe operation of bridges, monitoring bridge scour is of paramount importance. Most monitoring regimes that are widely used are based on expensive underwater instrumentation. This research focuses on scour detection using automated remote flow detection arrays based on bio-inspired flow sensors. This study employs an array of bio inspired flow sensors that are inexpensive and robust versions of buried-rod scour sensor arrays, coupled with low-power wireless sensor network utilizing civil-engineering domain wireless sensing units to detect scour around bridge piers and abutments. Sensors within the network that report dynamic flow signals are considered to be waterborne or located above the sediment and sensors reporting static signals are characterized as buried or as being located in sediment. The a priori information of sensor depth will help to establish the sediment level in real time. An automated data interrogation system collects data, processes the raw sensor data using in-network data interrogation methods, then and communicates the results to the on-site base station. The relative directness of this data interrogation adds to the robustness of the system. The main purpose of the scour detection system is to provide remote scour information to bridge owners in a format that is easy to comprehend as an aid in decision making. In this project, only processed results, not raw data, are transmitted to the user. The system under study utilizes a cellular data link to relay simplified data to the bridge owner to aid in decision making. A robust program of validation has been conducted to define the limits of the approach in the laboratory and the results of the laboratory validation experiments have been presented in this thesis. This thesis also illustrates the ongoing initial field installation of scour monitoring system on local bridges with some scour concern

    Building a Simple Smart Factory

    Get PDF
    This thesis describes (a) the search and findings of smart factories and their enabling technologies (b) the methodology to build or retrofit a smart factory and (c) the building and operation of a simple smart factory using the methodology. A factory is an industrial site with large buildings and collection of machines, which are operated by persons to manufacture goods and services. These factories are made smart by incorporating sensing, processing, and autonomous responding capabilities. Developments in four main areas (a) sensor capabilities (b) communication capabilities (c) storing and processing huge amount of data and (d) better utilization of technology in management and further development have contributed significantly for this incorporation of smartness to factories. There is a flurry of literature in each of the above four topics and their combinations. The findings from the literature can be summarized in the following way. Sensors detect or measure a physical property and records, indicates, or otherwise responds to it. In real-time, they can make a very large amount of observations. Internet is a global computer network providing a variety of information and communication facilities and the internet of things, IoT, is the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. Big data handling and the provision of data services are achieved through cloud computing. Due to the availability of computing power, big data can be handled and analyzed under different classifications using several different analytics. The results from these analytics can be used to trigger autonomous responsive actions that make the factory smart. Having thus comprehended the literature, a seven stepped methodology for building or retrofitting a smart factory was established. The seven steps are (a) situation analysis where the condition of the current technology is studied (b) breakdown prevention analysis (c) sensor selection (d) data transmission and storage selection (e) data processing and analytics (f) autonomous action network and (g) integration with the plant units. Experience in a cement factory highlighted the wear in a journal bearing causes plant stoppages and thus warrant a smart system to monitor and make decisions. The experience was used to develop a laboratory-scale smart factory monitoring the wear of a half-journal bearing. To mimic a plant unit a load-carrying shaft supported by two half-journal bearings were chosen and to mimic a factory with two plant units, two such shafts were chosen. Thus, there were four half-journal bearings to monitor. USB Logitech C920 webcam that operates in full-HD 1080 pixels was used to take pictures at specified intervals. These pictures are then analyzed to study the wear at these intervals. After the preliminary analysis wear versus time data for all four bearings are available. Now the ‘making smart activity’ begins. Autonomous activities are based on various analyses. The wear time data are analyzed under different classifications. Remaining life, wear coefficient specific to the bearings, weekly variation in wear and condition of adjacent bearings are some of the characteristics that can be obtained from the analytics. These can then be used to send a message to the maintenance and supplies division alerting them on the need for a replacement shortly. They can also be alerted about other bearings reaching their maturity to plan a major overhaul if needed

    Adoption of vehicular ad hoc networking protocols by networked robots

    Get PDF
    This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several advantages over their single-robot counterparts. Typically, this integration of wireless communication is tackled in a quite pragmatic manner, only a few authors presented novel Robotic Ad Hoc Network (RANET) protocols that were designed specifically with robotic use cases in mind. This is in sharp contrast with the domain of vehicular ad hoc networks (VANET). This observation is the starting point of this paper. If the results of previous efforts focusing on VANET protocols could be reused in the RANET domain, this could lead to rapid progress in the field of networked robots. To investigate this possibility, this paper provides a thorough overview of the related work in the domain of robotic and vehicular ad hoc networks. Based on this information, an exhaustive list of requirements is defined for both types. It is concluded that the most significant difference lies in the fact that VANET protocols are oriented towards low throughput messaging, while RANET protocols have to support high throughput media streaming as well. Although not always with equal importance, all other defined requirements are valid for both protocols. This leads to the conclusion that cross-fertilization between them is an appealing approach for future RANET research. To support such developments, this paper concludes with the definition of an appropriate working plan

    UAV-Enabled Surface and Subsurface Characterization for Post-Earthquake Geotechnical Reconnaissance

    Full text link
    Major earthquakes continue to cause significant damage to infrastructure systems and the loss of life (e.g. 2016 Kaikoura, New Zealand; 2016 Muisne, Ecuador; 2015 Gorkha, Nepal). Following an earthquake, costly human-led reconnaissance studies are conducted to document structural or geotechnical damage and to collect perishable field data. Such efforts are faced with many daunting challenges including safety, resource limitations, and inaccessibility of sites. Unmanned Aerial Vehicles (UAV) represent a transformative tool for mitigating the effects of these challenges and generating spatially distributed and overall higher quality data compared to current manual approaches. UAVs enable multi-sensor data collection and offer a computational decision-making platform that could significantly influence post-earthquake reconnaissance approaches. As demonstrated in this research, UAVs can be used to document earthquake-affected geosystems by creating 3D geometric models of target sites, generate 2D and 3D imagery outputs to perform geomechanical assessments of exposed rock masses, and characterize subsurface field conditions using techniques such as in situ seismic surface wave testing. UAV-camera systems were used to collect images of geotechnical sites to model their 3D geometry using Structure-from-Motion (SfM). Key examples of lessons learned from applying UAV-based SfM to reconnaissance of earthquake-affected sites are presented. The results of 3D modeling and the input imagery were used to assess the mechanical properties of landslides and rock masses. An automatic and semi-automatic 2D fracture detection method was developed and integrated with a 3D, SfM, imaging framework. A UAV was then integrated with seismic surface wave testing to estimate the shear wave velocity of the subsurface materials, which is a critical input parameter in seismic response of geosystems. The UAV was outfitted with a payload release system to autonomously deliver an impulsive seismic source to the ground surface for multichannel analysis of surface waves (MASW) tests. The UAV was found to offer a mobile but higher-energy source than conventional seismic surface wave techniques and is the foundational component for developing the framework for fully-autonomous in situ shear wave velocity profiling.PHDCivil EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/145793/1/wwgreen_1.pd
    corecore