88 research outputs found

    Wireless Monitoring Systems for Long-Term Reliability Assessment of Bridge Structures based on Compressed Sensing and Data-Driven Interrogation Methods.

    Full text link
    The state of the nation’s highway bridges has garnered significant public attention due to large inventories of aging assets and insufficient funds for repair. Current management methods are based on visual inspections that have many known limitations including reliance on surface evidence of deterioration and subjectivity introduced by trained inspectors. To address the limitations of current inspection practice, structural health monitoring (SHM) systems can be used to provide quantitative measures of structural behavior and an objective basis for condition assessment. SHM systems are intended to be a cost effective monitoring technology that also automates the processing of data to characterize damage and provide decision information to asset managers. Unfortunately, this realization of SHM systems does not currently exist. In order for SHM to be realized as a decision support tool for bridge owners engaged in performance- and risk-based asset management, technological hurdles must still be overcome. This thesis focuses on advancing wireless SHM systems. An innovative wireless monitoring system was designed for permanent deployment on bridges in cold northern climates which pose an added challenge as the potential for solar harvesting is reduced and battery charging is slowed. First, efforts advancing energy efficient usage strategies for WSNs were made. With WSN energy consumption proportional to the amount of data transmitted, data reduction strategies are prioritized. A novel data compression paradigm termed compressed sensing is advanced for embedment in a wireless sensor microcontroller. In addition, fatigue monitoring algorithms are embedded for local data processing leading to dramatic data reductions. In the second part of the thesis, a radical top-down design strategy (in contrast to global vibration strategies) for a monitoring system is explored to target specific damage concerns of bridge owners. Data-driven algorithmic approaches are created for statistical performance characterization of long-term bridge response. Statistical process control and reliability index monitoring are advanced as a scalable and autonomous means of transforming data into information relevant to bridge risk management. Validation of the wireless monitoring system architecture is made using the Telegraph Road Bridge (Monroe, Michigan), a multi-girder short-span highway bridge that represents a major fraction of the U.S. national inventory.PhDCivil EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/116749/1/ocosean_1.pd

    Deep IoT Energy Efficient Wireless Positioning System

    Full text link
    Positioning systems in underground mines require an energy-efficient wireless data transmission network to send positioning data to the control centre at the surface. This thesis hypothesised that a hybrid network combining Bluetooth Low Energy (BLE) multi-hop and Long Range (LoRa) networks is an effective solution for the identified research problem. Furthermore, a novel cluster-based positioning system architecture that reduces the workload of the energy-constrained nodes is proposed in this thesis to optimise the power consumption of the hypothesised BLE and LoRa hybrid data transmission network. The evaluation of the proposed BLE and LoRa hybrid data transmission network was conducted using an OMNeT++ BLE Mesh network, which was implemented in this thesis in conjunction with the open-source OMNeT++ FLoRa simulation model. The simulation results obtained using the BLE and LoRa (OMNeT++) models indicate that the end-to-end delay and power consumption results of LoRa outperform BLE when evaluated under identical conditions. LoRa nodes consumed only 2.4 joules of nodal power, while BLE relay nodes consumed 95.7% more at 57 joules. Additionally, the average end-to-end delay for data packet transmission from a transmitter to a receiver up to 120 meters away was approximately 0.205 seconds for the LoRa network. In contrast, this value increased by 99% for the BLE multi-hop network. However, the simulation results obtained from a power-optimised BLE multi-hop network (where BLE relay nodes are integrated with Wake-Up Receivers (WuR)) were consistent with the thesis hypothesis. It reduced the BLE nodal power consumption to 0.205 joules and the end-to-end delay for data packet transmission by 99%. Furthermore, the analysis of end-to-end delay results indicated that LoRa outperforms an optimised BLE multi-hop network when the receiver node-to-transmitter distance exceeds 90 meters. In conclusion, this thesis established that the hypothesised BLE and LoRa hybrid approach effectively addresses the identified research problem when incorporating an optimisation mechanism into the BLE multi-hop network. These findings contribute significantly to the broader understanding of designing power-efficient networks in energy-constrained and challenging environments

    Sensor-based ICT Systems for Smart Societies

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen

    A patient agent controlled customized blockchain based framework for internet of things

    Get PDF
    Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures known as Internet of Things. New Blockchain for the Internet of Things models promise secure solutions for eHealth, smart cities, and other applications. These models pave the way for continuous monitoring of patient’s physiological signs with wearable sensors to augment traditional medical practice without recourse to storing data with a trusted authority. However, existing Blockchain algorithms cannot accommodate the huge volumes, security, and privacy requirements of health data. In this thesis, our first contribution is an End-to-End secure eHealth architecture that introduces an intelligent Patient Centric Agent. The Patient Centric Agent executing on dedicated hardware manages the storage and access of streams of sensors generated health data, into a customized Blockchain and other less secure repositories. As IoT devices cannot host Blockchain technology due to their limited memory, power, and computational resources, the Patient Centric Agent coordinates and communicates with a private customized Blockchain on behalf of the wearable devices. While the adoption of a Patient Centric Agent offers solutions for addressing continuous monitoring of patients’ health, dealing with storage, data privacy and network security issues, the architecture is vulnerable to Denial of Services(DoS) and single point of failure attacks. To address this issue, we advance a second contribution; a decentralised eHealth system in which the Patient Centric Agent is replicated at three levels: Sensing Layer, NEAR Processing Layer and FAR Processing Layer. The functionalities of the Patient Centric Agent are customized to manage the tasks of the three levels. Simulations confirm protection of the architecture against DoS attacks. Few patients require all their health data to be stored in Blockchain repositories but instead need to select an appropriate storage medium for each chunk of data by matching their personal needs and preferences with features of candidate storage mediums. Motivated by this context, we advance third contribution; a recommendation model for health data storage that can accommodate patient preferences and make storage decisions rapidly, in real-time, even with streamed data. The mapping between health data features and characteristics of each repository is learned using machine learning. The Blockchain’s capacity to make transactions and store records without central oversight enables its application for IoT networks outside health such as underwater IoT networks where the unattended nature of the nodes threatens their security and privacy. However, underwater IoT differs from ground IoT as acoustics signals are the communication media leading to high propagation delays, high error rates exacerbated by turbulent water currents. Our fourth contribution is a customized Blockchain leveraged framework with the model of Patient-Centric Agent renamed as Smart Agent for securely monitoring underwater IoT. Finally, the smart Agent has been investigated in developing an IoT smart home or cities monitoring framework. The key algorithms underpinning to each contribution have been implemented and analysed using simulators.Doctor of Philosoph

    Towards reliable logging in the internet of things networks

    Get PDF
    The internet of things is one of the most rapidly developing technologies, and its low cost and usability make it applicable to various critical disciplines. Being a component of such critical infrastructure needs, these networks have to be dependable and offer the best outcome. Keeping track of network events is one method for enhancing network reliability, as network event logging supports essential processes such as debugging, checkpointing, auditing, root-cause analysis, and forensics. However, logging in the IoT networks is not a simple task. IoT devices are positioned in remote places with unstable connectivity and inadequate security protocols, making them vulnerable to environmental flaws and security breaches. This thesis investigates the problem of reliable logging in IoT networks. We concentrate on the problem in the presence of Byzantine behaviour and the integration of logging middleware into the network stack. To overcome these concerns, we propose a technique for distributed logging by distributing loggers around the network. We define the logger selection problem and the collection problem, and show that only the probabilistic weak variant can solve the problem. We examine the performance of the Collector algorithm in several MAC setups. We then explore the auditability notion in IoT; we show how safety specification can be enforced through the analogies of fair exchange. Next, we review our findings and their place in the existing body of knowledge. We also explore the limits we faced when investigating this problem, and we finish this thesis by providing opportunities for future work

    Double smart energy harvesting system for self-powered industrial IoT

    Get PDF
    312 p. 335 p. (confidencial)Future factories would be based on the Industry 4.0 paradigm. IndustrialInternet of Things (IIoT) represent a part of the solution in this field. Asautonomous systems, powering challenges could be solved using energy harvestingtechnology. The present thesis work combines two alternatives of energy input andmanagement on a single architecture. A mini-reactor and an indoor photovoltaiccell as energy harvesters and a double power manager with AC/DC and DC/DCconverters controlled by a low power single controller. Furthermore, theaforementioned energy management is improved with artificial intelligencetechniques, which allows a smart and optimal energy management. Besides, theharvested energy is going to be stored in a low power supercapacitor. The workconcludes with the integration of these solutions making IIoT self-powered devices.IK4 Teknike

    Laboratory Directed Research and Development FY-10 Annual Report

    Full text link
    The FY 2010 Laboratory Directed Research and Development (LDRD) Annual Report is a compendium of the diverse research performed to develop and ensure the INL's technical capabilities can support the future DOE missions and national research priorities. LDRD is essential to the INL -- it provides a means for the laboratory to pursue novel scientific and engineering research in areas that are deemed too basic or risky for programmatic investments. This research enhances technical capabilities at the laboratory, providing scientific and engineering staff with opportunities for skill building and partnership development

    Smart Sensing Technologies for Personalised Coaching

    Get PDF
    People living in both developed and developing countries face serious health challenges related to sedentary lifestyles. It is therefore essential to find new ways to improve health so that people can live longer and can age well. With an ever-growing number of smart sensing systems developed and deployed across the globe, experts are primed to help coach people toward healthier behaviors. The increasing accountability associated with app- and device-based behavior tracking not only provides timely and personalized information and support but also gives us an incentive to set goals and to do more. This book presents some of the recent efforts made towards automatic and autonomous identification and coaching of troublesome behaviors to procure lasting, beneficial behavioral changes

    Use of Inferential Statistics to Design Effective Communication Protocols for Wireless Sensor Networks

    Get PDF
    This thesis explores the issues and techniques associated with employing the principles of inferential statistics to design effective Medium Access Control (MAC), routing and duty cycle management strategies for multihop Wireless Sensor Networks (WSNs). The main objective of these protocols are to maximise the throughput of the network, to prolong the lifetime of nodes and to reduce the end-to-end delay of packets over a general network scenario without particular considerations for specific topology configurations, traffic patterns or routing policies. WSNs represent one of the leading-edge technologies that have received substantial research efforts due to their prominent roles in many applications. However, to design effective communication protocols for WSNs is particularly challenging due to the scarce resources of these networks and the requirement for large-scale deployment. The MAC, routing and duty cycle management protocols are amongst the important strategies that are required to ensure correct operations of WSNs. This thesis makes use of the inferential statistics field to design these protocols; inferential statistics was selected as it provides a rich design space with powerful approaches and methods. The MAC protocol proposed in this thesis exploits the statistical characteristics of the Gamma distribution to enable each node to adjust its contention parameters dynamically based on its inference for the channel occupancy. This technique reduces the service time of packets and leverages the throughput by improving the channel utilisation. Reducing the service time minimises the energy consumed in contention to access the channel which in turn prolongs the lifetime of nodes. The proposed duty cycle management scheme uses non-parametric Bayesian inference to enable each node to determine the best times and durations for its sleeping durations without posing overheads on the network. Hence the lifetime of node is prolonged by mitigating the amount of energy wasted in overhearing and idle listening. Prolonging the lifetime of nodes increases the throughput of the network and reduces the end-to-end delay as it allows nodes to route their packets over optimal paths for longer periods. The proposed routing protocol uses one of the state-of-the-art inference techniques dubbed spatial reasoning that enables each node to figure out the spatial relationships between nodes without overwhelming the network with control packets. As a result, the end-to-end delay is reduced while the throughput and lifetime are increased. Besides the proposed protocols, this thesis utilises the analytical aspects of statistics to develop rigorous analytical models that can accurately predict the queuing and medium access delay and energy consumption over multihop networks. Moreover, this thesis provides a broader perspective for design of communication protocols for WSNs by casting the operations of these networks in the domains of the artificial chemistry discipline and the harmony search optimisation algorithm

    Energy-efficient Continuous Context Sensing on Mobile Phones

    Get PDF
    With the ever increasing adoption of smartphones worldwide, researchers have found the perfect sensor platform to perform context-based research and to prepare for context-based services to be also deployed for the end-users. However, continuous context sensing imposes a considerable challenge in balancing the energy consumption of the sensors, the accuracy of the recognized context and its latency. After outlining the common characteristics of continuous sensing systems, we present a detailed overview of the state of the art, from sensors sub-systems to context inference algorithms. Then, we present the three main contribution of this thesis. The first approach we present is based on the use of local communications to exchange sensing information with neighboring devices. As proximity, location and environmental information can be obtained from nearby smartphones, we design a protocol for synchronizing the exchanges and fairly distribute the sensing tasks. We show both theoretically and experimentally the reduction in energy needed when the devices can collaborate. The second approach focuses on the way to schedule mobile sensors, optimizing for both the accuracy and energy needs. We formulate the optimal sensing problem as a decision problem and propose a two-tier framework for approximating its solution. The first tier is responsible for segmenting the sensor measurement time series, by fitting various models. The second tier takes care of estimating the optimal sampling, selecting the measurements that contributes the most to the model accuracy. We provide near-optimal heuristics for both tiers and evaluate their performances using environmental sensor data. In the third approach we propose an online algorithm that identifies repeated patterns in time series and produces a compressed symbolic stream. The first symbolic transformation is based on clustering with the raw sensor data. Whereas the next iterations encode repetitive sequences of symbols into new symbols. We define also a metric to evaluate the symbolization methods with regard to their capacity at preserving the systems' states. We also show that the output of symbols can be used directly for various data mining tasks, such as classification or forecasting, without impacting much the accuracy, but greatly reducing the complexity and running time. In addition, we also present an example of application, assessing the user's exposure to air pollutants, which demonstrates the many opportunities to enhance contextual information when fusing sensor data from different sources. On one side we gather fine grained air quality information from mobile sensor deployments and aggregate them with an interpolation model. And, on the other side, we continuously capture the user's context, including location, activity and surrounding air quality. We also present the various models used for fusing all these information in order to produce the exposure estimation
    • …
    corecore