629 research outputs found
UNDERWATER DATA COMMUNICATION PACKAGE
This project concentrates on simplified and innovated technology to develop an
efficient software package for Underwater Acoustic (UWA) communication nfrich
helps researcher to have better understanding of the behavior of undemmter acoustic
network, to cater for the UTP in-house research needs and to set up the relevant basic
underwater acoustic communication laboratory based testbed. The existing
simulation tool, particularly NS2 can give reseanchers some bosic uderstanding of
underwater network, and this requires certain level of knowledge in C++, TCL and
most importantly understating the infrastnrcture of the simulation Howwer,
researchers will find out that they are not able to simularc the real underurer
environment. This project would tackle problems existed in softunare development by
utilizing Windows Foundation Presentation Technology and Model View
ViewModel architecture which is an architectrral pat&ern mostly used in softnnare
engineering that originated frrom Microsoft. The author believes that this softu/arc
package will enable students/ reseachers to pcrform their studies and testing in areal
lab based environment with a minimum amount of effor
Software Defined Networks based Smart Grid Communication: A Comprehensive Survey
The current power grid is no longer a feasible solution due to
ever-increasing user demand of electricity, old infrastructure, and reliability
issues and thus require transformation to a better grid a.k.a., smart grid
(SG). The key features that distinguish SG from the conventional electrical
power grid are its capability to perform two-way communication, demand side
management, and real time pricing. Despite all these advantages that SG will
bring, there are certain issues which are specific to SG communication system.
For instance, network management of current SG systems is complex, time
consuming, and done manually. Moreover, SG communication (SGC) system is built
on different vendor specific devices and protocols. Therefore, the current SG
systems are not protocol independent, thus leading to interoperability issue.
Software defined network (SDN) has been proposed to monitor and manage the
communication networks globally. This article serves as a comprehensive survey
on SDN-based SGC. In this article, we first discuss taxonomy of advantages of
SDNbased SGC.We then discuss SDN-based SGC architectures, along with case
studies. Our article provides an in-depth discussion on routing schemes for
SDN-based SGC. We also provide detailed survey of security and privacy schemes
applied to SDN-based SGC. We furthermore present challenges, open issues, and
future research directions related to SDN-based SGC.Comment: Accepte
An Adaptable and Unsupervised TinyML Anomaly Detection System for Extreme Industrial Environments
Industrial assets often feature multiple sensing devices to keep track of their status by monitoring certain physical parameters. These readings can be analyzed with machine learning (ML) tools to identify potential failures through anomaly detection, allowing operators to take appropriate corrective actions. Typically, these analyses are conducted on servers located in data centers or the cloud. However, this approach increases system complexity and is susceptible to failure in cases where connectivity is unavailable. Furthermore, this communication restriction limits the approach’s applicability in extreme industrial environments where operating conditions affect communication and access to the system. This paper proposes and evaluates an end-to-end adaptable and configurable anomaly detection system that uses the Internet of Things (IoT), edge computing, and Tiny-MLOps methodologies in an extreme industrial environment such as submersible pumps. The system runs on an IoT sensing Kit, based on an ESP32 microcontroller and MicroPython firmware, located near the data source. The processing pipeline on the sensing device collects data, trains an anomaly detection model, and alerts an external gateway in the event of an anomaly. The anomaly detection model uses the isolation forest algorithm, which can be trained on the microcontroller in just 1.2 to 6.4 s and detect an anomaly in less than 16 milliseconds with an ensemble of 50 trees and 80 KB of RAM. Additionally, the system employs blockchain technology to provide a transparent and irrefutable repository of anomalies
High Definition, Inexpensive, Underwater Mapping
In this paper we present a complete framework for Underwater SLAM utilizing a
single inexpensive sensor. Over the recent years, imaging technology of action
cameras is producing stunning results even under the challenging conditions of
the underwater domain. The GoPro 9 camera provides high definition video in
synchronization with an Inertial Measurement Unit (IMU) data stream encoded in
a single mp4 file. The visual inertial SLAM framework is augmented to adjust
the map after each loop closure. Data collected at an artificial wreck of the
coast of South Carolina and in caverns and caves in Florida demonstrate the
robustness of the proposed approach in a variety of conditions.Comment: IEEE Internation Conference on Robotics and Automation, 202
Enabling Automated Integration Testing of Smart Farming Applications via Digital Twin Prototypes
Industry 4.0 represents a major technological shift that has the potential to
transform the manufacturing industry, making it more efficient, productive, and
sustainable. Smart farming is a concept that involves the use of advanced
technologies to improve the efficiency and sustainability of agricultural
practices. Industry 4.0 and smart farming are closely related, as many of the
technologies used in smart farming are also used in Industry 4.0. Digital twins
have the potential for cost-effective software development of such
applications. With our Digital Twin Prototype approach, all sensor interfaces
are integrated into the development process, and their inputs and outputs of
the emulated hardware match those of the real hardware. The emulators respond
to the same commands and return identically formatted data packages as their
real counterparts, making the Digital Twin Prototype a valid source of a
digital shadow, i.e. the Digital Twin Prototype is a prototype of the physical
twin and can replace it for automated testing of the digital twin software. In
this paper, we present a case study for employing our Digital Twin Prototype
approach to automated testing of software for improving the making of silage
with a smart farming application. Besides automated testing with continuous
integration, we also discuss continuous deployment of modular Docker containers
in this context.Comment: 8 pages, 6 figures, 1 table, conference, In the Proceedings Of The
2023 IEEE International Conference on Digital Twin (Digital Twin 2023
Recent Advances in Internet of Things Solutions for Early Warning Systems: A Review
none5noNatural disasters cause enormous damage and losses every year, both economic and in terms of human lives. It is essential to develop systems to predict disasters and to generate and disseminate timely warnings. Recently, technologies such as the Internet of Things solutions have been integrated into alert systems to provide an effective method to gather environmental data and produce alerts. This work reviews the literature regarding Internet of Things solutions in the field of Early Warning for different natural disasters: floods, earthquakes, tsunamis, and landslides. The aim of the paper is to describe the adopted IoT architectures, define the constraints and the requirements of an Early Warning system, and systematically determine which are the most used solutions in the four use cases examined. This review also highlights the main gaps in literature and provides suggestions to satisfy the requirements for each use case based on the articles and solutions reviewed, particularly stressing the advantages of integrating a Fog/Edge layer in the developed IoT architectures.openEsposito M.; Palma L.; Belli A.; Sabbatini L.; Pierleoni P.Esposito, M.; Palma, L.; Belli, A.; Sabbatini, L.; Pierleoni, P
UNDERWATER DATA COMMUNICATION PACKAGE
This project concentrates on simplified and innovated technology to develop an
efficient software package for Underwater Acoustic (UWA) communication nfrich
helps researcher to have better understanding of the behavior of undemmter acoustic
network, to cater for the UTP in-house research needs and to set up the relevant basic
underwater acoustic communication laboratory based testbed. The existing
simulation tool, particularly NS2 can give reseanchers some bosic uderstanding of
underwater network, and this requires certain level of knowledge in C++, TCL and
most importantly understating the infrastnrcture of the simulation Howwer,
researchers will find out that they are not able to simularc the real underurer
environment. This project would tackle problems existed in softunare development by
utilizing Windows Foundation Presentation Technology and Model View
ViewModel architecture which is an architectrral pat&ern mostly used in softnnare
engineering that originated frrom Microsoft. The author believes that this softu/arc
package will enable students/ reseachers to pcrform their studies and testing in areal
lab based environment with a minimum amount of effor
Trust and reputation management for securing collaboration in 5G access networks: the road ahead
Trust represents the belief or perception of an entity, such as a mobile device or a node, in the extent to which future actions and reactions are appropriate in a collaborative relationship. Reputation represents the network-wide belief or perception of the trustworthiness of an entity. Each entity computes and assigns a trust or reputation value, which increases and decreases with the appropriateness of actions and reactions, to another entity in order to ensure a healthy collaborative relationship. Trust and reputation management (TRM) has been investigated to improve the security of traditional networks, particularly the access networks. In 5G, the access networks are multi-hop networks formed by entities which may not be trustable, and so such networks are prone to attacks, such as Sybil and crude attacks. TRM addresses such attacks to enhance the overall network performance, including reliability, scalability, and stability. Nevertheless, the investigation of TRM in 5G, which is the next-generation wireless networks, is still at its infancy. TRM must cater for the characteristics of 5G. Firstly, ultra-densification due to the exponential growth of mobile users and data traffic. Secondly, high heterogeneity due to the different characteristics of mobile users, such as different transmission characteristics (e.g., different transmission power) and different user equipment (e.g., laptops and smartphones). Thirdly, high variability due to the dynamicity of the entities’ behaviors and operating environment. TRM must also cater for the core features of 5G (e.g., millimeter wave transmission, and device-to-device communication) and the core technologies of 5G (e.g., massive MIMO and beamforming, and network virtualization). In this paper, a review of TRM schemes in 5G and traditional networks, which can be leveraged to 5G, is presented. We also provide an insight on some of the important open issues and vulnerabilities in 5G networks that can be resolved using a TRM framework
- …