276,815 research outputs found
Virtual actuators with virtual sensors
The virtual actuator approach to bond graph based control is
extended to use virtual sensor inputs; this allows relative degree
conditions on the controller to be relaxed. Furthermore, the
effect of the transfer system can be eliminated from the closed
loop system. Illustrative examples are given
A Non-Cooperative Game Theoretical Approach For Power Control In Virtual MIMO Wireless Sensor Network
Power management is one of the vital issue in wireless sensor networks, where
the lifetime of the network relies on battery powered nodes. Transmitting at
high power reduces the lifetime of both the nodes and the network. One
efficient way of power management is to control the power at which the nodes
transmit. In this paper, a virtual multiple input multiple output wireless
sensor network (VMIMO-WSN)communication architecture is considered and the
power control of sensor nodes based on the approach of game theory is
formulated. The use of game theory has proliferated, with a broad range of
applications in wireless sensor networking. Approaches from game theory can be
used to optimize node level as well as network wide performance. The game here
is categorized as an incomplete information game, in which the nodes do not
have complete information about the strategies taken by other nodes. For
virtual multiple input multiple output wireless sensor network architecture
considered, the Nash equilibrium is used to decide the optimal power level at
which a node needs to transmit, to maximize its utility. Outcome shows that the
game theoretic approach considered for VMIMO-WSN architecture achieves the best
utility, by consuming less power.Comment: 12 pages, 8 figure
A Low-Overhead Script Language for Tiny Networked Embedded Systems
With sensor networks starting to get mainstream acceptance, programmability is of increasing importance.
Customers and field engineers will need to reprogram existing deployments and software developers
will need to test and debug software in network testbeds. Script languages, which are a popular
mechanism for reprogramming in general-purpose computing, have not been considered for wireless sensor
networks because of the perceived overhead of interpreting a script language on tiny sensor nodes.
In this paper we show that a structured script language is both feasible and efficient for programming
tiny sensor nodes. We present a structured script language, SCript, and develop an interpreter for the
language. To reduce program distribution energy the SCript interpreter stores a tokenized representation
of the scripts which is distributed through the wireless network. The ROM and RAM footprint of the
interpreter is similar to that of existing virtual machines for sensor networks. We show that the interpretation
overhead of our language is on par with that of existing virtual machines. Thus script languages,
previously considered as too expensive for tiny sensor nodes, are a viable alternative to virtual machines
Establishing Rapport with a Virtual Dancer
We discuss an embodied agent that acts as a dancer and invites human partners to dance with her. The dancer has a repertoire of gestures and moves obtained from inverse kinematics and motion capturing that can be combined in order to dance both on the beat of the music that is provided to the dancer and sensor input (visual and dance pad) from a human partner made available to the virtual dancer. The interaction between virtual dancer and human dancer allows alternating ‘lead’ ad ‘follow’ behavior, both from the point of view of the virtual and the human dancer
Automatic application object migration in sensor networks
Object migration in wireless sensor networks has the potential to reduce energy consumption for a wireless sensor network mesh. Automated migration reduces the need for the programmer to perform manual static analysis to find an efficient layout solution. Instead, the system can self-optimise and adjust to changing conditions. This paper describes an automated, transparent object migration system for wireless sensor networks, implemented on a micro Java virtual machine. The migration system moves objects at runtime around the sensor mesh to reduce communication overheads. The movement of objects is transparent to the application developer. Automated transparent object migration is a core component of Hydra, a distributed operating system for wireless sensor networks that is currently under development. Performance of the system under a complex performance test scenario using a real-world dataset of seismic events is described. The results show that under both simple and complex conditions the migration technique can result in lower data traffic and consequently lower overall energy cost
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
As smartphones become more pervasive, they are increasingly targeted by
malware. At the same time, each new generation of smartphone features
increasingly powerful onboard sensor suites. A new strain of sensor malware has
been developing that leverages these sensors to steal information from the
physical environment (e.g., researchers have recently demonstrated how malware
can listen for spoken credit card numbers through the microphone, or feel
keystroke vibrations using the accelerometer). Yet the possibilities of what
malware can see through a camera have been understudied. This paper introduces
a novel visual malware called PlaceRaider, which allows remote attackers to
engage in remote reconnaissance and what we call virtual theft. Through
completely opportunistic use of the camera on the phone and other sensors,
PlaceRaider constructs rich, three dimensional models of indoor environments.
Remote burglars can thus download the physical space, study the environment
carefully, and steal virtual objects from the environment (such as financial
documents, information on computer monitors, and personally identifiable
information). Through two human subject studies we demonstrate the
effectiveness of using mobile devices as powerful surveillance and virtual
theft platforms, and we suggest several possible defenses against visual
malware
A tracker alignment framework for augmented reality
To achieve accurate registration, the transformations which locate the tracking system components with respect to the environment must be known. These transformations relate the base of the tracking system to the virtual world and the tracking system's sensor to the graphics display. In this paper we present a unified, general calibration method for calculating these transformations. A user is asked to align the display with objects in the real world. Using this method, the sensor to display and tracker base to world transformations can be determined with as few as three measurements
- …
