7 research outputs found

    Design of a Random Decrement Method Based Structural Health Monitoring System

    No full text
    Structural Health Monitoring (SHM) has reached a high importance in numerous fields of civil and mechanical engineering. Promising damage detection approaches like the Damage Index Method, Gapped Smoothing Technique and Modal Strain Energy Method require the structure's mode shapes [1]

    An implementation of a system for structural health monitoring with smart sensor nodes based on the Random Decrement method

    No full text
    Vibration based structural health monitoring methods have been proven to be well suited for objects like bridges, buildings or wind turbines. The considerable size of these structures leads to long distances between the sensors and the signal processing units. Thus, such systems are efficiently implemented with a network of smart sensors. One of the main challenges is the distribution of signal processing within the network, in order to minimize the communication effort. In this paper, the implementation of decentralized signal analysis to these kinds of smart sensor networks with the Random Decrement method is investigated, which offers a computationally very efficient estimation of auto- and cross-correlation functions of sensor signals. These may serve as a basis e.g. for operational modal analysis methods

    Towards practical cancelable biometrics for finger vein recognition

    No full text
    Biometrics has nowadays become a preferred solution for systems requiring secure authentication. However, the usage of biometric characteristics raises significant concerns regarding personal data protection and privacy. Several template protection schemes have been therefore proposed to conceal the employed identifiers, while still ensuring the ability to efficiently recognise users. In this paper, we propose and analyse three different approaches generating cancelable templates from finger vein features. A thorough analysis of the considered methods is conducted to investigate their impact on the achievable recognition performance, as well as their security in terms of renewability and unlinkability. Furthermore, a specific attack is designed to evaluate the irreversibility of the protection scheme providing the best recognition performance
    corecore