منابع مشابه
Draft: Bioinspiration from Biodiversity in Sensor Design
Biodiversity is a notable outcome of biological evolution. In the process of adaptive radiation, functional principles of sensing in biology have been adapted to suit different tasks and constraints. The biosonar system of bats is an example of such an adaptive radiation in sensing that also offers particularly advantageous conditions for a biodiversity-level analysis of adaptation principles w...
متن کاملDynamic Reconfiguration in Sensor Middleware (DRAFT)
Middleware solutions for sensor networks have so far mainly focused on communication abstractions, ad-hoc message routing protocols, and power conservation techniques. We argue that customisation and dynamic reconfiguration of sensor network middleware are additional important dimensions to consider. This paper describes a sensor middleware that can be customised to suit different sensor applic...
متن کاملHealth Monitoring for Composite under Low-Cycle Cyclic Loading, Considering Effects of Acoustic Emission Sensor Type
Composites have been widely used in the aerospace industry. Due to the requirement of a high safety for such structures, they could be considered for health monitoring. The acoustic emission approach is one of most effective methods for identifying damages in composites. In this article, standard specimens were made from carbon fibers and the epoxy resin, with the [03/902/...
متن کاملLoading and Regeneration Analysis of a Diesel Particulate Filter with a Radio Frequency-Based Sensor
Accurate knowledge of diesel particulate filter (DPF) loading is critical for robust and efficient operation of the combined engine-exhaust aftertreatment system. Furthermore, upcoming on-board diagnostics regulations require on-board technologies to evaluate the status of the DPF. This work describes the application of radio frequency (RF) – based sensing techniques to accurately measure DPF s...
متن کاملProtocol Vulnerability Analysis (draft)
Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Acta Universitatis Agriculturae et Silviculturae Mendelianae Brunensis
سال: 2014
ISSN: 1211-8516,1211-8516
DOI: 10.11118/actaun201462051103