CLAM - CoLlAborative eMbedded networks for submarine surveillance: An overview

نویسندگان

  • Nirvana Meratnia
  • Paul J.M. Havinga
  • Paolo Casari
  • Chiara Petrioli
  • Knut Grythe
  • Thor Husoy
  • Michele Zorzi
چکیده

This paper provides an overview of the CLAM project, which aims at developing a collaborative embedded monitoring and control platform for submarine surveillance by combining cutting edge acoustic vector sensor technology and 1D, 2D, 3D sensor arrays, underwater wireless sensor networks protocol design, advanced techniques for acoustic communication, new solutions for collaborative situation-aware reasoning and distributed data and signal processing and control for horizontal and vertical sensor arrays. The result will be a new system architecture accommodating pervasively distributed heterogeneous sensor nodes deployed at different water depths, which provides a flexible, reconfigurable, and robust platform for online surveillance of submarine environments. Horizontal and vertical collaboration between sensor arrays by means of beam forming, sensor fusion and distributed processing and reasoning enables fine-grained monitoring of the submarine environment and collaborative event detection as well as transmission of the network information to the monitoring stations such as buoys and AUVs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CoLlAborative eMbedded networks for submarine surveillance (CLAM) Project

In the present deliverable, we briefly summarize the current trends and state-of-theart in terms of channel modeling, physical layer design, and beamforming. We focus on typical scenarios and system parameters considered in CLAM. For example, for frequencies of practical interest in CLAM, the ray tracing approximation to the solution of the wave equation is deemed to be a good model, and is ana...

متن کامل

CoLlAborative eMbedded networks for submarine surveillance (CLAM) Project Deliverable D5.3 Second check point for integrated PHY and protocol stack experimental validation in the diving centre

Document Overview Within the CLAM project, we had planned two major real-world experiments, one in a 10 meter deep diving center and another one at few tens of meters deep at sea of Trondheim. Later, we also added an intermediate test to be performed in Horten as the preparation for the final tests in Trondheim. This deliverable describes the results of the diving center tests performed in Marc...

متن کامل

CoLlAborative eMbedded networks for submarine surveillance (CLAM) Project

This deliverable addresses the problem of protocol design for the underwater acoustic networks to be employed in CLAM. The design concerns mainly Medium Access Control (MAC), routing and link-level error control, with considerations on data aggregation in hierarchical underwater networks. The analysis of the protocols considered in this deliverable is approached by means of simulations, using t...

متن کامل

CoLlAborative eMbedded networks for submarine surveillance (CLAM) Project Deliverable D4.1 State of the art on networking and distributed processing and exploitation of mobility and heterogeneous systems for improving system performance

Document Overview In the present deliverable, we briefly summarize the current trends and state-of-the-art on networking solutions for Underwater Wireless Acoustic Sensor Networks (UWASNs). In particular, the focus of the document is on Medium Access Control (MAC), Routing, Localization and Synchronization, as well as on node positioning and mobility. Our literature search points out that, alth...

متن کامل

overview of ways to enhance the security of video surveillance networks using blockchain

In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of  (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011