Demo Abstract: RocketLogger - Mobile Power Logger for Prototyping IoT Devices
نویسندگان
چکیده
We demonstrate the RocketLogger, a mobile data logger designed for prototyping energy harvesting IoT devices. Novel IoT applications require new dataloggers with a highly increased dynamic range for current measurement to accommodate both ultra-low sleep currents of few nanoamperes as well as wireless communication currents in the range of hundreds of milliamperes. In parallel to ultra-low currents and high dynamic range measurements, novel applications require mobile measurements for easy in-situ characterization or wearable device testing. The RocketLogger is a solution that fulfills these requirements. While being fully mobile, it measures currents from 5 nA up to 500 mA with very fast and seamless range-switching. Using a sample energy harvesting application, we demonstrate its low-current measurement capabilities, fast, seamless auto-ranging and easy-to-use remote user interface.
منابع مشابه
Trusted Tiny Things. Making Devices in Smart Cities More Transparent
In this demo we present the Trusted Tiny Things system that can be used to interrogate Internet of Things (IoT) devices and present users with information about their characteristics and capabilities. The system consists of a mobile application used to retrieve information about IoT devices supported by RESTful web services. In order to infer IoT device capabilities our services perform reasoni...
متن کاملDemo: Opportunistic IoT for Monitoring of Grazing Cattle
Precision livestock farming and other agricultural applications are considered to have great potential to utilise the many benefits of IoT technology. It is however important to maintain low cost and energy consumption to make it feasible in a very competitive market, making opportunistic and D2D communication interesting options. The demo will show a prototype of a system for monitoring grazin...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملPrototyping a Vibrato-Aware Query-By-Humming (QBH) Music Information Retrieval System for Mobile Communication Devices: Case of Chromatic Harmonica
Background and Aim: The current research aims at prototyping query-by-humming music information retrieval systems for smart phones. Methods: This multi-method research follows simulation technique from mixed models of the operations research methodology, and the documentary research method, simultaneously. Two chromatic harmonica albums comprised the research population. To achieve the purpose ...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کامل