Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Missouri University of Science and Technology

Sensors

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Collect Spatiotemporally Correlated Data In Iot Networks With An Energy-Constrained Uav, Wenzheng Xu, Heng Shao, Qunli Shen, Jian Peng, Wen Huang, Weifa Liang, Tang Liu, Xin Wei Yao, Tao Lin, Sajal K. Das Jan 2024

Collect Spatiotemporally Correlated Data In Iot Networks With An Energy-Constrained Uav, Wenzheng Xu, Heng Shao, Qunli Shen, Jian Peng, Wen Huang, Weifa Liang, Tang Liu, Xin Wei Yao, Tao Lin, Sajal K. Das

Computer Science Faculty Research & Creative Works

UAVs (Unmanned Aerial Vehicles) Are Promising Tools For Efficient Data Collections Of Sensors In IoT Networks. Existing Studies Exploited Both Spatial And Temporal Data Correlations To Reduce The Amount Of Collected Redundant Data, In Which Sensors Are First Partitioned Into Different Clusters, A Master Sensor In Each Cluster Then Collects Raw Data From Other Sensors And Compresses The Received Data. An Energy-Constrained UAV Finally Collects The Maximum Amount Of Compressed Data From Different Master Sensors. We However Notice That The Compressed Data From Only A Portion Of Clusters Are Collected By The UAV In The Existing Studies, While The Data …


Unifying Threats Against Information Integrity In Participatory Crowd Sensing, Shameek Bhattacharjee, Sajal K. Das Jan 2023

Unifying Threats Against Information Integrity In Participatory Crowd Sensing, Shameek Bhattacharjee, Sajal K. Das

Computer Science Faculty Research & Creative Works

This article proposes a unified threat landscape for participatory crowd sensing (P-CS) systems. Specifically, it focuses on attacks from organized malicious actors that may use the knowledge of P-CS platform's operations and exploit algorithmic weaknesses in AI-based methods of event trust, user reputation, decision-making, or recommendation models deployed to preserve information integrity in P-CS. We emphasize on intent driven malicious behaviors by advanced adversaries and how attacks are crafted to achieve those attack impacts. Three directions of the threat model are introduced, such as attack goals, types, and strategies. We expand on how various strategies are linked with different attack …


Algorithms Leveraging Smartphone Sensing For Analyzing Explosion Events, Srinivas Chakravarthi Thandu Jan 2016

Algorithms Leveraging Smartphone Sensing For Analyzing Explosion Events, Srinivas Chakravarthi Thandu

Doctoral Dissertations

"The increasing frequency of explosive disasters throughout the world in recent years have created a clear need for the systems to monitor for them continuously to improve the post-disaster emergency events such as rescue and recovery operations. Disasters both man-made and natural are unfortunate and not preferred, however monitoring them may be a lifesaving phenomenon in emergency scenarios. Dedicated sensors deployed in the public places and their associated networks to monitor such events may be inadequate and must be complemented for making the monitoring more pervasive and effective. In the recent past, modern smartphones with significant processing, networking and storage …


On Temporal And Frequency Responses Of Smartphone Accelerometers For Explosives Detection, Srinivas Chakravarthi Thandu Jan 2014

On Temporal And Frequency Responses Of Smartphone Accelerometers For Explosives Detection, Srinivas Chakravarthi Thandu

Masters Theses

"The increasing frequency of explosive disasters throughout the world in recent years have created a clear need for the systems to monitor for them continuously for better detection and to improve the post disaster rescue operations. Dedicated sensors deployed in the public places and their associated networks to monitor such explosive events are still inadequate and must be complemented for making the detection more pervasive and effective. Modern smart phones are a rich source of sensing because of the fact that they are equipped with wide range of sensors making these devices an appealing platform for pervasive computing applications. The …


Sensor Networks: An Overview, Malik Tubaishat, Sanjay Kumar Madria Jan 2003

Sensor Networks: An Overview, Malik Tubaishat, Sanjay Kumar Madria

Computer Science Faculty Research & Creative Works

Advances in hardware and wireless network technologies have created low-cost, low-power, multifunctional miniature sensor devices. These devices make up hundreds or thousands of ad hoc tiny sensor nodes spread across a geographical area. These sensor nodes collaborate among themselves to establish a sensing network. A sensor network can provide access to information anytime, anywhere by collecting, processing, analyzing and disseminating data. Thus, the network actively participates in creating a smart environment.