2012 5th International Conference on New Technologies, Mobility and Security (NTMS) 2012
DOI: 10.1109/ntms.2012.6208718
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprinting Seismic Activity across an Internet of Things

Abstract: In this paper we will present technology designed to detect seismic events using pervasive computing. The project is focused on using low-cost open hardware in developing countries to provide an alternative more sustainable solution to the costly infrastructure used in countries such as Japan. The work involves building a network of embedded computing devices capable of forming a broadcast group across a range of different networking technologies including emerging 802.15.4-based networks. Software is been dev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…There has been a shift towards processing data using low-powered devices where computational power, memory and storage capacity are restricted. These devices are capable of collecting data from their immediate environment such as temperature, motion, sound and even levels of radiation and seismic activity [1], [2]. Data is gathered and then processed from a variety of devices which range from network switches to single-board computers equipped with sensors for industrial, civil, or military purposes [3], [4] .…”
Section: Introductionmentioning
confidence: 99%
“…There has been a shift towards processing data using low-powered devices where computational power, memory and storage capacity are restricted. These devices are capable of collecting data from their immediate environment such as temperature, motion, sound and even levels of radiation and seismic activity [1], [2]. Data is gathered and then processed from a variety of devices which range from network switches to single-board computers equipped with sensors for industrial, civil, or military purposes [3], [4] .…”
Section: Introductionmentioning
confidence: 99%