Crosstalk analysis, its effects and reduction techniques among photovoltaic devices used as transparent optical sensors for a wearable line-of-sight detection system

2015 ◽  
Vol 54 (6S1) ◽  
pp. 06FP16 ◽  
Author(s):  
Carlos C. Cortes Torres ◽  
Kota Sampei ◽  
Miho Ogawa ◽  
Masataka Ozawa ◽  
Norihisa Miki
2014 ◽  
Vol 205 ◽  
pp. 208-214 ◽  
Author(s):  
Masataka Ozawa ◽  
Kota Sampei ◽  
Carlos Cortes ◽  
Miho Ogawa ◽  
Akira Oikawa ◽  
...  

2018 ◽  
Vol 11 (1) ◽  
pp. 22-26 ◽  
Author(s):  
Zan Liu ◽  
Xihong Chen

AbstractElectromagnetic wave of enemy radar propagated by troposcatter is a valuable candidate for beyond line-of-sight detection. There is no analytical study considering the operating range of passive troposcatter detection system. In this paper, we study the way to predict the operating range, which is dominated by propagation loss. The key propagation loss models including statistic model and real-time model are analyzed. During deducing the latter loss model, Hopfield model is introduced to precisely describe the tropospheric refractivity. Meanwhile, rain attenuation is also taken into consideration. Several examples demonstrate the feasibility of predicting operating range through the proposed method.


2021 ◽  
Vol 35 (1) ◽  
pp. 11-21
Author(s):  
Himani Tyagi ◽  
Rajendra Kumar

IoT is characterized by communication between things (devices) that constantly share data, analyze, and make decisions while connected to the internet. This interconnected architecture is attracting cyber criminals to expose the IoT system to failure. Therefore, it becomes imperative to develop a system that can accurately and automatically detect anomalies and attacks occurring in IoT networks. Therefore, in this paper, an Intrsuion Detection System (IDS) based on extracted novel feature set synthesizing BoT-IoT dataset is developed that can swiftly, accurately and automatically differentiate benign and malicious traffic. Instead of using available feature reduction techniques like PCA that can change the core meaning of variables, a unique feature set consisting of only seven lightweight features is developed that is also IoT specific and attack traffic independent. Also, the results shown in the study demonstrates the effectiveness of fabricated seven features in detecting four wide variety of attacks namely DDoS, DoS, Reconnaissance, and Information Theft. Furthermore, this study also proves the applicability and efficiency of supervised machine learning algorithms (KNN, LR, SVM, MLP, DT, RF) in IoT security. The performance of the proposed system is validated using performance Metrics like accuracy, precision, recall, F-Score and ROC. Though the accuracy of Decision Tree (99.9%) and Randon Forest (99.9%) Classifiers are same but other metrics like training and testing time shows Random Forest comparatively better.


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1902 ◽  
Author(s):  
Kenneth Deprez ◽  
Sander Bastiaens ◽  
Luc Martens ◽  
Wout Joseph ◽  
David Plets

This paper experimentally investigates passive human visible light sensing (VLS). A passive VLS system is tested consisting of one light emitting diode (LED) and one photodiode-based receiver, both ceiling-mounted. There is no line of sight between the LED and the receiver, so only reflected light can be considered. The influence of a human is investigated based on the received signal strength (RSS) values of the reflections of ambient light at the photodiode. Depending on the situation, this influence can reach up to ± 50 % . The experimental results show the influence of three various clothing colors, four different walking directions and four different layouts. Based on the obtained results, a human pass-by detection system is proposed and tested. The system achieves a detection rate of 100% in a controlled environment for 21 experiments. For a realistic corridor experiment, the system keeps its detection rate of 100% for 19 experiments.


2014 ◽  
Vol 2014 (0) ◽  
pp. _3A1-R01_1-_3A1-R01_3
Author(s):  
Miho Ogawa ◽  
Masataka Ozawa ◽  
Kota Sampei ◽  
Carlos Cotes ◽  
Norihisa Miki

Sign in / Sign up

Export Citation Format

Share Document