899 resultados para metal ion sensor
Resumo:
Organometallic porphyrins with a metal, metalloid or phosphorus fragment directly attached to their carbon framework emerged for the first time in 1976, and these macrocycles have been intensively investigated in the past decade. The present review summarises for the first time all reported examples as well as applications of these systems.
Resumo:
Near-infrared spectroscopy is a somewhat unutilised technique for the study of minerals. The technique has the ability to determine water content, hydroxyl groups and transition metals. In this paper we show the application of NIR spectroscopy to the study of selected minerals. The structure and spectral properties of two Cu-tellurite minerals graemite and teineite are compared with bismuth containing tellurite mineral smirnite by the application of NIR and IR spectroscopy. The position of Cu2+ bands and their splitting in the electronic spectra of tellurites are in conformity with octahedral geometry distortion. The spectral pattern of smirnite resembles graemite and the observed band at 10855 cm-1 with a weak shoulder at 7920 cm-1 is identified as due to Cu2+ ion. Any transition metal impurities may be identified by their bands in this spectral region. Three prominent bands observed in the region of 7200-6500 cm-1 are the overtones of water whilst the weak bands observed near 6200 cm-1in tellurites may be attributed to the hydrogen bonding between (TeO3)2- and H2O. The observation of a number of bands centred at around 7200 cm-1 confirms molecular water in tellurite minerals. A number of overlapping bands in the low wavenumbers 4500-4000 cm-1 is the result of combinational modes of (TeO3)2−ion. The appearance of the most intense peak at 5200 cm-1 with a pair of weak bands near 6000 cm-1 is a common feature in all the spectra and is related to the combinations of OH vibrations of water molecules, and bending vibrations ν2 (δ H2O). Bending vibrations δ H2O observed in the IR spectra shows a single band for smirnite at 1610 cm-1. The resolution of this band into number of components is evidenced for non-equivalent types of molecular water in graemite and teineite. (TeO3)2- stretching vibrations are characterized by three main absorptions at 1080, 780 and 695 cm-1.
Resumo:
Surveillance and tracking systems typically use a single colour modality for their input. These systems work well in controlled conditions but often fail with low lighting, shadowing, smoke, dust, unstable backgrounds or when the foreground object is of similar colouring to the background. With advances in technology and manufacturing techniques, sensors that allow us to see into the thermal infrared spectrum are becoming more affordable. By using modalities from both the visible and thermal infrared spectra, we are able to obtain more information from a scene and overcome the problems associated with using visible light only for surveillance and tracking. Thermal images are not affected by lighting or shadowing and are not overtly affected by smoke, dust or unstable backgrounds. We propose and evaluate three approaches for fusing visual and thermal images for person tracking. We also propose a modified condensation filter to track and aid in the fusion of the modalities. We compare the proposed fusion schemes with using the visual and thermal domains on their own, and demonstrate that significant improvements can be achieved by using multiple modalities.
Resumo:
Four nickel carbonate-bearing minerals from Australia have been investigated to study the effect of Ni for Mg substitution. The spectra of nullaginite, zaratite, widgiemoolthalite and takovite show three main features in the range of 26,720–25,855 cm−1 (ν1-band), 15,230–14,740 cm−1 (ν2-band) and 9,200–9,145 cm−1 (ν3-band) which are characteristic of divalent nickel in six-fold coordination. The Crystal Field Stabilization Energy (CFSE) of Ni2+ in the four carbonates is calculated from the observed 3A2g(3F) → 3T2g(3F) transition. CFSE is dependent on mineralogy, crystallinity and chemical composition (Al/Mg-content). The splitting of the ν1- and ν3-bands and non-Gaussian shape of ν3-band in the minerals are the effects of Ni-site distortion from regular octahedral. The effect of structural cation substitutions (Mg2+, Ni2+, Fe2+ and trivalent cations, Al3+, Fe3+) in the carbonate minerals is noticed on band shifts. Thus, electronic bands in the UV–Vis–NIR spectra and the overtones and combination bands of OH and carbonate ion in NIR show shifts to higher wavenumbers, particularly for widgiemoolthalite and takovite.
Resumo:
Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t1 and t2, and then reveals all the group keys used between times t1 and t2. In this paper, a fix to the scheme is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched. Then, the performance analysis for our proposal, Alzaid et al.’s scheme, and Nilsson et al.’s scheme is given.
Resumo:
We consider multi-robot systems that include sensor nodes and aerial or ground robots networked together. Such networks are suitable for tasks such as large-scale environmental monitoring or for command and control in emergency situations. We present a sensor network deployment method using autonomous aerial vehicles and describe in detail the algorithms used for deployment and for measuring network connectivity and provide experimental data collected from field trials. A particular focus is on determining gaps in connectivity of the deployed network and generating a plan for repair, to complete the connectivity. This project is the result of a collaboration between three robotics labs (CSIRO, USC, and Dartmouth). © Springer-Verlag Berlin/Heidelberg 2006.
Resumo:
We present algorithms, systems, and experimental results for underwater data muling. In data muling a mobile agent interacts with static agents to upload, download, or transport data to a different physical location. We consider a system comprising an Autonomous Underwater Vehicle (AUV) and many static Underwater Sensor Nodes (USN) networked together optically and acoustically. The AUV can locate the static nodes using vision and hover above the static nodes for data upload. We describe the hardware and software architecture of this underwater system, as well as experimental data. © 2006 IEEE.
Resumo:
While sensor networks have now become very popular on land, the underwater environment still poses some difficult problems. Communication is one of the difficult challenges under water. There are two options: optical and acoustic. We have designed an optical communication board that allows the Fleck’s to communicate optically. We have tested the resulting underwater sensor nodes in two different applications.
Resumo:
We describe a sensor network deployment method using autonomous flying robots. Such networks are suitable for tasks such as large-scale environmental monitoring or for command and control in emergency situations. We describe in detail the algorithms used for deployment and for measuring network connectivity and provide experimental data we collected from field trials. A particular focus is on determining gaps in connectivity of the deployed network and generating a plan for a second, repair, pass to complete the connectivity. This project is the result of a collaboration between three robotics labs (CSIRO, USC, and Dartmouth.).
Resumo:
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.
Resumo:
This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a standard wireless sensor node to provide security services such as message integrity, confidentiality, authenticity, and system integrity based on RSA public-key and XTEA-based symmetric-key cryptography. In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering. We analyze system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost. Our results show that trustedFleck significantly outperforms previous approaches (e.g., TinyECC) in terms of these metrics while providing stronger security levels. Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.