CS
C. Sarkar
17 records found
1
The constructive interference (CI) phenomenon has been exploited by a number of protocols for providing energy-efficient, low-latency, and reliable data collection and dissemination services in wireless sensor networks. These protocols consider CI to provide highly reliable packe
...
Where is PELE?
Pervasive localization using wearable and handheld devices
Smartphones or in general handhelds commonly used for indoor localization purposes are not a viable option in places where people do not carry them all the time - for example, home and office. Alternatively, wearable devices can partially solve this problem but have many limitati
...
For the Internet of Things (IoT) applications that send a few bytes of sensor information infrequently, several long-range IoT technologies have been conceived. Narrowband IoT (NB-IoT) is one of them that stands out due to its extended coverage, high penetrability, and high relia
...
SEAT
Secure Energy-Efficient Automated Public Transport Ticketing System
In smartcard-based travel payment systems, passengers have to place the smartcard near the journey registration devices once each for check-in and check-out to authenticate their travel. This is an annoying process when if the journey involves multiple stops. In this paper, we de
...
Poster
An energy-harvesting facade optimization system for built environments
Daylighting is the exploitation of solar energy in the form of natural lighting indoors and it plays an integral role in minimizing the energy footprint of a building. Smart daylighting enables us to design buildings that provide comfort and energy savings simultaneously. In this
...
Demo
Fine-tuned Lighting Control Leveraging Smartphone-based Occupancy Detection
Recently occupancy-based lighting control has shown a great promise towards achieving better energy efficiency. Generally, traditional systems use additional sensors to detect user presence with higher precision to better the control
algorithms. In this work, we show how a sm ...
algorithms. In this work, we show how a sm ...
Computers were invented to automate the labour-intensive computing process. The advancement of semiconductor technology has reduced the form-factor and cost of computers, and increased their usability. This has gradually introduced computers in various control and automation syst
...
Sleeping Beauty
Efficient Communication for Node Scheduling
Typical Wireless Sensor Networks (WSN) deployments use more nodes than needed to accurately sense the phenomena of interest. This redundancy can be leveraged by switching-on only a subset of nodes at any time instant (node-scheduling) and putting the remaining nodes sleep. This e
...
Murphy loves CI
Unfolding and Improving Constructive Interference in WSNs
Constructive Interference (CI) phenomenon has been exploited by Glossy, a mechanism for low-latency and reliable network flooding and time synchronization for wireless sensor networks. Recently, CI has also been used for other applications such as data collection and multicasting
...
In this paper, we describe virtual sensing framework (VSF), which reduces sensing and data transmission activities of nodes in a sensor network without compromising on either the sensing interval or data quality. VSF creates virtual
sensors (VSs) at the sink to exploit the tempor
...
DIAT
A Scalable Distributed Architecture for IoT
The advent of Internet of Things (IoT) has boosted the growth in number of devices around us and kindled the possibility of umpteen number of applications. One of the major challenges in the realization of IoT applications is interoperability among various IoT devices and deploym
...
Bluetooth is a widely used technology for short range communications. Limited device density and frequency hopping based communication usually eliminates the chances of mutual interference among independent Bluetooth Pico nets. However, with the advent of Internet of Things, ther
...
Automatic control of HVAC and artificial lights has been one of the popular methods for achieving energy-efficient buildings. The operating set-points are decided based on predefined values to ensure comfort level to most of the occupants based on prior studies. However, a person
...
Sleep-Route
Assured Sensing with Aggressively Sleeping Nodes
In data gathering wireless sensor network applications, data correlation among the sensor nodes have been utilized to extend network lifetimes. It has been shown that the data correlation also exists between nodes that are far away, contrary to the assumption that correlation dec
...