Search
Skip to Search Results-
A Framework for Associating Mobile Devices to Individuals Based on Identification of Motion Events
DownloadFall 2020
The ubiquity of the Internet-of-Things (IoT) devices in everyday life allows various sensors to be utilized in networked systems for solving a number of real-world problems. Models utilizing specific sensing modalities achieve impressive performance in understanding human activity and are used in...
-
Fall 2015
Transceiver duty-cycling (DC) is a popular technique to conserve energy in a wireless sensor network (WSN). In this thesis, our overall objective is to study the performance of a DC WSN. Namely, we consider the performance of a DC WSN from the point of throughput, as well as energy consumption,...
-
Spring 2024
We bridge the localization techniques that are based on proximity (near/far) information with those based on Received Signal Strength Indication (RSSI) information. An RSSI-based scheme can be mapped to proximity-based scheme by quantizing the RSSI values such they are represented by a single...
-
Spring 2016
In this work we address the challenges arising when developing, testing and deploying software for Wireless Sensor Networks. We investigate both pre-deployment software design, as well as efficient post-deployment updates. We present a combined pre-deployment framework that simulates the network...
-
Deployment Planning for Location Recognition in the Smart-Condo™: Simulation, Empirical Studies and Sensor Placement Optimization
DownloadFall 2013
The Smart-Condo™ is a comprehensive platform that aims to provide a variety of services, based on information gleaned from sensors deployed in an apartment, that can potentially improve healthcare delivery. One of our main objectives has been to develop an accurate non-invasive...
-
Fall 2009
In this thesis, we propose mechanisms to extend the lifetime of wireless sensor networks. In-network data aggregation is considered on both tree-based and flow-based routing protocols during the process of data collection to reduce redundant transmissions. In the flow-based data collection...
-
Fall 2014
By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's current location and his/her location of interest. Issuing k queries instead of one (our "k-query" scheme) protects the privacy of the user's location of interest, but facilitates the adversary...
-
Spring 2016
Recognizing the indoor activities of people is a key functionality of smart homes, since it is a prerequisite for any supportive action in service of the occupants. In this thesis, we investigate the multiple occupant localization problem in indoor environments. We developed a method based on the...
-
Fall 2015
As wireless devices have emerged as a ubiquitous part of people's everyday lives, the demands for faster wireless communications become even more pressing. Fortunately, the advanced techniques of the physical layer such as multiple-input and multiple-output (MIMO), multi-user detection (MUD),...